2019
DOI: 10.1007/978-3-030-30215-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Cryptojacking Dataset Sample Type Focus of the Study [138] 2000 executable binary the practice of using compromised PCs to mine Bitcoin [139] 33282 websites script prevalence analysis [140] --how cybercriminals are exploiting cryptomining [65] 5190 websites script campaign and domain analysis [141] XMR-stak, cpuminer-multi binary attack impact on consumer devices and user annoyance [142] 5700 websites script static, dynamics and economic analysis [143] CoinHive cryptominer script sample characteristics and network traffic analysis [104] 1.2 million miners binary currencies, actors , campaign and earning analysis, underground markets [144] 107511 websites script profitability and the imposed overheads [15] 3.2 TB historical scan results script investigation of a new type of attack that exploits Internet infrastructure for cryptomining [145] --business model, threat sources, implications, mitigations, legality and ethics [146] 53 websites script sample characteristics [147] 2770 websites script activeness analysis [148] XMRig miner binary sample characteristics [135] 156 domains, 25892 proxies script impact on the web users also some new methods [150] proposed by researchers for better and more optimized blacklisting, but even dynamic blacklisting methods are not fully effective nor protective [151] against domain fluxing methods.…”
Section: Refmentioning
confidence: 99%
See 3 more Smart Citations
“…Cryptojacking Dataset Sample Type Focus of the Study [138] 2000 executable binary the practice of using compromised PCs to mine Bitcoin [139] 33282 websites script prevalence analysis [140] --how cybercriminals are exploiting cryptomining [65] 5190 websites script campaign and domain analysis [141] XMR-stak, cpuminer-multi binary attack impact on consumer devices and user annoyance [142] 5700 websites script static, dynamics and economic analysis [143] CoinHive cryptominer script sample characteristics and network traffic analysis [104] 1.2 million miners binary currencies, actors , campaign and earning analysis, underground markets [144] 107511 websites script profitability and the imposed overheads [15] 3.2 TB historical scan results script investigation of a new type of attack that exploits Internet infrastructure for cryptomining [145] --business model, threat sources, implications, mitigations, legality and ethics [146] 53 websites script sample characteristics [147] 2770 websites script activeness analysis [148] XMRig miner binary sample characteristics [135] 156 domains, 25892 proxies script impact on the web users also some new methods [150] proposed by researchers for better and more optimized blacklisting, but even dynamic blacklisting methods are not fully effective nor protective [151] against domain fluxing methods.…”
Section: Refmentioning
confidence: 99%
“…Table 4 shows cryptojacking malware analysis studies in the literature. In these studies, cryptominers are either in the format of binary [104], [138], [141], [148] or script [65], [135], [139], [142]- [144], [146], [147] except [140], [145] where the findings in these studies are based on the other studies and publicly available documents.…”
Section: Cryptojacking Analysis Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite the various alternative monetization systems [1][2][3][4], there is no doubt that digital advertising is still the dominant way of funding the web. However, digital advertising has fundamental flaws, including market fragmentation [5,6], rampant fraud [7][8][9][10][11], centralization around intermediaries (e.g., Supply/Demand-side platforms, Ad exchanges, Data Management Platforms), who absorb half of spent advertising dollars [12], and cause unprecedented privacy harm by extensively track users [13][14][15].…”
Section: Introductionmentioning
confidence: 99%