2024
DOI: 10.62527/joiv.8.2.2725
|View full text |Cite
|
Sign up to set email alerts
|

Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey

Laith M Kadhum,
Ahmad Firdaus,
Syifak Izhar Hisham
et al.

Abstract: Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptoj… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 25 publications
(33 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?