Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23070
|View full text |Cite
|
Sign up to set email alerts
|

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation

Abstract: The proliferation of web applications has essentially transformed modern browsers into small but powerful operating systems. Upon visiting a website, user devices run implicitly trusted script code, the execution of which is confined within the browser to prevent any interference with the user's system. Recent JavaScript APIs, however, provide advanced capabilities that not only enable feature-rich web applications, but also allow attackers to perform malicious operations despite the confined nature of JavaScr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 16 publications
(25 reference statements)
0
18
0
Order By: Relevance
“…The intuition as to why these features should scale in future is that, even if some implementation details of Web mining scripts change, they still must use some underlying similar Web APIs whose behaviors are less likely to change [33]. Secondly, it is known that the PoW algorithms used by Web miners must be memory-bound to be profitable to mine on commodity devices [10], [14].…”
Section: Why Are These Features Future-proof?mentioning
confidence: 99%
See 3 more Smart Citations
“…The intuition as to why these features should scale in future is that, even if some implementation details of Web mining scripts change, they still must use some underlying similar Web APIs whose behaviors are less likely to change [33]. Secondly, it is known that the PoW algorithms used by Web miners must be memory-bound to be profitable to mine on commodity devices [10], [14].…”
Section: Why Are These Features Future-proof?mentioning
confidence: 99%
“…Our goal is to evaluate CoinSpy over other players in the cryptomining landscape. Thus, we evaluate CoinSpy against cryptomining players identified by existing works [23], [37], [33]. These miners primarily use CryptoNight [10] and ETHash PoWs [44], but span many cryptocurrency blockchains (Monero, JSECoin, UPlexa).…”
Section: Extending Coinspy To Other Mining Familiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Lee et al demonstrated cryptocurrency mining in the background that uses malicious service workers, and mined Monero coins through verified 225K transactions in a day [36]. Moreover, Papadopoulos et al developed a monitoring framework to allow malicious service workers to abuse browser resources and found the following harmful operations: DDoS attacks, distributed password cracking, malicious data hosting, proxies of a hidden network, and cryptocurrency mining [47].…”
Section: B Abusable Browser Resourcesmentioning
confidence: 99%