The World Wide Web Conference 2019
DOI: 10.1145/3308558.3313665
|View full text |Cite
|
Sign up to set email alerts
|

Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
67
0
4

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(73 citation statements)
references
References 21 publications
0
67
0
4
Order By: Relevance
“…10 See Appendix C for details about other sources crawled. 11 For a detailed analysis, see Table XV from Appendix D. # campaigns with wallet addresses for: # samples seen in: Monero 2,449 Bitcoin 1,535 zCash 178 Electroneum 150 Ethereum 132 Aeon 57 Sumokoin 18 Intensecoin 8 Turtlecoin 3 Bytecoin 1 Year BTC XMR 2012 9 1 2013 23 3 2014 223 281 2015 Out of all the samples with wallets, we rely on the first seen value (obtained from the metadata of the samples provided by Virus Total) to analyse the evolution of number of samples mining Bitcoin and Monero. Rightmost side of Table IV shows the number of samples with wallets by year for the most prevalent cryptocurrencies, i.e.…”
Section: B Longitudinal Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…10 See Appendix C for details about other sources crawled. 11 For a detailed analysis, see Table XV from Appendix D. # campaigns with wallet addresses for: # samples seen in: Monero 2,449 Bitcoin 1,535 zCash 178 Electroneum 150 Ethereum 132 Aeon 57 Sumokoin 18 Intensecoin 8 Turtlecoin 3 Bytecoin 1 Year BTC XMR 2012 9 1 2013 23 3 2014 223 281 2015 Out of all the samples with wallets, we rely on the first seen value (obtained from the metadata of the samples provided by Virus Total) to analyse the evolution of number of samples mining Bitcoin and Monero. Rightmost side of Table IV shows the number of samples with wallets by year for the most prevalent cryptocurrencies, i.e.…”
Section: B Longitudinal Analysismentioning
confidence: 99%
“…This approach misses informed consent acquired by other means, such as images or additional documents. Thus, some works also look for AuthedMine scripts, which require explicit action from users to start mining [8], [11]. In our work, we rely on AV reports and other heuristics to classify binaries into malware or goodware.…”
Section: Related Workmentioning
confidence: 99%
“…This script runs in their browser in the background, exploiting their compute resources. There has been an 8500% increase in cryptojacking Web pages [40] and 0.06 -0.08% of the Alexa Top 1 Million sites have been shown to be delivering cryptojacking scripts [21], [37]. This is largely made possible by the popularization of new families of cryptocurrency (e.g., Monero coin [25]) that enable mining for coins without custom hardware.…”
Section: Introductionmentioning
confidence: 99%
“…To date, there has been much work highlighting the presence, economic impact, and obtrusiveness, of Web mining [14], [37], [38]. There has also been an influx of recent works that focus on extracting features, both static and dynamic, of miners to build models for determining cryptomining behavior on Web pages [21], [16], [23].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation