Unearthing malicious campaigns and actors from the blockchain DNS ecosystem

F Casino, N Lykousas, V Katos, C Patsakis - Computer Communications, 2021 - Elsevier
Blockchain DNS has emerged as an alternative solution to traditional DNS to address many
of its inherent drawbacks. In this regard, a blockchain DNS approach is decentralised …

The Challenges of Blockchain-Based Naming Systems for Malware Defenders

A Randall, W Hardaker, GM Voelker… - … on Electronic Crime …, 2022 - ieeexplore.ieee.org
Successful malware campaigns often rely on the ability of infected hosts to locate and
contact their command-and-control (C2) servers. Malware campaigns often use DNS …

Unravelling ariadne's thread: Exploring the threats of decentralised dns

C Patsakis, F Casino, N Lykousas, V Katos - IEEE Access, 2020 - ieeexplore.ieee.org
The current landscape of the core Internet technologies shows considerable centralisation
with the big tech companies controlling the vast majority of traffic and services. This situation …

Leopard: Understanding the threat of blockchain domain name based malware

Z Huang, J Huang, T Zang - … , PAM 2020, Eugene, Oregon, USA, March 30 …, 2020 - Springer
Recently, as various detection approaches of malicious domains and malware are
proposed, the malware which connects to its command and control (C&C) server using …

Ethereum name service: the good, the bad, and the ugly

P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu - arXiv preprint arXiv:2104.05185, 2021 - arxiv.org
DNS has always been criticized for its inherent design flaws, making the system vulnerable
to kinds of attacks. Besides, DNS domain names are not fully controlled by the users, which …

The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web

P Xia, Z Yu, K Wang, K Ma, S Chen, X Luo… - arXiv preprint arXiv …, 2024 - arxiv.org
The dark web has emerged as the state-of-the-art solution for enhanced anonymity. Just like
a double-edged sword, it also inadvertently becomes the safety net and breeding ground for …

Malware detection in blockchain using CNN

A Alam, H Islam, SA Wamim, MT Ahmed, H Siddiqi - 2021 - dspace.bracu.ac.bd
The inherent decentralized nature and peer-to-peer system of the blockchain's popularity
has been on the rise in recent times and is being adopted in various innovative applications …

Assessing the threat of blockchain-based botnets

L Böck, N Alexopoulos, E Saracoglu… - … on Electronic Crime …, 2019 - ieeexplore.ieee.org
Time and time again the security community has faced novel threats that were previously
never analyzed, sometimes with catastrophic results. To avoid this, proactive analysis of …

Detecting blockchain security threats

B Putz, G Pernul - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
In many organizations, permissioned blockchain networks are currently transitioning from a
proof-of-concept stage to production use. A crucial part of this transition is ensuring …

Analyzing malicious activities and detecting adversarial behavior in cryptocurrency based permissionless blockchains: An Ethereum usecase

R Agarwal, T Thapliyal, S Shukla - Distributed Ledger Technologies …, 2022 - dl.acm.org
Different malicious activities occur in cryptocurrency-based permissionless blockchains such
as Ethereum and Bitcoin. Some activities are due to the exploitation of vulnerabilities which …