{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:50Z","timestamp":1775912810633,"version":"3.50.1"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030900212","type":"print"},{"value":"9783030900229","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90022-9_7","type":"book-chapter","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T08:06:08Z","timestamp":1635926768000},"page":"120-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Horus: A Security Assessment Framework for Android Crypto Wallets"],"prefix":"10.1007","author":[{"given":"Md Shahab","family":"Uddin","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Aiolli, F., Conti, M., Gangwal, A., Polato, M.: Mind your wallet\u2019s privacy: identifying Bitcoin wallet apps and user\u2019s actions through network traffic analysis. In: 34th ACM\/SIGAPP Symposium on Applied Computing, pp. 1484\u20131491 (2019)","DOI":"10.1145\/3297280.3297430"},{"key":"7_CR2","unstructured":"Android Developers: Auto backup data. https:\/\/developer.android.com\/guide\/topics\/data\/autobackup"},{"key":"7_CR3","unstructured":"Android Developers: Dangerous permissions. https:\/\/developer.android.com\/reference\/android\/Manifest.permission"},{"key":"7_CR4","unstructured":"Android Developers: HSM. https:\/\/developer.android.com\/training\/articles\/keystore"},{"key":"7_CR5","unstructured":"Android Developers: Input. https:\/\/developer.android.com\/guide\/topics\/text\/creating-input-method.html"},{"key":"7_CR6","unstructured":"Android Developers: Network security. https:\/\/developer.android.com\/training\/articles\/security-config"},{"key":"7_CR7","unstructured":"Android Developers: SecureRandom. https:\/\/developer.android.com\/reference\/java\/security\/SecureRandom"},{"key":"7_CR8","unstructured":"Android Developers: Shrink, obfuscate, and optimize your app. https:\/\/developer.android.com\/studio\/build\/shrink-code#obfuscate"},{"key":"7_CR9","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin. O\u2019Reilly Media, Inc., March 2021"},{"key":"7_CR10","unstructured":"Bankhead, P.: Android developers blog: Improving discovery of apps and games on the Play Store. https:\/\/android-developers.googleblog.com\/2018\/06\/improving-discovery-of-quality-apps-and.html"},{"issue":"5","key":"7_CR11","first-page":"220","volume":"29","author":"F Bergadano","year":"2020","unstructured":"Bergadano, F., Boetti, M., Cogno, F., Costamagna, V., Leone, M., Evangelisti, M.: A modular framework for mobile security analysis. Inf. Secur. J. 29(5), 220\u2013243 (2020)","journal-title":"Inf. Secur. J."},{"key":"7_CR12","unstructured":"Bitcoin: BIPS: Bitcoin Improvement Proposals. https:\/\/github.com\/bitcoin\/bips"},{"key":"7_CR13","unstructured":"Bitcoin: Transactions. https:\/\/www.bitcoin.com\/get-started\/how-bitcoin-transactions-work"},{"key":"7_CR14","unstructured":"Brubaker, C.: Android developers blog: Changes to trusted certificate authorities in Android Nougat. https:\/\/android-developers.googleblog.com\/2016\/07\/changes-to-trusted-certificate.html"},{"key":"7_CR15","unstructured":"Cimpanu, C.: Bitcoin wallet update trick has netted criminals more than \\$22m | ZDNet. https:\/\/www.zdnet.com\/article\/bitcoin-wallet-trick-has-netted-criminals-more-than-22-million\/"},{"key":"7_CR16","unstructured":"Cimpanu, C.: Hacker group has stolen more than \\$200m. https:\/\/www.zdnet.com\/article\/cryptocore-hacker-group-has-stolen-more-than-200m-from-cryptocurrency-exchanges\/"},{"key":"7_CR17","unstructured":"NVD - CVE-2020-0096. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-0096"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Diao, W., Liu, X., Zhou, Z., Zhang, K., Li, Z.: Mind-reading: Privacy attacks exploiting cross-app keyevent injections. In: European Symposium on Research in Computer Security, pp. 20\u201339. Springer (2015)","DOI":"10.1007\/978-3-319-24177-7_2"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Druffel, A., Heid, K.: Davinci: Android app analysis beyond Frida via dynamic system call instrumentation. In: International Conference on Applied Cryptography and Network Security, pp. 473\u2013489. Springer (2020)","DOI":"10.1007\/978-3-030-61638-0_26"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Fernandes, E., et al.: Android UI deception revisited: Attacks and defenses. In: International Conference on Financial Cryptography and Data Security. pp. 41\u201359. Springer (2016)","DOI":"10.1007\/978-3-662-54970-4_3"},{"key":"7_CR21","unstructured":"ForensicFocus.com: Forensics and Bitcoin. https:\/\/www.forensicfocus.com\/articles\/forensics-bitcoin\/"},{"key":"7_CR22","unstructured":"Gasparis, I., Qian, Z., Song, C., Krishnamurthy, S.V.: Detecting Android root exploits by learning from root providers. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 1129\u20131144 (2017)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Guri, M.: Beatcoin: leaking private keys from air-gapped cryptocurrency wallets. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1308\u20131316. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00227"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Gutoski, G., Stebila, D.: Hierarchical deterministic Bitcoin wallets that tolerate key leakage. In: International Conference on Financial Cryptography and Data Security. pp. 497\u2013504. Springer (2015)","DOI":"10.1007\/978-3-662-47854-7_31"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Haigh, T., Breitinger, F., Baggili, I.: If I had a million cryptos: Cryptowallet application analysis and a trojan proof-of-concept. In: International Conference on Digital Forensics and Cyber Crime. pp. 45\u201365. Springer (2018)","DOI":"10.1007\/978-3-030-05487-8_3"},{"issue":"6","key":"7_CR26","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MNET.011.2000025","volume":"34","author":"D He","year":"2020","unstructured":"He, D., Li, S., Li, C., Zhu, S., Chan, S., Min, W., Guizani, N.: Security analysis of cryptocurrency wallets in Android-based applications. IEEE Network 34(6), 114\u2013119 (2020)","journal-title":"IEEE Network"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Hu, Y., et al.: Security threats from Bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures. In: Eleventh ACM Conference on Data and Application Security and Privacy (CODASPY 2021), pp. 89\u2013100 (2021)","DOI":"10.1145\/3422337.3447832"},{"key":"7_CR28","unstructured":"Kachakil, D.: Discovering and exploiting a vulnerability in Android\u2019s personal dictionary. https:\/\/ioactive.com\/discovering-and-exploiting-a-vulnerability-in-androids-personal-dictionary\/"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Kim, T., Ha, H., Choi, S., Jung, J., Chun, B.G.: Breaking ad-hoc runtime integrity protection mechanisms in Android financial apps. In: 2017 ACM on Asia Conference on Computer and Communications Security. pp. 179\u2013192 (2017)","DOI":"10.1145\/3052973.3053018"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Koerhuis, W., Kechadi, T., Le-Khac, N.A.: Forensic analysis of privacy-oriented cryptocurrencies. Forensic Science International: Digital Investigation 33, 200891 (2020)","DOI":"10.1016\/j.fsidi.2019.200891"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Li, C., He, D., Li, S., Zhu, S., Chan, S., Cheng, Y.: Android-based cryptocurrency wallets: Attacks and countermeasures. In: 2020 IEEE International Conference on Blockchain (Blockchain). pp. 9\u201316. IEEE (2020)","DOI":"10.1109\/Blockchain50366.2020.00010"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Ling, Z., et al.: Privacy enhancing keyboard: Design, implementation, and usability testing. Wireless Communications and Mobile Computing 2017 (2017)","DOI":"10.1155\/2017\/3928261"},{"key":"7_CR33","unstructured":"Maksim, B.: What is wallet import format (wif)? https:\/\/allprivatekeys.com\/what-is-wif"},{"key":"7_CR34","unstructured":"Neal, W.: Cryptocurrency hackers steal \\$3.8B in 2020. https:\/\/www.occrp.org\/en\/daily\/13627-cryptocurrency-hackers-steal-3-8-billion-in-2020"},{"key":"7_CR35","unstructured":"Newburger, E.: Bitcoin surpasses \\$60,000 in record high as rally accelerates. https:\/\/www.cnbc.com\/2021\/03\/13\/bitcoin-surpasses-60000-in-record-high-as-rally-accelerates-.html"},{"key":"7_CR36","unstructured":"Online, FE: Market Cap \\$1.24T, February 2021. https:\/\/www.financialexpress.com\/market\/bitcoin-rally-takes-market-cap-of-over-6000-cryptocurrencies-to-whopping-new-high-of-1-24-trillion\/2189730\/"},{"key":"7_CR37","unstructured":"Osborne, C.: AT&T dragged to court, over SIM hijacking and cryptocurrency theft | ZDNet. https:\/\/www.zdnet.com\/article\/at-t-dragged-to-court-again-over-sim-hijacking-and-cryptocurrency-theft\/"},{"key":"7_CR38","unstructured":"Palatinus, M., Rusnak, P.: Official specification of BIP-0044, March 2019. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0044.mediawiki"},{"key":"7_CR39","unstructured":"Palatinus, M., Rusnak, P., Voisine, A., Bowe, S.: Official specification of BIP-0039, February 2021. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0039.mediawiki"},{"key":"7_CR40","unstructured":"Powers, B.: This elusive malware has targeted crypto wallets for a year, January 2021. https:\/\/www.coindesk.com\/elusive-malware-electrorat-targets-crypto-wallets"},{"key":"7_CR41","unstructured":"Rahman, M.: Developers are facing huge drop in new installs after Play Store algorithm changes. https:\/\/www.xda-developers.com\/developers-huge-drop-new-installs-play-store-algorithm-changes\/"},{"issue":"1","key":"7_CR42","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10664-019-09749-y","volume":"25","author":"V-P Ranganath","year":"2019","unstructured":"Ranganath, V.-P., Mitra, J.: Are free Android app security analysis tools effective in detecting known vulnerabilities? Empir. Softw. Eng. 25(1), 178\u2013219 (2019). https:\/\/doi.org\/10.1007\/s10664-019-09749-y","journal-title":"Empir. Softw. Eng."},{"key":"7_CR43","unstructured":"Redman, J.: The \\$700m wallet crack. https:\/\/news.bitcoin.com\/the-700-million-wallet-crack-bitcoins-7th-largest-address-is-under-constant-attack\/"},{"key":"7_CR44","unstructured":"Sedgwick, K.: Bitcoin address formats - Wallets Bitcoin News. https:\/\/news.bitcoin.com\/everything-you-should-know-about-bitcoin-address-formats\/"},{"key":"7_CR45","unstructured":"Testnet - Bitcoin Wiki. https:\/\/en.bitcoin.it\/wiki\/Testnet"},{"key":"7_CR46","unstructured":"Unuchek, R.: Android: To root or not to root | Kaspersky official blog. https:\/\/www.kaspersky.com\/blog\/android-root-faq\/17135\/"},{"key":"7_CR47","unstructured":"\/dev\/random - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/\/dev\/random"},{"key":"7_CR48","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.future.2018.08.029","volume":"91","author":"T Volety","year":"2019","unstructured":"Volety, T., Saini, S., McGhin, T., Liu, C.Z., Choo, K.K.R.: Cracking bitcoin wallets: I want what you have in the wallets. Futur. Gener. Comput. Syst. 91, 136\u2013143 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"7_CR49","unstructured":"Wuille, P.: Official specification of BIP-0032, August 2020. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0032.mediawiki"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, H., She, D., Qian, Z.: Android root and its providers: a double-edged sword. In: 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1093\u20131104 (2015)","DOI":"10.1145\/2810103.2813714"},{"key":"7_CR51","doi-asserted-by":"publisher","first-page":"158250","DOI":"10.1109\/ACCESS.2019.2948774","volume":"7","author":"S Zollner","year":"2019","unstructured":"Zollner, S., Choo, K.K.R., Le-Khac, N.A.: An automated live forensic and postmortem analysis tool for Bitcoin on Windows systems. IEEE Access 7, 158250\u2013158263 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90022-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T08:08:35Z","timestamp":1635926915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90022-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030900212","9783030900229"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90022-9_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}