Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures.
Yiwen HuSihan WangGuan-Hua TuLi XiaoTian XieXinyu LeiChi-Yu LiPublished in: CODASPY (2021)
Keyphrases
- countermeasures
- security threats
- information security
- security issues
- security mechanisms
- security risks
- security measures
- sensitive data
- smart card
- computer security
- information systems
- denial of service attacks
- intrusion detection
- security requirements
- java card
- power analysis
- key management
- network security
- security management
- e government
- cyber attacks
- resource constrained
- lightweight
- distributed systems
- data sources