The security of crypto wallets depends directly on the components used and the implementation of their hardware, software, and communication protocols. Independent, third-party validation and advice by security experts is therefore critical to ensure that crypto wallets are robust against relevant threats.Download the Fact Sheet
Gain valuable insights that will drive your success
We ensure the security and robustness of crypto wallets based on more than 25 years of research, analysis, development, and operational excellence in security. Our IoT Security Labs and security experts use state-of-the-art equipment and advanced techniques to validate the security of your products and give you advice you can use.
We work with you to assess your security threats and opportunities and help you create a crypto asset wallet - whether it’s a physical one, an app, or a service - that protects keys for cryptocurrency transactions. We provide security designs, security assessments and pre-certification support for government schemes like CSPN.
How do we help you gain customer confidence and ensure the business success?
We examine five key elements of your wallet design
In more detail, here are the activities we undertake in each phase of our assessment and evaluation process
System- and device-wide market-specific threat analysis
Security Target Definition, listing of critical security controls
Classification of assets, risk, probabilities of attack vectors and impact
Validation of efficiency of security controls
Cryptographic schemes review and implementation analysis
Identification of non-addressed security risks
Remediation analysis to validate the effectiveness of countermeasures and security controls
Non-invasive low-costs attacks, advanced electrical, EM and multi-locations laser fault injection, multi-temporal hardware attacks
State of the art side-channel attacks, DPA, using deep machine learning
Application penetration testing Source code security review
Compliance validation against standards, such as BIP32, BIP39, BIP44
The following customers have depended on the Kudelski Group for our expertise in ensuring the security of their products and services.
Independent, third-party validation and advice by security experts is critical to ensure that crypto wallets are robust against relevant threats.
For more information about our Crypto Wallet Security services, contact us….
Using advanced tools in our state-of-the-art Swiss labs, we carry out a wide variety of tests and attacks on your technology in order to provide you with actionable security insights. Below are just a few of the techniques we use.
Side Channel Analysis refers to the use of information leakage related to an event which is obtained through secondary phenomenon, such as changes in power consumption or magnetic field emission.
When protections such as masking are not sufficiently efficient, it can lead to the recovery of secrets from the operation of an electronic device. Often these secrets are cryptographic keys.
Fault attacks modify the behavior of a system, by disrupting the code executed by semiconductors.
It may allow access to restricted functionality or information (keys, parameters or code) and can simplify cryptographic attacks compared to brute force attacks. It can also be used as an enabler to perform further attacks such as code dump.
Invasive techniques are performed with powerful tools for imaging (SEM) and circuit edit (FIB).
Reverse engineering allows the identification of specific logic and circuit edit tools can remove (nano-etching) or deposit materials (nano-soldering) with nanometer precision. These capabilities can be used to cut and connect circuitry within a device, allowing a permanent modification of the behavior of the chip, as well as to create probe points for accessing signals of interest.
Flawed functions and exposed network services may lead to the compromise of an entire network or system.
They allow an unverified user to steal data or gain further access, elevating privileges to administrator level, tamper with a device or get insights on means to develop targeted attacks. The extraction and the analysis of a firmware and memory content can highlight maintenance or supervisor accounts, injection flaws, buffer overflows, format strings or firmware update and secure boot vulnerabilities.