2019
DOI: 10.1007/978-3-030-36691-9_20
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Brute-Force Attacks on Cryptocurrency Wallets

Abstract: Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks. Using Bitcoin as an example, we demonstrate that if the attack is implemented successfully, a legitimate user is ab… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The Brute-Force algorithm is a straightforward problem-solving method where all possible solutions to a problem are tested individually, retaining only those that are close to the actual solution. Some well-known examples of its applications include the implementation of chess in artificial intelligence , and cryptography. , Such an algorithm was recently used in a DL-based force field parametrization framework for ReaxFF . Following this strategy, V m and Δ H vap /Δ H sub were predicted for 10 million LJ parameter sets generated stochastically within the specified range of parameters for the training set molecules.…”
Section: Resultsmentioning
confidence: 99%
“…The Brute-Force algorithm is a straightforward problem-solving method where all possible solutions to a problem are tested individually, retaining only those that are close to the actual solution. Some well-known examples of its applications include the implementation of chess in artificial intelligence , and cryptography. , Such an algorithm was recently used in a DL-based force field parametrization framework for ReaxFF . Following this strategy, V m and Δ H vap /Δ H sub were predicted for 10 million LJ parameter sets generated stochastically within the specified range of parameters for the training set molecules.…”
Section: Resultsmentioning
confidence: 99%
“…These interfaces require an API Key for authentication. However, if the API Key is leaked, it can cause significant losses to the user [32].…”
Section: Attacks Against Trading Platformsmentioning
confidence: 99%
“…Only [64] gave Intel software guard extensions (SGX) as the solution to mitigate endpoint vulnerabilities in the e-Health sector. Except for him, other researchers suggested mitigating it like Yli-Huumo et al [65] suggests BlueWallet, Brengel and Rossow [66] suggest knowledge awareness, Pal et al [67] suggests group key management (GKM) mechanism, Kiktenko et al [68] suggest two methods against brute force attack on private key etc. From Table 2, it is acknowledged that the endpoint was discussed only once in these respective survey studies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In their study, Patel et al [45] suggested using such private keys that are very hard to brute force [108]. Kiktenko et al [68] successfully considered the Brute Force attack on Private keys with a probability close to 1. They also suggested two methods for dealing with potential brute-force attacks.…”
Section: Public-private Keysmentioning
confidence: 99%