{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:14Z","timestamp":1750220654083,"version":"3.41.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T00:00:00Z","timestamp":1601337600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2020,9,29]]},"abstract":"<jats:p>Notary is a new design for a hardware wallet, a device that is used to perform sensitive transactional operations like cryptocurrency transfers. Notary aims to be more secure than past hardware wallets by eliminating classes of bugs by design and by formally proving the correctness of the key operation used in its implementation. We built a physical prototype of Notary and showed that it achieves functionality similar to existing hardware wallets while avoiding many bugs that affect them.<\/jats:p>","DOI":"10.1145\/3427384.3427395","type":"journal-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T04:14:05Z","timestamp":1601439245000},"page":"34-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Notary"],"prefix":"10.1145","volume":"24","author":[{"given":"Anish","family":"Athalye","sequence":"first","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Adam","family":"Belay","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"M. Frans","family":"Kaashoek","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Robert","family":"Morris","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"A survey of recent iOS kernel exploits","author":"Azad B.","year":"2020","unstructured":"B. Azad . A survey of recent iOS kernel exploits . June 2020 . https:\/\/googleprojectzero.blogspot. com\/2020\/06\/a-survey-of-recent-ios-kernelexploits. html B. Azad. A survey of recent iOS kernel exploits. June 2020. https:\/\/googleprojectzero.blogspot. com\/2020\/06\/a-survey-of-recent-ios-kernelexploits. html"},{"key":"e_1_2_1_2_1","unstructured":"Android protected confirmation. https:\/\/source. android.com\/security\/protected-confirmation.  Android protected confirmation. https:\/\/source. android.com\/security\/protected-confirmation."},{"key":"e_1_2_1_3_1","volume-title":"An API for accessing public key credentials","author":"Web","year":"2019","unstructured":"Web authentication : An API for accessing public key credentials . March 2019 . https:\/\/www.w3.org\/ TR\/ webauthn\/ Web authentication: An API for accessing public key credentials. March 2019. https:\/\/www.w3.org\/ TR\/webauthn\/"},{"key":"e_1_2_1_4_1","unstructured":"Ledger hardware wallets. https:\/\/www.ledger.com\/  Ledger hardware wallets. https:\/\/www.ledger.com\/"},{"key":"e_1_2_1_5_1","volume-title":"Hacking the ultra-secure hardware cryptowallet","author":"Team Riscure","year":"2018","unstructured":"Riscure Team . Hacking the ultra-secure hardware cryptowallet . Aug. 2018 . Riscure Team. Hacking the ultra-secure hardware cryptowallet. Aug. 2018."},{"key":"e_1_2_1_6_1","volume-title":"Deep dive into three vulnerabilities which have been fixed","author":"Guillemet C.","year":"2018","unstructured":"C. Guillemet . Firmware 1.4 : Deep dive into three vulnerabilities which have been fixed . March 2018 . https:\/\/www.ledger.com\/2018\/03\/20\/firmware-1- 4-deep-dive-security-fixes\/ C. Guillemet. Firmware 1.4: Deep dive into three vulnerabilities which have been fixed. March 2018. https:\/\/www.ledger.com\/2018\/03\/20\/firmware-1- 4-deep-dive-security-fixes\/"},{"key":"e_1_2_1_7_1","volume-title":"Privileged architecture.","author":"Waterman A.","year":"2019","unstructured":"A. Waterman and K. Asanovic . The RISC-V instruction set manual , volume II : Privileged architecture. June 2019 . https:\/\/riscv.org\/ specifications\/privileged-isa\/ A. Waterman and K. Asanovic. The RISC-V instruction set manual, volume II: Privileged architecture. June 2019. https:\/\/riscv.org\/ specifications\/privileged-isa\/"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362829"},{"key":"e_1_2_1_9_1","volume-title":"PicoRV32 - a size-optimized RISC-V CPU","author":"Wolf C.","year":"2019","unstructured":"C. Wolf . PicoRV32 - a size-optimized RISC-V CPU . 2019 . https:\/\/github.com\/cliffordwolf\/picorv32 C. Wolf. PicoRV32 - a size-optimized RISC-V CPU. 2019. https:\/\/github.com\/cliffordwolf\/picorv32"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359661"}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427384.3427395","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427384.3427395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:26Z","timestamp":1750197746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427384.3427395"}},"subtitle":["A Device for Secure Transaction Approval"],"short-title":[],"issued":{"date-parts":[[2020,9,29]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,9,29]]}},"alternative-id":["10.1145\/3427384.3427395"],"URL":"https:\/\/doi.org\/10.1145\/3427384.3427395","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2020,9,29]]},"assertion":[{"value":"2020-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}