Mobile mining of cryptocurrencies, without relying on CPU-heavy computations, is a novel attempt to foster adoption of a token. However, this approach leaves room for attacks. In this paper, we perform a thorough analysis of Electroneum, one of the first cryptocurrencies to introduce a mobile mining process. We show that mobile mining, without relying on a consensus algorithm (e.g. Proof-Of-Work), is not feasible on current generation Android smartphones. We further demonstrate that the security mechanisms employed by Electroneum can be circumvented and that mobile mining can be exploited successfully. Based on this analysis, we discuss several practical countermeasures, which can be applied on smartphones to enforce device authorisation and prevent abuse.
|Title of host publication||Proceedings of the 15th International Joint Conference on e-Business and Telecommunications|
|Place of Publication||Portugal|
|Publisher||SciTePress - Science and Technology Publications|
|Number of pages||8|
|Publication status||Published - 28 Jul 2018|
- Device Authorisation, Android, Cryptocurrency, Mining, REST, App Integrity, Smartphone, Electroneum, Remote Attestation, Key Attestation.
Ziegler, D., Prünster, B., Marsalek, A., & Kollmann, C. (2018). Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (Vol. 1: SECRYPT, pp. 380-387). Portugal: SciTePress - Science and Technology Publications. https://doi.org/10.5220/0006859005460553