Hyperwallet: cryptocurrency wallet as a secure hypervisor-based application
| Authors: Vakhromeev D.A., Glinskaya E.V. | |
| Published in issue: #2(97)/2025 | |
| DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security |
|
Keywords: secure cryptocurrency wallet, hypervisor, secure communication, attack protection, virtualization, transaction security, sandbox, hardware security |
|
| Published: 09.04.2025 | |
The paper considers the VirtSecIO platform. It was organized based on a hypervisor and designed to improve security of the cryptocurrency wallets. The VirtSecIO platform uses virtualization technologies to minimize the attack surface and provides a secure environment for the digital transactions. The paper discusses architecture, performance, limitations, and future areas in expanding the platform capabilities. The study covers the VirtSecIO architecture and includes the hypervisor layer, secure execution path, and the trusted platform module (TPM). Practical application of the platform is demonstrated using the HyperWallet wallet as an example. The paper analyzes performance, limitations, and future areas for further research, such as the USB support and expanding functionalities for the other secure applications.
References
[1] Bertoni G. et al. Keccak. Advances in Cryptology – EUROCRYPT 2013, Springer, 2013. https://doi.org/10.1007/978-3-642-38348-9_19
[2] Johnson D. et al. The elliptic curve digital signature algorithm (ecdsa). International Journal of Information Security, 2001, pp. 36–63. https://doi.org/10.1007/s102070100002
[3] Nofer M. et al. Blockchain. Business & Information Systems Engineering, 2017, vol. 59 (3). https://doi.org/10.1007/s12599-017-0467-3
[4] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. URL: https://bitcoin.org/bitcoin.pdf (accessed October 15, 2024).
[5] Wood G. et al. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap., 2014. URL: https://ethereum.github.io/yellowpaper/paper.pdf (accessed October 15, 2024).
[6] Corduan J. et al. A formal specification of the Cardano ledger. URL: https://allquantor.at/blockchainbib/pdf/corduan2019formal.pdf (accessed October 15, 2024).
[7] Catalini C., Gans J.S. Some simple economics of the blockchain. URL: https://dl.acm.org/doi/10.1145/3361234 (accessed October 15, 2024).
[8] Praitheeshan P. et al. Security analysis methods on ethereum smart contract vulnerabilities: a survey. URL: https://arxiv.org/abs/1908.08605 (accessed October 15, 2024).
[9] Lee W.M. Using the MetaMask Chrome Extension. Beginning Ethereum Smart Contracts Programming, Apress, 2019. https://doi.org/10.1007/978-1-4842-5086-0_5
[10] Kiperberg M. Preventing malicious communication using virtualization. J. Inf. Secur. Appl., 2021, vol. 61. https://doi.org/10.1016/j.jisa.2021.102871
