Risk analysis may depend on threats assumption, the structure of the system, and threats model, the results for each custodians shall be different. Some case studies are described in this section.¶
Threats for signature keys and its actors are assumed as listed below.
And actors are assumed as the input of signature key in Figure 1.¶
-
Threats:¶
- Loss¶
- Leakage, Theft¶
- Unauthorized Use¶
-
Factors of Threats:¶
- Error in operation¶
- Maliciousness (of legitimate person)¶
- Spoofing (for legitimate person))¶
- Malicious intentions of outsiders¶
- Unintended behavior (system)¶
-
Actors:¶
- Custodians operation modules¶
- Transaction Signing modules¶
- Customer assets management function¶
- Incoming Coin management function¶
Factors of threats are organized as follow.¶
Error in operation: A human error caused by an authorized user (including an administrator) during operation of the system. For example, the expected operation was to withdraw coin equivalent to 100,000 JPY. But, the actual operation is withdrawing coin equivalent to 1,000,000 JPY.¶
Malicious acts by authorized person: An act committed with malice by an authorized person (including an administrator). For example, theft or unauthorized use of the signature key by the insider. Purpose or incentive of the act is not concerned.¶
Spoofing(of authorized person): Impersonation with a stolen credential of an authorized person. For example, the order to sell/buy/transfer cryptoassets by an external attacker impersonating a client; the malicious order of transfer or generation/signing of a transaction through access to the system with the legitimate operator/administrator credential by an unauthorized insider. Especially, theft and abuse of credential upon an account registration by impersonating a legitimate user MUST be considered. Note: Impersonation which is not caused by theft of legitimate user/authorized person's credential (e.g., Privilege escalation) are mentioned in "malicious acts by outsiders."¶
Malicious acts by outsiders: Access or operation to the system by outsiders with malicious purpose excluding spoofing. (e.g., external unauthorized access by exploiting a vulnerability; remote access to the system which enables outsiders to operate to the signature key or generate a transaction by a targetted attack to an administrator of the custodians' system.)¶
Unintended behavior: An unintended behavior of the system regardless of intention or malice. (e.g., leakage of the signature key caused by bugs of the system, generation of a transaction including an incorrect amount of assets regardless of operation.)¶
Theft and unauthorized use are threats that can only be caused by a clear malicious factor.
Risks to be considered as a result of threats are listed in Table 2.
Please note that theft and unauthorized use could happen in a case where multiple factors such as an error in operation or unintended behavior have occurred. (e.g., insertion of backdoor that transmits a signature key or tampers a signing order to the transaction in conjunction with a specific legitimate operation.) This case can be covered in countermeasures of theft or unauthorized use.¶
Table 2:
List of possible risks for the signature key, Y means applicable risk exists, - means no applicable risk exists
Risk |
Factor |
Loss |
Leakage |
Theft |
Unauthorized Use |
Illegal operation(Route is legitimate) |
End user's malicious operation |
Y |
Y |
Y |
Y |
|
Malicious operation by the administrator of customer assets management function |
Y |
Y |
Y |
Y |
|
Impersonation to end users |
Y |
Y |
Y |
Y |
|
Insider impersonating an administrator |
Y |
Y |
Y |
Y |
Intrusion from outside |
Intrusion into Tx signing function |
Y |
Y |
Y |
Y |
|
Intrusion into incoming coin management function |
Y |
Y |
Y |
Y |
|
Intrusion into customer asset management function |
Y |
Y |
Y |
Y |
|
Intrusion into custodian operation function |
Y |
Y |
Y |
Y |
Incorrect behavior is different from operation instruction |
Unintended behaviors of Tx signing function |
Y |
Y |
- |
- |
|
Unintended behaviors of incoming coin management function |
Y |
Y |
- |
- |
|
Unintended behaviors of customer asset management function |
Y |
Y |
- |
- |
|
Unintended behaviors of custodian operation function |
Y |
Y |
- |
- |
Human error |
Error in operation by end user |
Y |
Y |
- |
- |
|
Error in operation by administrator of customer asset management function |
Y |
Y |
- |
- |
The following sections outline each risk.
The control measures corresponding to each risk are shown in Section 7.3.¶