{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T05:34:00Z","timestamp":1769232840194,"version":"3.49.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319696584","type":"print"},{"value":"9783319696591","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69659-1_13","type":"book-chapter","created":{"date-parts":[[2017,10,19]],"date-time":"2017-10-19T08:44:47Z","timestamp":1508402687000},"page":"233-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Low-Level Attacks in Bitcoin Wallets"],"prefix":"10.1007","author":[{"given":"Andriana","family":"Gkaniatsou","sequence":"first","affiliation":[]},{"given":"Myrto","family":"Arapinis","sequence":"additional","affiliation":[]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,20]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39884-1_4"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-11851-2_5","volume-title":"Security and Trust Management","author":"T Bamert","year":"2014","unstructured":"Bamert, T., Decker, C., Wattenhofer, R., Welten, S.: BlueWallet: the secure bitcoin wallet. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 65\u201380. Springer, Cham (2014). doi:10.1007\/978-3-319-11851-2_5"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better \u2014 how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399\u2013414. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32946-3_29"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). doi:10.1007\/BFb0052259"},{"key":"13_CR5","unstructured":"Bitcoin ewallet vanishes from internet. http:\/\/www.tribbleagency.com\/?p=8133"},{"key":"13_CR6","unstructured":"Bitcoin Protocol Documentation. https:\/\/en.bitcoin.it\/wiki\/Protocol%5Fdocumentation"},{"key":"13_CR7","unstructured":"Bitcoinmagazine (2013). https:\/\/bitcoinmagazine.com\/articles\/ozcoin-hacked-stolen-funds-seized-and-returned-by-strongcoin-1366822516"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-45719-2_5","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"C Bozzato","year":"2016","unstructured":"Bozzato, C., Focardi, R., Palmarini, F., Steel, G.: APDU-level attacks in PKCS#11 devices. In: Monrose, F., Dacier, M., Blanc, G., Garcia-Alfaro, J. (eds.) RAID 2016. LNCS, vol. 9854, pp. 97\u2013117. Springer, Cham (2016). doi:10.1007\/978-3-319-45719-2_5"},{"key":"13_CR9","unstructured":"Datko, J., Quartier, C., Belyayev, K.: Breaking bitcoin hardware wallets. In: DEFCON (2017)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"De Koning Gans, G., De Ruiter, J.: The smartlogic tool: analysing and testing smart card protocols. In: 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST), pp. 864\u2013871 (2012)","DOI":"10.1109\/ICST.2012.189"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-319-11212-1_18","volume-title":"Computer Security - ESORICS 2014","author":"C Decker","year":"2014","unstructured":"Decker, C., Wattenhofer, R.: Bitcoin transaction malleability and MtGox. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 313\u2013326. Springer, Cham (2014). doi:10.1007\/978-3-319-11212-1_18"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-662-44371-2_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"D Genkin","year":"2014","unstructured":"Genkin, D., Shamir, A., Tromer, E.: RSA key extraction via low-bandwidth acoustic cryptanalysis. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 444\u2013461. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-44371-2_25"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Gkaniatsou, A., McNeill, F., Bundy, A., Steel, G., Focardi, R., Bozzato, C.: Getting to know your card: reverse-engineering the smart-card application protocol data unit. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 441\u2013450 (2015)","DOI":"10.1145\/2818000.2818020"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-17697-5_10","volume-title":"Transactions on Computational Science XI","author":"F Hao","year":"2010","unstructured":"Hao, F., Ryan, P.: J-PAKE: authenticated key exchange without PKI. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science XI. LNCS, vol. 6480, pp. 192\u2013206. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-17697-5_10"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-17016-9_1","volume-title":"Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance","author":"J Herrera-Joancomart\u00ed","year":"2015","unstructured":"Herrera-Joancomart\u00ed, J.: Research and challenges on bitcoin anonymity. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Lupu, E., Posegga, J., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/QASA\/SETOP -2014. LNCS, vol. 8872, pp. 3\u201316. Springer, Cham (2015). doi:10.1007\/978-3-319-17016-9_1"},{"key":"13_CR16","unstructured":"Higgins, S. (2015). http:\/\/www.coindesk.com\/unconfirmed-report-5-million-bitstamp-bitcoin-exchange"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Hsiao, H.-C., Lin, Y.-H., Studer, A., Studer, C., Wang, K.-H., Kikuchi, H., Perrig, A., Sun, H.-M., Yang, B.-Y.: A study of user-friendly hash comparison schemes. In: Annual Computer Security Applications Conference, ACSAC 2009, pp. 105\u2013114. IEEE (2009)","DOI":"10.1109\/ACSAC.2009.20"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., Savage, S., Weaver, N., Snoeren, A.C., Levchenko, K.: Botcoin: monetizing stolen cycles. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23\u201326 February 2014","DOI":"10.14722\/ndss.2014.23044"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 906\u2013917 (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi:10.1007\/3-540-48405-1_25"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). doi:10.1007\/3-540-68697-5_9"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1007\/978-3-319-09147-1_52","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2014","author":"I-K Lim","year":"2014","unstructured":"Lim, I.-K., Kim, Y.-H., Lee, J.-G., Lee, J.-P., Nam-Gung, H., Lee, J.-K.: The analysis and countermeasures on security breach of bitcoin. In: Murgante, B., Misra, S., Rocha, A.M.A.C., Torre, C., Rocha, J.G., Falc\u00e3o, M.I., Taniar, D., Apduhan, B.O., Gervasi, O. (eds.) ICCSA 2014. LNCS, vol. 8582, pp. 720\u2013732. Springer, Cham (2014). doi:10.1007\/978-3-319-09147-1_52"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Drimer, S., Anderson, R.J., Bond, M.: Chip and PIN is broken. In: 31st IEEE Symposium on Security and Privacy, S&P 2010, Berleley\/Oakland, California, USA, 16\u201319 May 2010, pp. 433\u2013446 (2010)","DOI":"10.1109\/SP.2010.33"},{"key":"13_CR24","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"13_CR25","unstructured":"Poulsen, K.: New malware steals your bitcoin (2011). https:\/\/www.wired.com\/2011\/06\/bitcoin-malware"},{"key":"13_CR26","unstructured":"Rosenfeld, M.: Analysis of hashrate-based double spending. CoRR, abs\/1402.2009 (2014)"},{"key":"13_CR27","unstructured":"The Bitcoin Wiki. https:\/\/en.bitcoin.it\/wiki\/Wallet%5Fencryption"},{"key":"13_CR28","unstructured":"The Bitcoin Wiki (2014). https:\/\/en.bitcoin.it\/wiki"},{"key":"13_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-662-53357-4_3","volume-title":"Financial Cryptography and Data Security","author":"M Turuani","year":"2016","unstructured":"Turuani, M., Voegtlin, T., Rusinowitch, M.: Automated verification of electrum wallet. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 27\u201342. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-53357-4_3"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-77366-5_29","volume-title":"Financial Cryptography and Data Security","author":"E Uzun","year":"2007","unstructured":"Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 307\u2013324. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-77366-5_29"},{"key":"13_CR31","unstructured":"Wuille, P.: Dealing with maellability. Online specification for BIP62 (2014)"},{"key":"13_CR32","unstructured":"Wuille, P.: Hierarchical deterministic wallets. Online specification for BIP32 (2017)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69659-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:00:21Z","timestamp":1710266421000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-69659-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319696584","9783319696591"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69659-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"20 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isc2017.vgu.edu.vn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}