March 31, 2023, 1:10 a.m. | Pascal Urien (LTCI)

cs.CR updates on arXiv.org arxiv.org

Blockchain transactions are signed by private keys. Secure key storage and
tamper-proof computers are essential requirements for deploying a trusted
infrastructure. In this paper, we identify some threats against blockchain
wallets and propose a set of physical and logical countermeasures to thwart
them. We present the crypto terminal device, operating with a removable secure
element, built on open software and hardware architectures, capable of
detecting a cloned device or corrupted software. These technologies are based
on tamper-resistant computing (javacard), smart …

attacks blockchain card case computers computing countermeasures crypto cyber cyber attacks device hardware identify infrastructure key keys physical private private keys requirements smart smart card software storage technologies terminal threats transactions use case wallets

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain