skip to main content
10.1145/3031836.3031841acmotherconferencesArticle/Chapter ViewAbstractPublication Pagescs2Conference Proceedingsconference-collections
short-paper

TrustZone-backed bitcoin wallet

Published: 24 January 2017 Publication History

Abstract

With the increasing popularity of virtual currencies, it has become more important to have highly secure devices in which to store private-key information. Furthermore, ARM has made available an extension of processors architectures, designated TrustZone, which allows for the separation of trusted and non-trusted environments, while ensuring the integrity of the OS code. In this paper, we propose the exploitation of this technology to implement a flexible and reliable bitcoin wallet that is more resilient to dictionary and side-channel attacks. Making use of the TrustZone comes with the downside that writing and reading operations become slower, due to the encrypted storage, but we show that cryptographic operations can in fact be executed more efficiently as a result of platform-specific optimizations.

References

[1]
ARM. Juno ARM Development Platform. "http://www.arm.com/products/tools/development-boards/versatile-express/juno-arm-development-platform.php,". {Online} (Accessed in Sep 25, 2016).
[2]
ARM. Building a Secure System using TrustZone Technology. ARM white paper, page 108, 2009.
[3]
Bitcoin.org. Securing your wallet. "https://bitcoin.org/en/secure-your-wallet#hardwarewallet", 2016. {Online} (Accessed in Sep 22, 2016).
[4]
C. Chua. hardware-bitcoin-wallet: BitSafe Firmware. "https://github.com/someone42/hardware-bitcoin-wallet". {Online} (Accessed in Aug 21, 2016).
[5]
P. Ciaian, M. Rajcaniova, and D. Kancs. The economics of BitCoin price formation. Applied Economics, 48(19):1799--1815, 2016.
[6]
GlobalPlatform. GlobalPlatform Specifications. "http://www.globalplatform.org/specificationsdevice.asp". {Online} (Accessed in Aug 30, 2016).
[7]
Ledger. Ledger Trustlet - Android Google Play. "https://play.google.com/store/apps/details?id=com.ledger.wallet.bootstrap,", 2016. {Online} (Accessed in Sep 8, 2016).
[8]
Linaro. OP-TEE: Open Source Trusted Execution Environment. "https://www.op-tee.org/,". {Online} (Accessed in Sep 26, 2016).
[9]
Linaro. HKG15-311: OP-TEE for Beginners and Porting Review. "http://slideshare.net/linaroorg/hkg15311-optee-for-beginners-and-porting-review,", 2015. {Online} (Accessed in Sep 27, 2016).
[10]
Rivetz. Rivetz Preview Program. "https://rivetz.com/docs/getstarted.html#Rivetz_Preview_Program". {Online} (Accessed in Aug 31, 2016).
[11]
L. W. Security. Secure Storage In OP-TEE. "https://github.com/OP-TEE/optee_os/blob/master/documentation/secure_storage.md,", 2016. {Online} (Accessed in Sep 28, 2016).
[12]
Trustonic. Rivetz Teams with Trustonic to Secure Mobile Bitcoin Wallets. "https://www.trustonic.com/news-events/pr/rivetz-trustonic-bitcoin-wallets", 2014. {Online} (Accessed in Aug 21, 2016).
[13]
J. Young. Ledger Transforms Smartphones into Hardware Wallets. "https://cointelegraph.com/news/ledger-transforms-smartphones-into-hardware-wallets", 2016. {Online} (Accessed in Aug 21, 2016).

Cited By

View all
  • (2024)Exploring Security in Cryptocurrency: Challenges, Solutions, and Implications – A Systematic Literature Review2024 International Conference on ICT for Smart Society (ICISS)10.1109/ICISS62896.2024.10751129(1-9)Online publication date: 4-Sep-2024
  • (2024)Pragmatic Analysis of Key Management for Cryptocurrency Custodians2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)10.1109/ICBC59979.2024.10634356(747-765)Online publication date: 27-May-2024
  • (2024)A taxonomy of endpoint vulnerabilities and affected blockchain architecture layersConcurrency and Computation: Practice and Experience10.1002/cpe.815836:19Online publication date: 29-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CS2 '17: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
January 2017
39 pages
ISBN:9781450348690
DOI:10.1145/3031836
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 January 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. TrustZone
  2. bitcoin
  3. hardware wallet

Qualifiers

  • Short-paper

Conference

CS2 '17

Acceptance Rates

CS2 '17 Paper Acceptance Rate 4 of 11 submissions, 36%;
Overall Acceptance Rate 27 of 91 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring Security in Cryptocurrency: Challenges, Solutions, and Implications – A Systematic Literature Review2024 International Conference on ICT for Smart Society (ICISS)10.1109/ICISS62896.2024.10751129(1-9)Online publication date: 4-Sep-2024
  • (2024)Pragmatic Analysis of Key Management for Cryptocurrency Custodians2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)10.1109/ICBC59979.2024.10634356(747-765)Online publication date: 27-May-2024
  • (2024)A taxonomy of endpoint vulnerabilities and affected blockchain architecture layersConcurrency and Computation: Practice and Experience10.1002/cpe.815836:19Online publication date: 29-May-2024
  • (2023)Survey on Blockchain Cryptocurrency WalletInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-8910(722-726)Online publication date: 29-Mar-2023
  • (2023)Digital Assets and the Tokenization of EverythingAdvancements in the New World of Web 310.4018/978-1-6684-6658-2.ch006(102-122)Online publication date: 7-Jul-2023
  • (2023)TZEAMMSecurity and Communication Networks10.1155/2023/69219602023Online publication date: 31-Jan-2023
  • (2023)Security Aspects of Cryptocurrency Wallets—A Systematic Literature ReviewACM Computing Surveys10.1145/359690656:1(1-31)Online publication date: 28-Aug-2023
  • (2023)Smaug: A TEE-Assisted Secured SQLite for Embedded SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321602020:5(3617-3635)Online publication date: 1-Sep-2023
  • (2022)Cryptocurrency Wallets: Assessment and SecurityBlockchain for Cybersecurity in Cyber-Physical Systems10.1007/978-3-031-25506-9_1(1-19)Online publication date: 30-Dec-2022
  • (2022)HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPMFoundations and Practice of Security10.1007/978-3-031-08147-7_9(130-145)Online publication date: 15-Jun-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media