SoK: Cryptocurrency Wallets -- A Security Review and Classification based on Authentication Factors (2402.17659v1)
Abstract: In this work, we review existing cryptocurrency wallet solutions with regard to authentication methods and factors from the user's point of view. In particular, we distinguish between authentication factors that are verified against the blockchain and the ones verified locally (or against a centralized party). With this in mind, we define notions for $k-factor$ authentication against the blockchain and $k-factor$ authentication against the authentication factors. Based on these notions, we propose a classification of authentication schemes. We extend our classification to accommodate the threshold signatures and signing transactions by centralized parties (such as exchanges or co-signing services). Finally, we apply our classification to existing wallet solutions, which we compare based on various security and key-management features.
- J.-P. Buntinx, “Brain wallets are not secure and ‘no one should use them,’ says study,” 2016. [Online]. Available: https://news.bitcoin.com/brain-wallets-not-secure-no-one-use-says-study/
- N. Courtois, G. Song, and R. Castellucci, “Speed optimizations in bitcoin key recovery attacks,” Tatra Mountains Mathematical Publications, vol. 67(1), pp. 55–68, 2016.
- Binance, “Binance Security Breach Update,” 2019. [Online]. Available: https://binance.zendesk.com/hc/en-us/articles/360028031711-Binance-Security-Breach-Update
- CoinDesk, “Crypto Exchange BitMart Hacked With Losses Estimated at $196M,” 2021. [Online]. Available: https://www.coindesk.com/business/2021/12/05/crypto-exchange-bitmart-hacked-with-losses-estimated-at-196-million/
- ——, “The aftermath of Axie Infinitys ’$650M Ronin Bridge hack,” 2022. [Online]. Available: https://cointelegraph.com/news/the-aftermath-of-axie-infinity-s-650m-ronin-bridge-hack
- ——, “CoinEx hack: Compromised private keys led to $70M theft,” 2023. [Online]. Available: https://cointelegraph.com/news/coinex-compromised-private-keys-behind-70-million-hack
- Kraken, “Kraken Identifies Critical Flaw in Trezor Hardware Wallets,” 2019. [Online]. Available: https://blog.kraken.com/product/security/kraken-identifies-critical-flaw-in-trezor-hardware-wallets
- S. Eskandari, J. Clark, D. Barrera, and E. Stobert, “A first look at the usability of bitcoin key management,” preprint arXiv:1802.04351, 2018.
- S. Goldfeder, R. Gennaro, H. Kalodner, J. Bonneau, J. A. Kroll, E. W. Felten, and A. Narayanan, “Securing bitcoin wallets via a new dsa/ecdsa threshold signature scheme,” 2015.
- J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten, “Sok: Research perspectives and challenges for bitcoin and cryptocurrencies,” in S&P. IEEE, 2015, pp. 104–121.
- Y. Erinle, Y. Kethepalli, Y. Feng, and J. Xu, “Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets,” 2023.
- S. Houy, P. Schmid, and A. Bartel, “Security aspects of cryptocurrency wallets—a systematic literature review,” ACM Comput. Surv., vol. 56, no. 1, aug 2023. [Online]. Available: https://doi.org/10.1145/3596906
- S. Suratkar, M. Shirole, and S. Bhirud, “Cryptocurrency wallet: A review,” in 2020 4th international conference on computer, communication and signal processing (ICCCSP). IEEE, 2020, pp. 1–7.
- K. Karantias, “Sok: A taxonomy of cryptocurrency wallets,” Cryptology ePrint Archive, Paper 2020/868, 2020, https://eprint.iacr.org/2020/868. [Online]. Available: https://eprint.iacr.org/2020/868
- “Cryptocurrency-stealing malware landscape,” Dell SecureWorks, 2015. [Online]. Available: http://www.opensource.im/cryptocurrency/cryptocurrency-stealing-malware-landscape-dell-secureworks.php
- A. Peyton, “Cyren sounds siren over bitcoin siphon scam,” FinTech Futures, 2017. [Online]. Available: https://www.bankingtech.com/2017/01/cyren-sounds-siren-over-bitcoin-siphon-scam/
- Kraken, “Kraken Identifies Critical Flaw in Trezor Hardware Wallets,” 2020. [Online]. Available: https://blog.kraken.com/post/3662/kraken-identifies-critical-flaw-in-trezor-hardware-wallets/
- ——, “Inside Kraken Security Labs: Flaw Found in Keepkey Crypto Hardware Wallet,” 2019. [Online]. Available: https://blog.kraken.com/post/3245/flaw-found-in-keepkey-crypto-hardware-wallet/
- Donjon Team, “Extracting seed from Ellipal wallet,” 2019. [Online]. Available: https://donjon.ledger.com/Ellipal-Security/
- Ledger, “Ledger Nano,” 2018. [Online]. Available: https://www.ledgerwallet.com/products/1-ledger-nano
- T. Bui, S. P. Rao, M. Antikainen, V. M. Bojan, and T. Aura, “Man-in-the-machine: exploiting ill-secured communication inside the computer,” in 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, 2018, pp. 1511–1525.
- coinbase, “Coinbase,” 2020. [Online]. Available: https://www.coinbase.com/
- Binance.com, “Binance,” 2020. [Online]. Available: https://www.binance.com/
- Polo Digital Assets, Ltd., “Poloniex,” 2020. [Online]. Available: https://poloniex.com/
- Payward, Inc, “Kraken,” 2020. [Online]. Available: https://www.kraken.com/
- Luno, “Luno wallet,” 2019. [Online]. Available: https://www.luno.com/wallet/
- Paxful, Inc., “Paxful,” 2020. [Online]. Available: https://paxful.com/wallet
- W. Zhao, “Bithumb $31 Million Crypto Exchange Hack: What We Know (And Don’t),” 2018. [Online]. Available: https://www.coindesk.com/bithumb-exchanges-31-million-hack-know-dont-know/
- R. Abrams and N. Popper, “Trading Site Failure Stirs Ire and Hope for Bitcoin,” 2014. [Online]. Available: https://dealbook.nytimes.com/2014/02/25/trading-site-failure-stirs-ire-and-hope-for-bitcoin/
- Reuters, “Bitcoin Worth $72M Was Stolen in Bitfinex Exchange Hack in Hong Kong,” 2016. [Online]. Available: http://fortune.com/2016/08/03/bitcoin-stolen-bitfinex-hack-hong-kong/
- T. Moore and N. Christin, “Beware the middleman: Empirical analysis of bitcoin-exchange risk,” in International Conference on Financial Cryptography and Data Security. Springer, 2013, pp. 25–33.
- M. Vasek and T. Moore, “There’s no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams,” in Financial Cryptography. Springer, 2015, pp. 44–61.
- Mycelium LTD, “Mycelium wallet,” 2019. [Online]. Available: https://wallet.mycelium.com/
- CarbonWallet.com, “Multi Signature Online Cryptocurrency Wallet,” 2019. [Online]. Available: https://carbonwallet.com/
- Citowise Developments, “Citowise wallet,” 2019. [Online]. Available: https://citowise.com/wallet
- Coinomi Ltd, “Coinomi Wallet,” 2019. [Online]. Available: https://coinomi.com/
- Infinity Blockchain Labs Europe, “Infinito wallet,” 2019. [Online]. Available: https://www.infinitowallet.io/
- thirdweb, “Embedded Wallet,” 2024. [Online]. Available: https://thirdweb.com/dashboard/wallets/embedded
- Beam.eco, “Beam – Amazon Checkout,” 2024. [Online]. Available: https://beam.eco/shop
- Mycelium Holding LTD, “Mycelium Entropy,” 2019. [Online]. Available: https://mycelium.com/mycelium-entropy.html
- Zengo, “Zengo Wallet Security,” 2024. [Online]. Available: https://zengo.com/security
- Armory Technologies, Inc, “Bitcoin Armory,” 2016. [Online]. Available: https://www.bitcoinarmory.com
- Electrum Technologies GmbH, “Electrum Bitcoin wallet,” 2019. [Online]. Available: https://electrum.org/
- TrustedCoin, LLC, “TrustedCoin cosigning service,” 2019. [Online]. Available: https://trustedcoin.com
- Bitpay, “Bitpay Wallet (formerly Copay),” 2024. [Online]. Available: https://github.com/bitpay/wallet
- Unchained Capital, “TrezorMultisig2of3,” 2019. [Online]. Available: https://github.com/unchained-capital/ethereum-multisig
- P. Technologies, “Parity Wallet,” 2019. [Online]. Available: https://www.parity.io/
- ConsenSys, “Gnosis Wallet,” 2019. [Online]. Available: https://github.com/Gnosis/MultiSigWallet
- A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
- Bitcoin Project, “Bitcoin Core,” 2019. [Online]. Available: https://bitcoin.org/en/download
- MyEtherWallet, Inc, “MyEtherWallet,” 2019. [Online]. Available: https://www.myetherwallet.com/
- Andrew Chow, “Bitcoin Hardware Wallet Interface,” 2024. [Online]. Available: https://github.com/bitcoin-core/HWI
- Bitcoin Wallet developers, “Bitcoin Wallet,” 2019. [Online]. Available: https://github.com/bitcoin-wallet/bitcoin-wallet
- G. Maxwell, “Deterministic wallets,” 2011. [Online]. Available: https://bitcointalk.org/index.php?topic=19137
- Pieter Wuille, “BIP 0032 – Hierarchical deterministic wallets,” 2012. [Online]. Available: https://en.bitcoin.it/wiki/BIP_0032
- MetaMask team, “MetaMask,” 2019. [Online]. Available: https://metamask.io/
- Daedalus Team, “Daedalus Wallet,” 2019. [Online]. Available: https://daedaluswallet.io/
- M. Vasek, J. Bonneau, R. Castellucci, C. Keith, and T. Moore, “The bitcoin brain drain: Examining the use and abuse of bitcoin brain wallets,” in Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers 20. Springer, 2017, pp. 609–618.
- Trezor, “Trezor,” 2019. [Online]. Available: https://trezor.io/
- Ledger, “Ledger Nano S,” 2019. [Online]. Available: https://www.ledger.com/products/ledger-nano-s
- KeepKey, “The Simple Cryptocurrency Hardware Wallet,” 2019. [Online]. Available: https://www.keepkey.com/
- BitLox, “BitLox wallet,” 2019. [Online]. Available: https://www.bitlox.com
- ELLIPAL, “ELLIPAL Hardware Wallet 2.0,” 2019. [Online]. Available: https://www.ellipal.com/
- CoolBitX, “The CoolWallet S,” 2019. [Online]. Available: https://coolwallet.io/
- SHIFT Cryptosecurity, “BitBox hardware wallet,” 2019. [Online]. Available: https://shiftcrypto.ch/
- P. MacKenzie and M. Reiter, “Two-party Generation of DSA Signatures,” in Annual International Cryptology Conference. Springer, 2001, pp. 137–154.
- R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Secure distributed key generation for discrete-log based cryptosystems,” Journal of Cryptology, vol. 20, no. 1, pp. 51–83, 2007.
- G. R. Blakley et al., “Safeguarding cryptographic keys,” in Proceedings of the national computer conference, vol. 48, 1979, pp. 313–317.
- Parity Technologies, “The Multi-sig Hack: A Postmortem,” 2017. [Online]. Available: https://paritytech.io/the-multi-sig-hack-a-postmortem/
- ——, “A Postmortem on the Parity Multi-Sig Library Self-Destruct,” 2017. [Online]. Available: https://paritytech.io/a-postmortem-on-the-parity-multi-sig-library-self-destruct/
- Argent wallet, “Argent wallet,” 2024. [Online]. Available: https://www.argent.xyz/
- I. Homoliak, D. Breitenbacher, O. Hujnak, P. Hartel, A. Binder, and P. Szalachowski, “Smartotps: An air-gapped 2-factor authentication for smart-contract wallets,” in Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020, pp. 145–162.
- L. OKX, “Okx wallet,” 2017. [Online]. Available: https://www.okx.com/web3
- I. iFinex, “Bitfinex wallet,” 2013. [Online]. Available: https://www.bitfinex.com
- Bitcoin.com, “Bitcoin (BTC) Wallet,” 2024. [Online]. Available: https://wallet.bitcoin.com/bitcoin/
- Blockchain Luxembourg S.A., “Blockchain DeFi Wallet,” 2024. [Online]. Available: https://www.blockchain.com/en/wallet#keys
- Harmony, “Bitfinex wallet,” 2024. [Online]. Available: https://docs.harmony.one/home/general/ecosystem/wallets/1wallet
- M. Jones and D. Hardt, “The OAuth 2.0 Authorization Framework: Bearer Token Usage,” Internet Requests for Comments, RFC Editor, RFC 6750, October 2012. [Online]. Available: https://www.rfc-editor.org/rfc/rfc6750.html
- CoinJurnal, “Beam wallet brings Amazon and Shopify purchases to users,” 2024. [Online]. Available: https://coinjournal.net/news/beam-wallet-brings-amazon-and-shopify-purchases-to-users/
- M. Amy, O. Di Matteo, V. Gheorghiu, M. Mosca, A. Parent, and J. Schanck, “Estimating the cost of generic quantum pre-image attacks on sha-2 and sha-3,” in International Conference on Selected Areas in Cryptography. Springer, 2016, pp. 317–337.