×
This paper studies the security of the RPC interface in several cryptocurrency wallets. We find that, in many cases, a malicious process running on the computer regardless of its privileges can impersonate the communication endpoints of the RPC channel and, effectively, steal the funds in the wallet.
25 Mar 2019 · This paper studies the security of the RPC interface in several cryptocurrency wallets. We find that, in many cases, a malicious process running ...
This paper studies the security of the RPC interface in several cryptocurrency wallets. We find that, in many cases, a malicious process running on the computer ...
People also ask
Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet ; 6 · New York · ACM · 2019 · 978-1-4503-6274-0.
Dive into the research topics of 'Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet'. Together they form a unique fingerprint.
Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet. T Bui, SP Rao, M Antikainen, T Aura. Proceedings of the 12th European ...
This research aims to comprehensively explore the security aspects of cryptocurrency wallets, providing a taxonomy of wallet types, analyzes their design ...
Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet ... can use to access their functionality. This paper studies the security of ...
4 Aug 2023 · Aura, “Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet,” in ... niques specific to cryptocurrency scams,” Open ...
Zerocash: decentralized anonymous payments from bitcoin. BuiT. et al. Pitfalls of open architecture: how friends can exploit your cryptocurrency wallet. DongP ...