Proceedings 2020 Workshop on Measurements, Attacks, and Defenses for the Web 2020
DOI: 10.14722/madweb.2020.23002
|View full text |Cite
|
Sign up to set email alerts
|

Browser-Based Deep Behavioral Detection of Web Cryptomining with CoinSpy

Abstract: Although the cryptocurrency hype over the past year may be seen by some as a benign social fad, to the Web community it is the center point for a series of ethically dubious ransomware attacks. Browser based cryptomining, or cryptojacking has gained widespread attention. Cryptojacking consists of Web servers delivering cryptocurrency mining scripts to clients, and using the client resources to play part in a distributed coin mining scheme. Although Web server operators defend the ethics of their involvement by… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Bian et al [15] proposed MineThrottle, which uses a block-level profiler and dynamic instrumentation of the Wasm code that is pointed by the profiler at compile time. Kelton et al [19] proposed CoinSpy which utilizes computation, memory, and network features. Conti et al [23] used Hardware Performance Counters (HPC) data to detect cryptojacking.…”
Section: A Malicious Cryptocurreny Mining Detection Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…Bian et al [15] proposed MineThrottle, which uses a block-level profiler and dynamic instrumentation of the Wasm code that is pointed by the profiler at compile time. Kelton et al [19] proposed CoinSpy which utilizes computation, memory, and network features. Conti et al [23] used Hardware Performance Counters (HPC) data to detect cryptojacking.…”
Section: A Malicious Cryptocurreny Mining Detection Systemsmentioning
confidence: 99%
“…However, only a small portion of prior studies [17], [10], [12] take this change into account. Secondly, cryptojacking detection systems [17], [10], [12], [18], [15], [19] relying on dynamic analysis features can suffer from high computational overhead, reduced measurement accuracies due to noise caused by other processes, and false positives resulted from benign websites using the same technologies. For this reason, practical applications of such schemes may cause quality-of-experience issues for end-users.…”
Section: B Challenges and Need For A New Detection Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…Existing cryptojacking detection approaches mainly use the following four techniques: blacklisting-based [14], [16], [25], [37], [42], [45], resource monitoring-based [38], [40], thread count-based [38], [41], and WebAssembly-based techniques [35], [42]. Although they all provide insights into detecting cryptojacking, they have limitations in terms of the precise detection of cryptojacking.…”
Section: Introductionmentioning
confidence: 99%