SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review

E Badawi, GV Jourdan - IEEE Access, 2020 - ieeexplore.ieee.org
Cryptocurrencies have been a target for cybercriminal activities because of the pseudo-
anonymity and privacy they offer. Researchers have been actively working on analyzing and …

Everything old is new again: Binary security of {WebAssembly}

D Lehmann, J Kinder, M Pradel - 29th USENIX Security Symposium …, 2020 - usenix.org
WebAssembly is an increasingly popular compilation target designed to run code in
browsers and on other platforms safely and securely, by strictly separating code and data …

An empirical study of real-world webassembly binaries: Security, languages, use cases

A Hilbig, D Lehmann, M Pradel - Proceedings of the web conference …, 2021 - dl.acm.org
WebAssembly has emerged as a low-level language for the web and beyond. Despite its
popularity in different domains, little is known about WebAssembly binaries that occur in the …

A Systematical and longitudinal study of evasive behaviors in windows malware

N Galloro, M Polino, M Carminati, A Continella… - Computers & …, 2022 - Elsevier
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …

[PDF][PDF] MINOS: A Lightweight Real-Time Cryptojacking Detection System.

FN Naseem, A Aris, L Babun, E Tekiner, AS Uluagac - NDSS, 2021 - researchgate.net
Emerging WebAssembly (Wasm)-based cryptojacking malware covertly uses the
computational resources of users without their consent or knowledge. Indeed, most victims …

A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth

S Pastrana, G Suarez-Tangil - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Illicit crypto-mining leverages resources stolen from victims to mine cryptocurrencies on
behalf of criminals. While recent works have analyzed one side of this threat, ie: web …

[HTML][HTML] Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection

G Xu, W Dong, J Xing, W Lei, J Liu, L Gong… - Digital Communications …, 2023 - Elsevier
Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly
executes the cryptocurrency mining program in the target host to gain profits. It has been …

Detection of encrypted cryptomining malware connections with machine and deep learning

A Pastor, A Mozo, S Vakaruk, D Canavese… - IEEE …, 2020 - ieeexplore.ieee.org
Nowadays, malware has become an epidemic problem. Among the attacks exploiting the
computer resources of victims, one that has become usual is related to the massive amounts …

Finding the dwarf: recovering precise types from WebAssembly binaries

D Lehmann, M Pradel - Proceedings of the 43rd ACM SIGPLAN …, 2022 - dl.acm.org
The increasing popularity of WebAssembly creates a demand for understanding and reverse
engineering WebAssembly binaries. Recovering high-level function types is an important …