A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
SoK: cryptojacking malware
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
Opening the blackbox of virustotal: Analyzing online phishing scan engines
Online scan engines such as VirusTotal are heavily used by researchers to label malicious
URLs and files. Unfortunately, it is not well understood how the labels are generated and …
URLs and files. Unfortunately, it is not well understood how the labels are generated and …
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …
mine cryptocurrency without obtaining the users' consent. In this paper, we design …
[PDF][PDF] MINOS: A Lightweight Real-Time Cryptojacking Detection System.
Emerging WebAssembly (Wasm)-based cryptojacking malware covertly uses the
computational resources of users without their consent or knowledge. Indeed, most victims …
computational resources of users without their consent or knowledge. Indeed, most victims …
[HTML][HTML] Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection
G Xu, W Dong, J **ng, W Lei, J Liu, L Gong… - Digital Communications …, 2023 - Elsevier
Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly
executes the cryptocurrency mining program in the target host to gain profits. It has been …
executes the cryptocurrency mining program in the target host to gain profits. It has been …
Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review
Cryptocurrencies have been a target for cybercriminal activities because of the pseudo-
anonymity and privacy they offer. Researchers have been actively working on analyzing and …
anonymity and privacy they offer. Researchers have been actively working on analyzing and …
A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth
Illicit crypto-mining leverages resources stolen from victims to mine cryptocurrencies on
behalf of criminals. While recent works have analyzed one side of this threat, ie: web …
behalf of criminals. While recent works have analyzed one side of this threat, ie: web …
[HTML][HTML] Cryptomining makes noise: Detecting cryptojacking via machine learning
Cryptojacking occurs when an adversary illicitly runs crypto-mining software over the
devices of unaware users. This novel cybersecurity attack, that is emerging in both the …
devices of unaware users. This novel cybersecurity attack, that is emerging in both the …
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …
new developments, modern vehicles are getting increasingly astute and offering growing …