Abstract
Notary is a new design for a hardware wallet, a device that is used to perform sensitive transactional operations like cryptocurrency transfers. Notary aims to be more secure than past hardware wallets by eliminating classes of bugs by design and by formally proving the correctness of the key operation used in its implementation. We built a physical prototype of Notary and showed that it achieves functionality similar to existing hardware wallets while avoiding many bugs that affect them.
- B. Azad. A survey of recent iOS kernel exploits. June 2020. https://googleprojectzero.blogspot. com/2020/06/a-survey-of-recent-ios-kernelexploits. htmlGoogle Scholar
- Android protected confirmation. https://source. android.com/security/protected-confirmation.Google Scholar
- Web authentication: An API for accessing public key credentials. March 2019. https://www.w3.org/ TR/webauthn/Google Scholar
- Ledger hardware wallets. https://www.ledger.com/Google Scholar
- Riscure Team. Hacking the ultra-secure hardware cryptowallet. Aug. 2018.Google Scholar
- C. Guillemet. Firmware 1.4: Deep dive into three vulnerabilities which have been fixed. March 2018. https://www.ledger.com/2018/03/20/firmware-1- 4-deep-dive-security-fixes/Google Scholar
- A. Waterman and K. Asanovic. The RISC-V instruction set manual, volume II: Privileged architecture. June 2019. https://riscv.org/ specifications/privileged-isa/Google Scholar
- A. Rahmati, M. Salajegheh, D. E. Holcomb, J. Sorber, W. P. Burleson, and K. Fu. TARDIS: Time and remanence decay in SRAM to implement secure protocols on embedded devices without clocks. Aug. 2012. In Proceedings of the 21st USENIX Security Symposium, 221--236, Bellevue, WA. Google ScholarDigital Library
- C. Wolf. PicoRV32 - a size-optimized RISC-V CPU. 2019. https://github.com/cliffordwolf/picorv32Google Scholar
- A. Athalye, A. Belay, M. F. Kaashoek, R. Morris, and N. Zeldovich. Notary: A device for secure transaction approval. Oct. 2019. In Proceedings of the 27th ACM Symposium on Operating Systems Principles (SOSP), 97--113, Huntsville, ON, Canada. (The full Notary paper is available at https://pdos.csail.mit.edu/papers/notary:sosp19.pdf). Google ScholarDigital Library
Recommendations
Notary: a device for secure transaction approval
SOSP '19: Proceedings of the 27th ACM Symposium on Operating Systems PrinciplesNotary is a new hardware and software architecture for running isolated approval agents in the form factor of a USB stick with a small display and buttons. Approval agents allow factoring out critical security decisions, such as getting the user's ...
Notary: Hardware techniques to enhance signatures
MICRO 41: Proceedings of the 41st annual IEEE/ACM International Symposium on MicroarchitectureHardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk, LogTM-SE, and SigTM). Signatures use fixed hardware to represent an ...
A distributed cross-chain mechanism based on notary schemes and group signatures
AbstractBlockchain technology has attracted significant attention since its publication. However, most existing blockchain platforms are isolated systems, which makes it difficult to exchange data among different blockchains. The industry has proposed ...
Comments