Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Abstract

Mobile mining of cryptocurrencies, without relying on CPU-heavy computations, is a novel attempt to foster adoption of a token. However, this approach leaves room for attacks. In this paper, we perform a thorough analysis of Electroneum, one of the first cryptocurrencies to introduce a mobile mining process. We show that mobile mining, without relying on a consensus algorithm (e.g. Proof-Of-Work), is not feasible on current generation Android smartphones. We further demonstrate that the security mechanisms employed by Electroneum can be circumvented and that mobile mining can be exploited successfully. Based on this analysis, we discuss several practical countermeasures, which can be applied on smartphones to enforce device authorisation and prevent abuse.
Original languageEnglish
Title of host publicationProceedings of the 15th International Joint Conference on e-Business and Telecommunications
Place of PublicationPortugal
PublisherSciTePress - Science and Technology Publications
Pages380-387
Number of pages8
Volume1: SECRYPT
ISBN (Print)978-989-758-319-3
DOIs
Publication statusPublished - 28 Jul 2018

Keywords

  • Device Authorisation, Android, Cryptocurrency, Mining, REST, App Integrity, Smartphone, Electroneum, Remote Attestation, Key Attestation.

Fingerprint Dive into the research topics of 'Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes'. Together they form a unique fingerprint.

  • Cite this

    Ziegler, D., Prünster, B., Marsalek, A., & Kollmann, C. (2018). Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (Vol. 1: SECRYPT, pp. 380-387). Portugal: SciTePress - Science and Technology Publications. https://doi.org/10.5220/0006859005460553