2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE) 2019
DOI: 10.1109/icitisee48480.2019.9003742
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of Cryptojacking Attacks Using Taint Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…A majority of the detection mechanisms do not focus on preventing or interrupting of cryptojacking malware; however, there are still several studies [116], [122], [123] focusing on both the detection and prevention of cryptojacking malware. Using dynamic features to detect ongoing cryptojacking is like other dynamic analysis studies, but their prevention methods vary.…”
Section: Cryptojacking Prevention Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…A majority of the detection mechanisms do not focus on preventing or interrupting of cryptojacking malware; however, there are still several studies [116], [122], [123] focusing on both the detection and prevention of cryptojacking malware. Using dynamic features to detect ongoing cryptojacking is like other dynamic analysis studies, but their prevention methods vary.…”
Section: Cryptojacking Prevention Studiesmentioning
confidence: 99%
“…Using dynamic features to detect ongoing cryptojacking is like other dynamic analysis studies, but their prevention methods vary. While Yulianto et al [122] only raises a notification, Bian et al [116] sleep the mining process, and Razali et al [123] directly kill the related process.…”
Section: Cryptojacking Prevention Studiesmentioning
confidence: 99%
“…All blocks contained in the blockchain are connected with different or unique hashes and nonce. The node spreads decentralized, then the blocks in the node cannot be changed and can be verified by many parties [2,17]. Blockchain uses many nodes scattered in the network, so that the number of nodes scattered will complicate the attacker in the breach of the system.…”
Section: Blockchainmentioning
confidence: 99%
“…Blockchain uses many nodes scattered in the network, so that the number of nodes scattered will complicate the attacker in the breach of the system. One of the uniqueness of blockchain technology is the existence of mining which is called a miner if succeeds in solving a mathematical problem it will get a coin [17].…”
Section: Blockchainmentioning
confidence: 99%
“…Hackers who succeed in getting the user passwords from one platform can also stole the user data on another platforms. Therefore, password-based authentication cannot accommodate the security and confidentiality of account data [8,9,10].…”
Section: Introductionmentioning
confidence: 99%