2021
DOI: 10.1007/978-3-662-63958-0_1
|View full text |Cite
|
Sign up to set email alerts
|

Risk Framework for Bitcoin Custody Operation with the Revault Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Shoulder surfing: Shoulder surfing describes the act of watching the victim type and using this information for ill-purposes. Swambo and Poinsot [83] outline the compromise of the key backup by observing. However, further variants, such as watching the authentication on the smartphone or wallet, are possible.…”
Section: Social Engineeringmentioning
confidence: 99%
See 3 more Smart Citations
“…Shoulder surfing: Shoulder surfing describes the act of watching the victim type and using this information for ill-purposes. Swambo and Poinsot [83] outline the compromise of the key backup by observing. However, further variants, such as watching the authentication on the smartphone or wallet, are possible.…”
Section: Social Engineeringmentioning
confidence: 99%
“…Hence, proper key management and algorithms are important [41,47,49]. Park et al [43] and Swambo and Poinsot [83] point out the risk of reconstructing the private key. AlFaw et al [67] state that digital signatures, hash function, mining malware, software flows, and user address vulnerabilities might be an issue, whereas Dabrowski et al [40] and Swambo and Poinsot [83] outline firmware, client software, and human-in-the-middle (MITM) of hardware wallets.…”
Section: Wallet Threatsmentioning
confidence: 99%
See 2 more Smart Citations