SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

Everything old is new again: Binary security of {WebAssembly}

D Lehmann, J Kinder, M Pradel - 29th USENIX Security Symposium …, 2020 - usenix.org
WebAssembly is an increasingly popular compilation target designed to run code in
browsers and on other platforms safely and securely, by strictly separating code and data …

An empirical study of real-world webassembly binaries: Security, languages, use cases

A Hilbig, D Lehmann, M Pradel - Proceedings of the web conference …, 2021 - dl.acm.org
WebAssembly has emerged as a low-level language for the web and beyond. Despite its
popularity in different domains, little is known about WebAssembly binaries that occur in the …

Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense

RK Konoth, E Vineti, V Moonsamy, M Lindorfer… - Proceedings of the …, 2018 - dl.acm.org
A wave of alternative coins that can be effectively mined without specialized hardware, and
a surge in cryptocurrencies' market value has led to the development of cryptocurrency …

Cryptomining detection in container clouds using system calls and explainable machine learning

RR Karn, P Kudva, H Huang, S Suneja… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The use of containers in cloud computing has been steadily increasing. With the emergence
of Kubernetes, the management of applications inside containers (or pods) is simplified …

[PDF][PDF] MINOS: A Lightweight Real-Time Cryptojacking Detection System.

FN Naseem, A Aris, L Babun, E Tekiner, AS Uluagac - NDSS, 2021 - researchgate.net
Emerging WebAssembly (Wasm)-based cryptojacking malware covertly uses the
computational resources of users without their consent or knowledge. Indeed, most victims …

[HTML][HTML] Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection

G Xu, W Dong, J Xing, W Lei, J Liu, L Gong… - Digital Communications …, 2023 - Elsevier
Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly
executes the cryptocurrency mining program in the target host to gain profits. It has been …

A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth

S Pastrana, G Suarez-Tangil - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Illicit crypto-mining leverages resources stolen from victims to mine cryptocurrencies on
behalf of criminals. While recent works have analyzed one side of this threat, ie: web …

Less is more: Quantifying the security benefits of debloating web applications

BA Azad, P Laperdrix, N Nikiforakis - 28th USENIX Security Symposium …, 2019 - usenix.org
As software becomes increasingly complex, its attack surface expands enabling the
exploitation of a wide range of vulnerabilities. Web applications are no exception since …

Hidenoseek: Camouflaging malicious javascript in benign asts

A Fass, M Backes, B Stock - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
In the malware field, learning-based systems have become popular to detect new malicious
variants. Nevertheless, attackers with specific and internal knowledge of a target system may …