Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Researchers

Research units

  • University of Helsinki

Abstract

Many cryptocurrency wallet applications on desktop provide an open remote procedure call (RPC) interface that other blockchain-based applications can use to access their functionality. This paper studies the security of the RPC interface in several cryptocurrency wallets. We find that, in many cases, a malicious process running on the computer regardless of its privileges can impersonate the communication endpoints of the RPC channel and, effectively, steal the funds in the wallet. The attacks are closely related to server and client impersonation on computer networks but occur inside the computer. The malicious process may be created by another authenticated but unprivileged user on the same computer or even by the guest user. The main contribution of this paper is to raise awareness among wallet developers about the need to protect local RPC channels with the same prudence as network connections. We also hope that it will discourage users to run security-critical applications like cryptocurrency wallets on shared systems or computers with guest account enabled.

Details

Original languageEnglish
Title of host publicationProceedings of the 12th European Workshop on Systems Security, EuroSec 2019
Publication statusPublished - 25 Mar 2019
MoE publication typeA4 Article in a conference publication
EventEuropean Workshop on Systems Security - Dresden, Germany
Duration: 25 Mar 201928 Mar 2019
Conference number: 12

Workshop

WorkshopEuropean Workshop on Systems Security
Abbreviated titleEuroSec
CountryGermany
CityDresden
Period25/03/201928/03/2019

    Research areas

  • Cryptocurrency Wallet, Remote Procedure Call (RPC)

Download statistics

No data available

ID: 33213599