References
- Github, "nexus-wallet," https://github.com/tyrannojung/nexus-wallet/tree/main/results, Aug. 2024.
- erc4337, "ERC-4337, UserOperation," https://www.erc4337.io/docs/understanding-ERC-4337/user-operation Jul. 2024.
- NIST, "Digital signature standard," https://csrc.nist.gov/pubs/fips/186-5/final, Jun. 2024.
- FIDO2 Alliance, "FIDO2: WebAuthn & CTAP," https://fidoalliance.org/fido2/, May 2024.
- Y. Yu, T. Sharma, S. Das, and Y. Wang, "Don't put all your eggs in one basket: How cryptocurrency users choose and secure their wallets," Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems, pp. 1-17, May 2024.
- Ethereum, "Ethereum accounts," https://ethereum.org/en/developers/docs/accounts/, Apr. 2024.
- ETHGlobal, "Opclave - ERC4337 and Apple Sign," https://ethglobal.com/showcase/opclave-opstack-impr-erc4337-and-apple-sign-94def, Mar. 2024.
- P. Xia, Y. Guo, Z. Lin, J. Wu, P. Duan, N. He, K. Wang, T. Liu, Y. Yue, and G. Xu, "WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets," Automated Software Engineering, vol. 31, article no. 32, Mar. 2024.
- United Nations Security Council, "Final report of the Panel of Experts submitted pursuant to resolution 2680," United Nations, Mar 2024.
- Android, "Hardware-backed Keystore" https://source.android.com/security/keystore, Mar. 2024.
- Apple, "Secure Enclave," https://support.apple.com/ko-kr/guide/security/sec59b0b31ff/1/web/, Feb. 2024.
- Q. Wang and S. Chen, "Account abstraction, analysed," in Proceedings of the 2023 IEEE International Conference on Blockchain, pp. 323-331, Dec. 2023.
- V. Buterin, Y. Weiss, D. Tirosh, S. Nacson, A. Forshtat, K. Gazso, and T. K. Stanczak, "ERC-4337: Account abstraction using alt mempool," EIP-4337, Ethereum Improvement Proposals, Sep. 2023.
- S. Houy, P. Schmid, and A. Bartel, "Security aspects of cryptocurrency wallets-A systematic literature review," ACM Computing Surveys, vol. 56, no. 1, pp. 1-31, Aug. 2023.
- A. K. Singh, I. U. Hassan, G. Kaur, and S. Kumar, "Account abstraction via singleton entrypoint contract and verifying paymaster," in Proceedings of the 2023 2nd International Conference on Edge Computing and Applications, pp. 1598-1603, Jul. 2023.
- K. Chalkias, P. Chatzigiannis, and Y. Ji, "Broken proofs of solvency in blockchain custodial wallets and exchanges," in Financial Cryptography and Data Security, FC 2022 International Workshops, LNCS 13412, pp. 106-117, Jul. 2023.
- R. Dubois, "Speeding up elliptic computations for Ethereum Account Abstraction," Cryptology ePrint Archive, Jun. 2023.
- T. Barbereau and B. Bodo, "Beyond financial regulation of crypto-asset wallet software: In search of secondary liability," Computer Law & Security Review, vol. 49, article no. 105829, May 2023.
- L. Schrempp, "Formal verification of fido2 with human interaction," Master's thesis, Swiss Federal Institute of Technology (ETH) Zurich, Apr. 2023.
- J. Choi, K. Jeon, J. Lee, J. Sim, and M. Kim, "CryptoPad: dedicated device for convenient and secure wallet," in Proceedings of the Conference, Venice, Italy, pp. 59-62, Apr. 2023.
- S. C. Sethuraman, A. Mitra, K.-C. Li, A. Ghosh, M. Gopinath, and N. Sukhija, "Loki: A physical security key compatible IoT based lock for protecting physical assets," IEEE Access, vol. 10, pp. 112721-112730, Nov. 2022.
- A.J. Levitin, "Not your keys, not your coins: Unpriced credit risk in crypto-currency," Texas Law Review, vol. 101, Aug. 2022.
- M. Tran, S. Amft, and D. Wermke, "Poster: User awareness of phishing and WebAuthn," in Proceedings of the 43rd IEEE Symposium on Security and Privacy, May 2022.
- FIDO Alliance, "Client to Authenticat or Protocol (CTAP)," https://fidoalliance.org/specs/fido-v2.1-ps-20210615/fido-client-to-authenticator-protocol-v2.1-ps-20210615.html, Jun. 2021.
- W3C, "Web Authentication: An API for accessing Public Key Credentials Level 2," https://www.w3.org/TR/webauthn-2/, W3C Recommendation, Apr. 2021.
- K. Owens, O. Anise, A. Krauss, and B. Ur, "User perceptions of the usability and security of smartphones as FIDO2 roaming authenticators," in Proceedings of the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), pp. 57-76, Aug. 2021.
- A. Voskobojnikov, O. Wiese, M.M. Koushki, V. Roth, and K. Beznosov, "The U in crypto stands for usable: An empirical study of user experience with mobile cryptocurrency wallets," in Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1-14, May 2021.
- C. Li, D. He, S. Li, S. Zhu, S. Chan, and Y. Cheng, "Android-based cryptocurrency wallets: Attacks and countermeasures," Proceedings of the IEEE International Conference on Blockchain, pp. 9-16, Dec. 2020.
- S. G. Lyastani, M. Schilling, M. Neumayr, M. Backes, and S. Bugiel, "Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication," Proceedings of the 2020 IEEE Symposium on Security and Privacy, pp. 268-285, May 2020.
- R. Phillips and H. Wilder, "Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites," Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, pp.1-8, May 2020.
- R. Zhang, R. Xue, and L. Liu, "Security and privacy on blockchain," ACM Computing Surveys, vol. 52, no.3, Jul. 2019.
- P. Praitheeshan, Y. W. Xin, L. Pan,and R. Doss, "Attainable hacks on keystore files in ethereum wallets-a systematic analysis," Communications in Computer and Information Science, vol. 1113, pp. 99-117, Oct. 2019.
- A. M. Antonopoulos and G. Wood, Mastering Ethereum: Building Smart Contracts and DApps, O'Reilly Media, Dec. 2018.
- T. Haigh, F. Breitinger, and I. Baggili, "If i had a million cryptos: Cryptowallet application analysis and a trojan proof-of-concept," International Conference on Digital Forensics and Cyber Crime, pp. 45-65, Dec. 2018.
- A. Al-Shaikh and A. Sleit, "Evaluating IndexedDB performance on web browsers," Proceedings of the 8th International Conference on Information Technology, pp. 488-494, May 2017.
- M. Gentilal, P. Martins, and L. Sousa, "TrustZone-backed Bitcoin wallet," Proceedings of the 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp. 1-6, Jan. 2017.
- A.G. Malvik and B. Witzoee, "Elliptic curve digital signature algorithm and its applications in Bitcoin," pp. 1-5, Dec. 2016.
- A. Gollamudi and S. Chong, "Automatic enforcement of expressive security policies using enclaves," Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 494-513, Oct. 2016.
- G. Wood, "DApps: What Web 3.0 Looks Like", https://gavwood.com/dappsweb3.html, Apr. 2014.
- A.M. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies, O'Reilly Media, Dec. 2014.
- J.E. Ekberg, K. Kostiainen, and N. Asokan, "The untapped potential of trusted execution environments on mobile devices," IEEE Security & Privacy, vol. 12, pp. 29-37, Aug. 2014.
- D. R. L. Brown, "SEC 2: Recommended elliptic curve domain parameters," JMI, vol. 2, no. 3, pp. 75-83, May 2010.
- N. Jansma and B. Arrendondo, "Performance comparison of elliptic curve and RSA digital signatures," Technical Report, University of Michigan, Apr. 2004.