{"id":"https://openalex.org/W7106125244","doi":"https://doi.org/10.48550/arxiv.2511.14611","title":"SecureSign: Bridging Security and UX in Mobile Web3 through Emulated EIP-6963 Sandboxing","display_name":"SecureSign: Bridging Security and UX in Mobile Web3 through Emulated EIP-6963 Sandboxing","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W7106125244","doi":"https://doi.org/10.48550/arxiv.2511.14611"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2511.14611","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.14611","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2511.14611","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ji, Charles Cheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ji, Charles Cheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Kong, Brandon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kong, Brandon","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.2624000012874603,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.2624000012874603,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.22930000722408295,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.1800999939441681,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4950000047683716},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.46709999442100525},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4447000026702881},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.44440001249313354},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.4146000146865845},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.38960000872612},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.3781000077724457},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.3682999908924103},{"id":"https://openalex.org/keywords/download","display_name":"Download","score":0.36739999055862427}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.754800021648407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5489000082015991},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4950000047683716},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.46709999442100525},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4447000026702881},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.44440001249313354},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.4146000146865845},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4009000062942505},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.38960000872612},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3824000060558319},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.3781000077724457},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.3682999908924103},{"id":"https://openalex.org/C2780154274","wikidata":"https://www.wikidata.org/wiki/Q7126717","display_name":"Download","level":2,"score":0.36739999055862427},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.36399999260902405},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3303999900817871},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.3192000091075897},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3140999972820282},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.30820000171661377},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.296099990606308},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.2655999958515167},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.263700008392334},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2511.14611","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.14611","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2511.14611","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.14611","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.5336050987243652,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Mobile":[0],"Web3":[1,109],"faces":[2],"catastrophic":[3],"retention":[4,45],"(&lt;":[5],"5%)":[6],"yielding":[7],"effective":[8],"acquisition":[9],"costs":[10],"of":[11,41],"\\$500":[12],"-":[13,43],"\\$1,000":[14],"per":[15],"retained":[16],"user.":[17],"Existing":[18],"solutions":[19],"force":[20],"an":[21],"impossible":[22],"tradeoff:":[23],"embedded":[24],"wallets":[25,35],"achieve":[26],"moderate":[27],"usability":[28],"but":[29],"suffer":[30],"inherent":[31],"click-jacking":[32,83],"vulnerabilities;":[33],"app":[34],"maintain":[36],"security":[37,64],"at":[38],"the":[39],"cost":[40],"2":[42],"3%":[44],"due":[46],"to":[47,65,116],"download":[48],"friction":[49],"and":[50,85,119],"context-switching":[51],"penalties.":[52],"We":[53],"present":[54],"SecureSign,":[55],"a":[56,78],"PWA-based":[57],"architecture":[58],"that":[59],"adapts":[60],"desktop":[61],"browser":[62],"extension":[63],"mobile":[66,91],"via":[67],"EIP-6963":[68],"provider":[69],"sandboxing.":[70],"SecureSign":[71],"isolates":[72],"dApp":[73],"execution":[74],"in":[75],"iframes":[76],"within":[77],"trusted":[79],"parent":[80],"application,":[81],"achieving":[82],"immunity":[84,115],"transaction":[86],"integrity":[87],"while":[88,122],"enabling":[89],"native":[90],"capabilities":[92],"(push":[93],"notifications,":[94],"home":[95],"screen":[96],"installation,":[97],"zero":[98],"context-switching).":[99],"Our":[100],"drop-in":[101],"SDK":[102],"requires":[103],"no":[104],"codebase":[105],"changes":[106],"for":[107],"existing":[108],"applications.":[110],"Threat":[111],"model":[112],"analysis":[113],"demonstrates":[114],"click-jacking,":[117],"overlay,":[118],"skimming":[120],"attacks":[121],"maintaining":[123],"wallet":[124],"interoperability":[125],"across":[126],"dApps.":[127]},"counts_by_year":[],"updated_date":"2025-11-20T23:17:41.989164","created_date":"2025-11-20T00:00:00"}
