Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets
Title | Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Davenport, Amanda, Shetty, Sachin |
Conference Name | 2019 IEEE International Smart Cities Conference (ISC2) |
Date Published | Oct. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-0846-9 |
Keywords | Air Gapped Storage, Air Gapped Wallet, Air gaps, air-gapped blockchain wallets, Atmospheric modeling, attack surface, Channel Exfiltration, composability, cryptocurrencies, Distributed databases, Electromagnetics, Human Behavior, human factors, key extraction, Malware, Markov based mathematical model, Markov model, Markov processes, Mathematical model, Media, Metrics, outline justification, permissioned blockchain, private key cryptography, private key leakage, Private Key Storage, pubcrawl, resilience, Resiliency, threat surface |
Abstract | In this paper we consider the threat surface and security of air gapped wallet schemes for permissioned blockchains as preparation for a Markov based mathematical model, and quantify the risk associated with private key leakage. We identify existing threats to the wallet scheme and existing work done to both attack and secure the scheme. We provide an overview the proposed model and outline justification for our methods. We follow with next steps in our remaining work and the overarching goals and motivation for our methods. |
URL | https://ieeexplore.ieee.org/document/9071725 |
DOI | 10.1109/ISC246665.2019.9071725 |
Citation Key | davenport_modeling_2019 |
- Markov based mathematical model
- threat surface
- Resiliency
- resilience
- pubcrawl
- Private Key Storage
- private key leakage
- private key cryptography
- permissioned blockchain
- outline justification
- Metrics
- Media
- Mathematical model
- Markov processes
- Markov model
- Air Gapped Storage
- malware
- key extraction
- Human Factors
- Human behavior
- Electromagnetics
- Distributed databases
- cryptocurrencies
- composability
- Channel Exfiltration
- attack surface
- Atmospheric modeling
- air-gapped blockchain wallets
- Air gaps
- Air Gapped Wallet