kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Diverse Double-Compiling to Harden Cryptocurrency Software
KTH, School of Electrical Engineering and Computer Science (EECS).
2023 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. DDC4CC includes a case study that implements a trusting trust attack and the defense applied to a hypothetical theft of cryptocurrency on the Bitcoin blockchain. The motivation for such an attack is easy to understand: An adversary can acquire significant monetary funds by manipulating economic or decentralized financial systems. For a supply-chain attack in general, the outcome is potentially even more severe. An adversary can control entire organizations and even the systems belonging to the organization’s customers if the supply chain is compromised. Attacks are possible when targets are inherently vulnerable due to trust in their suppliers and trust in the supply chain, i.e., the hardware constructors and the software authors, the upstream development team, and the dependencies in the supply chain.

Abstract [sv]

Detta projekt, som heter DDC4CC, beskriver och demonstrerar möjligheten för cyberattack och försvar, tillämpat på programvara för kryptovaluta. En sådan attack kan fullborda en hypotetisk stöld av kryptovaluta på Bitcoin-blockkedjan. Motivet för en sådan attack är lätt att förstå: En korrumperad person eller organisation kan kontrollera hela organisationer och till och med organisationens kunder om leverantörskedjan äventyras. En motståndare kan skaffa betydande monetära medel genom att manipulera ekonomiska eller decentraliserade finansiella system. Attacker är möjliga när mål till sin natur är sårbara på grund av förtroende för deras skapare och förtroende för deras leveranskedja, det vill säga hårdvarukonstruktörerna och mjukvaruingenjörerna, och beroenden i leveranskedjan.

Place, publisher, year, edition, pages
2023. , p. 52
Series
TRITA-EECS-EX ; 2023:1
Keywords [en]
Trusting trust, Compiler security, Software Supply Chain, Trojan Horse, Cryptocurrency
Keywords [sv]
Datasäkerhet, kompilator, datavirus, kryptovaluta, Trojansk häst
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-323901OAI: oai:DiVA.org:kth-323901DiVA, id: diva2:1737190
Supervisors
Examiners
Available from: 2023-02-25 Created: 2023-02-15 Last updated: 2023-02-25Bibliographically approved

Open Access in DiVA

fulltext(536 kB)364 downloads
File information
File name FULLTEXT01.pdfFile size 536 kBChecksum SHA-512
670db8e7bd4c0e4895545e781de14772dbab1cc84463de186f5a3a33d035313f7f735aad20d57c3ce4843631c3f0f75256631b05b79b133eafa9954426461ea9
Type fulltextMimetype application/pdf

By organisation
School of Electrical Engineering and Computer Science (EECS)
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 364 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 1373 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf