Security aspects of cryptocurrency wallets—a systematic literature review

S Houy, P Schmid, A Bartel - ACM Computing Surveys, 2023 - dl.acm.org
Cryptocurrencies are gaining prominence among individuals and companies alike, resulting
in the growing adoption of so-called cryptocurrency wallet applications, as these simplify …

Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey

D Pöhn, M Grabatin, W Hommel - Applied Sciences, 2023 - mdpi.com
Self-sovereign identity (SSI) is a digital identity management model managed in a
decentralized manner. It allows identity owners to manage and store their digital identities in …

Blockchain technology and related security risks: Towards a seven-layer perspective and taxonomy

S Mollajafari, K Bechkoum - Sustainability, 2023 - mdpi.com
Blockchain technology can be a useful tool to address issues related to sustainability. From
its initial foundation based on cryptocurrency to the development of smart contracts …

An ensemble learning method for Bitcoin price prediction based on volatility indicators and trend

A Bâra, SV Oprea - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
Predicting the price of Bitcoin poses a challenge for researchers, merchants, traders and
investors alike. This paper delves into the analysis of a Bitcoin price and volume dataset …

SoK: Design, vulnerabilities and defense of cryptocurrency wallets

Y Erinle, Y Kethepalli, Y Feng, J Xu - arXiv preprint arXiv:2307.12874, 2023 - arxiv.org
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …

Horus: A security assessment framework for android crypto wallets

MS Uddin, M Mannan, A Youssef - … 2021, Virtual Event, September 6–9 …, 2021 - Springer
Crypto wallet apps help cryptocurrency users to create, store, and manage keys, sign
transactions and keep track of funds. However, if these apps are not adequately protected …

Perceptions of distributed ledger technology key management-an interview study with finance professionals

C Guthoff, S Anell, J Hainzinger… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Key management is an integral part of using distributed ledger technology (DLT). Previous
work has primarily focused on key management for single-user scenarios on Bitcoin. Over …

Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems

D Pöhn, W Hommel - Security and Communication Networks, 2023 - Wiley Online Library
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …

An empirical analysis of security and privacy risks in android cryptocurrency wallet apps

IWB Sentana, M Ikram, MA Kaafar - International Conference on Applied …, 2023 - Springer
A cryptocurrency wallet app is a piece of software that manages, stores, and generates
private keys of cryptocurrency accounts. With the provision of services such as easy access …

WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets

P Xia, Y Guo, Z Lin, J Wu, P Duan, N He… - Automated Software …, 2024 - Springer
Cryptocurrency wallets, acting as fundamental infrastructure to the blockchain ecosystem,
have seen significant user growth, particularly among browser-based wallets (ie, browser …