A first look at code obfuscation for webassembly

S Bhansali, A Aris, A Acar, H Oz… - Proceedings of the 15th …, 2022 - dl.acm.org
WebAssembly (Wasm) has seen a lot of attention lately as it spreads through the mobile
computing domain and becomes the new standard for performance-oriented web …

[HTML][HTML] WebAssembly diversification for malware evasion

J Cabrera-Arteaga, M Monperrus, T Toady… - Computers & Security, 2023 - Elsevier
WebAssembly has become a crucial part of the modern web, offering a faster alternative to
JavaScript in browsers. While boosting rich applications in browser, this technology is also …

[PDF][PDF] A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.

E Tekiner, A Acar, AS Uluagac - NDSS, 2022 - ndss-symposium.org
Recently, cryptojacking malware has become an easy way of reaching and profiting from a
large number of victims. Prior works studied the cryptojacking detection systems focusing on …

Prevention of cryptojacking attacks in business and FinTech applications

S Ullah, T Ahmad, R Ahmad, M Aslam - Handbook of Research on …, 2023 - igi-global.com
More than 2000 different cryptocurrencies are currently available in business and FinTech
applications. Cryptocurrency is a digital payment system that does not rely on banks to verify …

A mining town in a digital land: browser-based cryptocurrency mining as an alternative to online advertising

A Yayla, E Dincelli, S Parameswaran - Information Systems Frontiers, 2024 - Springer
Advertising has been the most common strategy for content monetization. However,
behavioral data collection for personalized advertisements has raised privacy concerns …

Forensic Analysis of Cryptojacking in Host-Based Docker Containers Using Honeypots

J Franco, A Acar, A Aris… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Blockchain-based cryptocurrencies have transformed financial transactions and created
opportunities to profit from generating new coins through cryptomining. This has led to …

A Systematic Study About Crypto Jacking

B Sriman, SG Kumar, S Dhanushram… - 2023 International …, 2023 - ieeexplore.ieee.org
In this paper, we examine Crypto Jacking which is the significant threat to the world and how
this threat is handled by the advanced technologies like Artificial Intelligence …

Alternet-Monetizing Computing Resources for an Ad-Free Web Experience

PB GH, HP Pruthvi, PA Kulkarni - 2022 IEEE 2nd …, 2022 - ieeexplore.ieee.org
The advent of web surfing paved the way for internet monetization, which has become an
integral part of every user's web experience. Displaying ads on websites has been a major …

[PDF][PDF] Student Number: 180240438

N Hitch - 2022 - royalholloway.ac.uk
This report is one of the required modules for the course MSc in Information Security at
Royal Holloway, University of London. This is a longitudinal study for the adoption of several …