{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:59:29Z","timestamp":1764784769020,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-20-C-4027"],"award-info":[{"award-number":["N66001-20-C-4027"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Donald Bren School of Information and Computer Sciences at UC Irvine","award":["ENDEAVOR"],"award-info":[{"award-number":["ENDEAVOR"]}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2782"],"award-info":[{"award-number":["N00014-17-1-2782"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Austrian Research Promotion Agency","award":["SBA-K1"],"award-info":[{"award-number":["SBA-K1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3464967.3488588","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T15:17:29Z","timestamp":1636816649000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure"],"prefix":"10.1145","author":[{"given":"Adrian","family":"Dabrowski","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katharina","family":"Pfeffer","sequence":"additional","affiliation":[{"name":"SBA Research, Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Markus","family":"Reichel","sequence":"additional","affiliation":[{"name":"Vienna University of Technology, Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexandra","family":"Mai","sequence":"additional","affiliation":[{"name":"SBA Research, Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar R.","family":"Weippl","sequence":"additional","affiliation":[{"name":"University of Vienna, Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Franz","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Lawrence Abrams. 2021. Criminals are mailing altered Ledger devices to steal cryptocurrency. https:\/\/www.bleepingcomputer.com\/news\/cryptocurrency\/criminals-are-mailing-altered-ledger-devices-to-steal-cryptocurrency\/ accessed 2021-08-02.  Lawrence Abrams. 2021. Criminals are mailing altered Ledger devices to steal cryptocurrency. https:\/\/www.bleepingcomputer.com\/news\/cryptocurrency\/criminals-are-mailing-altered-ledger-devices-to-steal-cryptocurrency\/ accessed 2021-08-02."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0115-0"},{"key":"e_1_3_2_1_3_1","first-page":"978","article-title":"Hardware Security","author":"Bhunia Swarup","year":"2018","unstructured":"Swarup Bhunia and Mark Tehranipoor . 2018 . Hardware Security : A Hands-on Learning Approach. Morgan Kaufmann. ISBN 978 - 0128124772 . Swarup Bhunia and Mark Tehranipoor. 2018. Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann. ISBN 978-0128124772.","journal-title":"A Hands-on Learning Approach. Morgan Kaufmann. ISBN"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_29"},{"key":"e_1_3_2_1_5_1","unstructured":"Luke Champine. 2019. A Ransom Attack on Hardware Wallets. https:\/\/blog.sia.tech\/534c075b3a92 accessed: 2020-06--17.  Luke Champine. 2019. A Ransom Attack on Hardware Wallets. https:\/\/blog.sia.tech\/534c075b3a92 accessed: 2020-06--17."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.45"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00048"},{"key":"e_1_3_2_1_8_1","unstructured":"DIGImend. 2019. USB HID device dumping utility. https:\/\/github.com\/DIGImend\/usbhid-dump. Accessed: 2019-02-12.  DIGImend. 2019. USB HID device dumping utility. https:\/\/github.com\/DIGImend\/usbhid-dump. Accessed: 2019-02-12."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_28"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEE.2010.5660874"},{"key":"e_1_3_2_1_11_1","unstructured":"GitHub. 2021. Search for 'Trezor' within the keepkey firmware code base. https:\/\/github.com\/keepkey\/keepkey-firmware\/search?q=trezor accessed 2021-03-24.  GitHub. 2021. Search for 'Trezor' within the keepkey firmware code base. https:\/\/github.com\/keepkey\/keepkey-firmware\/search?q=trezor accessed 2021-03-24."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Andriana Gkaniatsou Myrto Arapinis and Aggelos Kiayias. 2017. Low-Level Attacks in Bitcoin Wallets. In Information Security Phong Q. Nguyen and Jianying Zhou (Eds.).  Andriana Gkaniatsou Myrto Arapinis and Aggelos Kiayias. 2017. Low-Level Attacks in Bitcoin Wallets. In Information Security Phong Q. Nguyen and Jianying Zhou (Eds.).","DOI":"10.1007\/978-3-319-69659-1_13"},{"key":"e_1_3_2_1_13_1","unstructured":"Mike Grover. 2021. [OMG]: Bitcoin Stealing Ledger Implant Upgraded: Now *Invisible*. https:\/\/youtu.be\/oARxLV_vnh0 accessed 2021-08-02.  Mike Grover. 2021. [OMG]: Bitcoin Stealing Ledger Implant Upgraded: Now *Invisible*. https:\/\/youtu.be\/oARxLV_vnh0 accessed 2021-08-02."},{"key":"e_1_3_2_1_14_1","unstructured":"Andrew Huang. 2019. Supply Chain Security: \"If I were a Nation State...\". BlueHat IL video available: https:\/\/youtu.be\/RqQhWitJ1As accessed: 2020-06-17.  Andrew Huang. 2019. Supply Chain Security: \"If I were a Nation State...\". BlueHat IL video available: https:\/\/youtu.be\/RqQhWitJ1As accessed: 2020-06-17."},{"key":"e_1_3_2_1_15_1","unstructured":"Intertronix. 2020. Custom Hologram Sticker Online. https:\/\/www.intertronix.com\/category-s\/1673.htm accessed: 2020-09-16.  Intertronix. 2020. Custom Hologram Sticker Online. https:\/\/www.intertronix.com\/category-s\/1673.htm accessed: 2020-09-16."},{"key":"e_1_3_2_1_16_1","unstructured":"Inverse Path. 2018. Open Source Flash-Drive Sized Computer. https:\/\/inversepath.com\/usbarmory.html. Accessed: 2018-09--21.  Inverse Path. 2018. Open Source Flash-Drive Sized Computer. https:\/\/inversepath.com\/usbarmory.html. Accessed: 2018-09--21."},{"key":"e_1_3_2_1_17_1","unstructured":"kernel.org. 2017. Linux USB HID gadget driver. https:\/\/www.kernel.org\/doc\/Documentation\/usb\/gadget_hid.txt. Accessed: 2019-02--12.  kernel.org. 2017. Linux USB HID gadget driver. https:\/\/www.kernel.org\/doc\/Documentation\/usb\/gadget_hid.txt. Accessed: 2019-02--12."},{"key":"e_1_3_2_1_18_1","unstructured":"Ledger. 2019. Export your accounts. https:\/\/support.ledger.com\/hc\/articles\/115005297709 accessed: 2020-06--17.  Ledger. 2019. Export your accounts. https:\/\/support.ledger.com\/hc\/articles\/115005297709 accessed: 2020-06--17."},{"volume-title":"How to roll your own counterfeit hardware security devices. DEF CON 25","author":"Leibowitz Michael","key":"e_1_3_2_1_19_1","unstructured":"Michael Leibowitz and Joe FitzPatrick . 2017. Secure Tokin' & Doobiekeys : How to roll your own counterfeit hardware security devices. DEF CON 25 . Michael Leibowitz and Joe FitzPatrick. 2017. Secure Tokin' & Doobiekeys: How to roll your own counterfeit hardware security devices. DEF CON 25."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"e_1_3_2_1_21_1","unstructured":"Mordor Intelligence. 2021. Global Hardware Wallet Market: Growth Trends and Forecast (2019-2024). https:\/\/www.mordorintelligence.com\/industry-reports\/hardware-wallet-market accessed: 2021-01-26.  Mordor Intelligence. 2021. Global Hardware Wallet Market: Growth Trends and Forecast (2019-2024). https:\/\/www.mordorintelligence.com\/industry-reports\/hardware-wallet-market accessed: 2021-01-26."},{"key":"e_1_3_2_1_22_1","unstructured":"Dmitry Nedospasov Josh Datko and Thomas Roth. 2018. Wallet Fail. https:\/\/wallet.fail\/ accessed: 2020-06-17.  Dmitry Nedospasov Josh Datko and Thomas Roth. 2018. Wallet Fail. https:\/\/wallet.fail\/ accessed: 2020-06-17."},{"key":"e_1_3_2_1_23_1","unstructured":"Marek Palatinus and Pavol Rusnak. 2014. BIP 0044: Multi-Account Hierarchy for Deterministic Wallets. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0044.mediawiki accessed 2021-01-23.  Marek Palatinus and Pavol Rusnak. 2014. BIP 0044: Multi-Account Hierarchy for Deterministic Wallets. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0044.mediawiki accessed 2021-01-23."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 30th Usenix Security Symposium.","author":"Pfeffer Katharina","year":"2021","unstructured":"Katharina Pfeffer , Alexandra Mai , Adrian Dabrowski , Matthias Gusenbauer , Philipp Schindler , Edgar Weippl , Michael Franz , and Katharina Krombholz . 2021 . On the Usability of Authenticity Checks for Hardware Security Tokens . In Proceedings of the 30th Usenix Security Symposium. Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar Weippl, Michael Franz, and Katharina Krombholz. 2021. On the Usability of Authenticity Checks for Hardware Security Tokens. In Proceedings of the 30th Usenix Security Symposium."},{"key":"e_1_3_2_1_25_1","unstructured":"Saleem Rashid. 2018. Breaking the Ledger Security Model. https:\/\/saleemrashid.com\/2018\/03\/20\/breaking-ledger-security-model\/ accessed: 2020-06-17.  Saleem Rashid. 2018. Breaking the Ledger Security Model. https:\/\/saleemrashid.com\/2018\/03\/20\/breaking-ledger-security-model\/ accessed: 2020-06-17."},{"key":"e_1_3_2_1_26_1","unstructured":"SatoshiLabs. 2018. Non-genuine Trezor One devices spotted. Be careful buy only from Trezor Shop or authorized resellers. https:\/\/blog.trezor.io\/979b64e359a7 accessed: 2020-06-17.  SatoshiLabs. 2018. Non-genuine Trezor One devices spotted. Be careful buy only from Trezor Shop or authorized resellers. https:\/\/blog.trezor.io\/979b64e359a7 accessed: 2020-06-17."},{"key":"e_1_3_2_1_27_1","unstructured":"Kai Sedgwick. 2018. Man's Life Savings Stolen from Hardware Wallet Supplied by a Reseller. https:\/\/news.bitcoin.com\/mans-life-savings-stolen-from-hardware-wallet-supplied-by-a-reseller\/ accessed: 2020-06-17.  Kai Sedgwick. 2018. Man's Life Savings Stolen from Hardware Wallet Supplied by a Reseller. https:\/\/news.bitcoin.com\/mans-life-savings-stolen-from-hardware-wallet-supplied-by-a-reseller\/ accessed: 2020-06-17."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00037"},{"key":"e_1_3_2_1_29_1","volume-title":"Software attacks on hardware wallets. Blackhat USA","author":"Volokitin Sergei","year":"2018","unstructured":"Sergei Volokitin . 2018. Software attacks on hardware wallets. Blackhat USA ( 2018 ). https:\/\/www.blackhat.com\/us-18\/briefings\/schedule\/#software-attacks-on-hardware-wallets-10665. Sergei Volokitin. 2018. Software attacks on hardware wallets. Blackhat USA (2018). https:\/\/www.blackhat.com\/us-18\/briefings\/schedule\/#software-attacks-on-hardware-wallets-10665."},{"key":"e_1_3_2_1_30_1","unstructured":"Trezor Wiki. 2018. Developers guide: Cryptography. https:\/\/wiki.trezor.io\/Developers_guide: Cryptography accessed: 2020-06-17.  Trezor Wiki. 2018. Developers guide: Cryptography. https:\/\/wiki.trezor.io\/Developers_guide: Cryptography accessed: 2020-06-17."},{"key":"e_1_3_2_1_31_1","unstructured":"Pieter Wuille. 2012. BIP 0032: Hierarchical Deterministic Wallets. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0032.mediawiki accessed 2021-01-23.  Pieter Wuille. 2012. BIP 0032: Hierarchical Deterministic Wallets. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0032.mediawiki accessed 2021-01-23."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464967.3488588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3464967.3488588","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3464967.3488588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:11Z","timestamp":1750191431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464967.3488588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":31,"alternative-id":["10.1145\/3464967.3488588","10.1145\/3464967"],"URL":"https:\/\/doi.org\/10.1145\/3464967.3488588","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}