" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms

C Fu, Q Li, K Xu, J Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …

SoK: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild

Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu… - Proceedings of the …, 2023 - dl.acm.org
Cryptocurrency mining is a crucial operation in blockchains, and miners often join mining
pools to increase their chances of earning rewards. However, the energy-intensive nature of …

Prevention of cryptojacking attacks in business and FinTech applications

S Ullah, T Ahmad, R Ahmad, M Aslam - Handbook of Research on …, 2023 - igi-global.com
More than 2000 different cryptocurrencies are currently available in business and FinTech
applications. Cryptocurrency is a digital payment system that does not rely on banks to verify …

Magtracer: Detecting GPU cryptojacking attacks via magnetic leakage signals

R Xiao, T Li, S Ramesh, J Han, J Han - Proceedings of the 29th Annual …, 2023 - dl.acm.org
GPU cryptojacking is an attack that hijacks GPU resources of victims for cryptocurrency
mining. Such attack is becoming an emerging threat to both local hosts and cloud platforms …

A Survey on Consumer IoT Traffic: Security and Privacy

Y Jia, Y Song, Z Liu, Q Tan, F Wang, Y Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
For the past few years, the Consumer Internet of Things (CIoT) has entered public lives.
While CIoT has improved the convenience of people's daily lives, it has also brought new …

Poster: Adversarial perturbation attacks on the state-of-the-art cryptojacking detection system in iot networks

K Lee, S Oh, H Kim - Proceedings of the 2022 ACM SIGSAC Conference …, 2022 - dl.acm.org
The popularity of cryptocurrency raised a new cyber security threat dubbed cryptojacking
representing malicious activities for abusing victims' computing resources without their …

The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android

BV Adjibi, FN Mbodji, TF Bissyandé… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
This paper investigates the various technical and non-technical tools and techniques that
software developers use to build and disseminate crypto mining apps on Android devices …

Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots

J Franco, A Acar, A Aris… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Blockchain-based cryptocurrencies have transformed financial transactions and created
opportunities to profit from generating new coins through cryptomining. This has led to …