Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23044
|View full text |Cite
|
Sign up to set email alerts
|

Botcoin: Monetizing Stolen Cycles

Abstract: Abstract-At the current stratospheric value of Bitcoin, miners with access to significant computational horsepower are literally printing money. For example, the first operator of a USD $1,500 custom ASIC mining platform claims to have recouped his investment in less than three weeks in early February 2013, and the value of a bitcoin has more than tripled since then. Not surprisingly, cybercriminals have also been drawn to this potentially lucrative endeavor, but instead are leveraging the resources available … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
45
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 57 publications
(46 citation statements)
references
References 11 publications
1
45
0
Order By: Relevance
“…The popular black market website Silk Road [30] operated from Feb. 2011 until Oct. 2013 when it was seized and shut down by the FBI. Botnets have found Bitcoin mining to be a supplemental source of income [57]. A current US federal court case involves a large Bitcoinbased Ponzi scheme [109].…”
Section: A a Contextualized Historymentioning
confidence: 99%
“…The popular black market website Silk Road [30] operated from Feb. 2011 until Oct. 2013 when it was seized and shut down by the FBI. Botnets have found Bitcoin mining to be a supplemental source of income [57]. A current US federal court case involves a large Bitcoinbased Ponzi scheme [109].…”
Section: A a Contextualized Historymentioning
confidence: 99%
“…al consider Bitcoin mining malware and quantify the amount of bitcoin that Bitcoin mining botnets have minted using the block chain [8]. Our paper does not consider malware, but our block chain analysis techniques are similar to those of Huang et.…”
Section: Related Workmentioning
confidence: 99%
“…These malware either mine independently or participate in public or dark mining pools, connecting either directly or through proxies [26]. Customized malware builds have also been found for smartphones, webcams, and even network storage devices.…”
Section: Theft and Malwarementioning
confidence: 99%