VELLET: Verifiable Embedded Wallet for Securing Authenticity and Integrity (2404.03874v1)
Abstract: The blockchain ecosystem, particularly with the rise of Web3 and Non-Fungible Tokens (NFTs), has experienced a significant increase in users and applications. However, this expansion is challenged by the need to connect early adopters with a wider user base. A notable difficulty in this process is the complex interfaces of blockchain wallets, which can be daunting for those familiar with traditional payment methods. To address this issue, the category of "embedded wallets" has emerged as a promising solution. These wallets are seamlessly integrated into the front-end of decentralized applications (Dapps), simplifying the onboarding process for users and making access more widely available. However, our insights indicate that this simplification introduces a trade-off between ease of use and security. Embedded wallets lack transparency and auditability, leading to obscured transactions by the front end and a pronounced risk of fraud and phishing attacks. This paper proposes a new protocol to enhance the security of embedded wallets. Our VELLET protocol introduces a wallet verifier that can match the audit trail of embedded wallets on smart contracts, incorporating a process to verify authenticity and integrity. In the implementation architecture of the VELLET protocol, we suggest using the Text Record feature of the Ethereum Name Service (ENS), known as a decentralized domain name service, to serve as a repository for managing the audit trails of smart contracts. This approach has been demonstrated to reduce the necessity for new smart contract development and operational costs, proving cost-effective through a proof-of-concept. This protocol is a vital step in reducing security risks associated with embedded wallets, ensuring their convenience does not undermine user security and trust.
- Triple-A, “Cryptocurrency ownership data,” accessed: 2023-11-23. [Online]. Available: https://triple-a.io/crypto-ownership-data/
- DappRadar, “Dapps Industry Overview,” accessed: 2023-12-03. [Online]. Available: https://dappradar.com/industry-overview
- MetaMask, “The crypto wallet for defi, web3 dapps and nfts,” accessed: 2023-11-23. [Online]. Available: https://metamask.io/
- M. Fröhlich, F. Waltenberger, L. Trotter, F. Alt, and A. Schmidt, “Blockchain and cryptocurrency in human computer interaction: A systematic literature review and research agenda,” in Proceedings of the 2022 ACM Designing Interactive Systems Conference (DIS ’22), 2022, pp. 155–177.
- A. Voskobojnikov, O. Wiese, M. M. Koushki, V. Roth, and K. Beznosov, “The U in crypto stands for usable: An empirical study of user experience with mobile cryptocurrency wallets,” in Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (CHI ’21), 2021, pp. 1–14.
- O. Ohayon, “Personal wallets vs. embedded wallets: Who wins in crypto?” March 2023, accessed: 2023-11-23. [Online]. Available: https://zengo.com/personal-wallets-vs-embedded-wallets-who-wins/
- Thirdweb, “Embedded wallets - overview,” accessed: 2023-11-23. [Online]. Available: https://portal.thirdweb.com/embedded-wallet
- Privy, “Embedded wallets documentation,” accessed: 2023-11-23. [Online]. Available: https://docs.privy.io/guide/frontend/embedded/overview
- Dynamic, “Overview of embedded wallets,” 2023, accessed: 2023-11-23. [Online]. Available: https://docs.dynamic.xyz/embedded-wallets/overview
- R. Moore, “ENSIP-5: Text Records,” May 2017, ENS Improvement Proposals, no. 5. [Online]. Available: https://docs.ens.domains/ens-improvement-proposals/ensip-5-text-records
- ENS, “Ethereum name service: Decentralised naming for wallets, websites, & more,” accessed: 2023-11-23. [Online]. Available: https://ens.domains
- Y. Erinle, Y. Kethepalli, Y. Feng, and J. Xu, “Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets,” 2023, arXiv:2307.12874.
- Argent, “Argent – the best ethereum wallet for defi and nfts,” 2023, accessed: 2023-11-23. [Online]. Available: https://www.argent.xyz/
- Trust Wallet, “Best crypto wallet for web3, nfts and defi,” accessed: 2023-11-23. [Online]. Available: https://trustwallet.com/
- Coinbase, “Waas - coinbase cloud,” accessed: 2023-11-23. [Online]. Available: https://www.coinbase.com/cloud/products/waas
- Circle, “Programmable wallets — wallet as a service,” accessed: 2023-11-23. [Online]. Available: https://www.circle.com/en/programmable-wallets
- Chainalysis, “The Chainalysis 2023 Crypto Crime Report,” 2023, accessed: 2023-11-23. [Online]. Available: https://go.chainalysis.com/2023-crypto-crime-report.html
- A. A. Andryukhin, “Phishing attacks and preventions in blockchain based projects,” in 2019 International Conference on Engineering Technologies and Computer Science (EnT), Moscow, Russia, 2019, pp. 15–19.
- J. Yang, J. Liu, and J. Wu, “With trail to follow: Measurements of real-world non-fungible token phishing attacks on ethereum,” 2023, arXiv:2307.01579.
- Trust Wallet Community, “How to spot a phishing attack & protect your crypto,” 2023, accessed: 2023-11-23. [Online]. Available: https://community.trustwallet.com/t/how-to-spot-a-phishing-attack-protect-your-crypto/753663
- MetaMask Support, “How to turn on blockaid security alerts,” accessed: 2023-11-23. [Online]. Available: https://support.metamask.io/hc/en-us/articles/19878220833947-How-to-turn-on-Blockaid-security-alerts
- Trust Wallet Community, “Introducing the trust wallet security scanner: Making crypto & web3 safer for everyone,” 2022, accessed: 2023-11-23. [Online]. Available: https://community.trustwallet.com/t/introducing-the-trust-wallet-security-scanner-making-crypto-web3-safer-for-everyone/643056
- D. E. Eastlake 3rd, “Domain Name System Security Extensions,” RFC 2535, Mar. 1999. [Online]. Available: https://www.rfc-editor.org/info/rfc2535
- D. Cooper, A. Regenscheid, M. Souppaya, C. Bean, M. Boyle, D. Cooley, and M. Jenkins, “Security considerations for code signing,” NIST Cybersecurity White Paper, 2018. [Online]. Available: https://doi.org/10.6028/NIST.CSWP.01262018
- Microsoft, “Driver signing - windows drivers,” https://learn.microsoft.com/en-us/windows-hardware/drivers/install/ driver-signing, May 2023, accessed: 2023-11-23.
- Apple, “About code signing,” https://developer.apple.com/library/archive/ documentation/Security/Conceptual/CodeSigningGuide, September 2016, accessed: 2023-11-23.
- Google for Developers, “Sign your app - android studio,” https://developer.android.com/studio/publish/app-signing, 2023, accessed: 2023-11-23.
- CertiK, “Web3 security leaderboard,” accessed: 2023-11-27. [Online]. Available: https://www.certik.com/
- Hacken, “Blockchain security services company - web3, crypto, defi,” accessed: 2023-11-27. [Online]. Available: https://hacken.io/
- E. G. Weyl, P. Ohlhaver, and V. Buterin, “Decentralized society: Finding web3’s soul,” 2022, available at SSRN. [Online]. Available: https://ssrn.com/abstract=4105763
- T. Daubenschütz and Anders, “ERC-5192: Minimal Soulbound NFTs,” July 2022, Ethereum Improvement Proposals, no. 5192. [Online]. Available: https://eips.ethereum.org/EIPS/eip-5192
- J. E. William Entriken, Dieter Shirley and N. Sachs, “ERC-721: Non-Fungible Token Standard,” Jan 2018, Ethereum Improvement Proposals, no. 721. [Online]. Available: https://eips.ethereum.org/EIPS/eip-721
- Infura, “Web3 development platform — ipfs api & gateway — blockchain node service,” 2023, accessed: 2023-11-23. [Online]. Available: https://www.infura.io/
- Q. Wang, R. Li, Q. Wang, S. Chen, M. Ryan, and T. Hardjono, “Exploring web3 from the view of blockchain,” 2022, arXiv:2206.08821.
- W. Chen, X. Guo, Z. Chen, Z. Zheng, and Y. Lu, “Phishing scam detection on ethereum: Towards financial security for blockchain ecosystem.” in IJCAI, vol. 7, 2020, pp. 4456–4462.
- J. Wu, Q. Yuan, D. Lin, W. You, W. Chen, C. Chen, and Z. Zheng, “Who are the phishers? phishing scam detection on ethereum via network embedding,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 2, pp. 1156–1166, 2020.
- S. Li, R. Wang, H. Wu, S. Zhong, and F. Xu, “Siege: Self-supervised incremental deep graph learning for ethereum phishing scam detection,” in Proceedings of the 31st ACM International Conference on Multimedia, 2023, pp. 8881–8890.
- S. S. Roy, D. Das, P. Bose, C. Kruegel, G. Vigna, and S. Nilizadeh, “Unveiling the risks of nft promotion scams,” 2023, arXiv:2301.09806.
- P. Chatzigiannis, F. Baldimtsi, and K. Chalkias, “Sok: Auditability and accountability in distributed payment systems,” in International Conference on Applied Cryptography and Network Security. Springer, 2021, pp. 311–337.
- S. Chaliasos, M. A. Charalambous, L. Zhou, R. Galanopoulou, A. Gervais, D. Mitropoulos, and B. Livshits, “Smart contract and defi security: Insights from tool evaluations and practitioner surveys,” 2023, arXiv:2304.02981.
- MetaMask, “Security bug bounties,” accessed: 2023-11-27. [Online]. Available: https://metamask.io/security/