2018
DOI: 10.1080/08874417.2018.1477076
|View full text |Cite
|
Sign up to set email alerts
|

Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 20 publications
0
15
0
3
Order By: Relevance
“…Apparently, the smart-contracts technology that comes with Ethereum is crucial for the ICO process. Turning to Monero (XMR), in an insightful study regarding crypto-mining malware attacks Zimba et al (2018) show that in most such cases, Monero was in fact the cryptocurrency of choice. This in turn, might be very much attributed to the unique anonymity/untraceability features characterizing Monero that are thoroughly discussed in Prasad (2018).…”
Section: Net Dynamic Connectedness and Market Complexitymentioning
confidence: 99%
“…Apparently, the smart-contracts technology that comes with Ethereum is crucial for the ICO process. Turning to Monero (XMR), in an insightful study regarding crypto-mining malware attacks Zimba et al (2018) show that in most such cases, Monero was in fact the cryptocurrency of choice. This in turn, might be very much attributed to the unique anonymity/untraceability features characterizing Monero that are thoroughly discussed in Prasad (2018).…”
Section: Net Dynamic Connectedness and Market Complexitymentioning
confidence: 99%
“…Existe uma ampla literatura sobre ataques de sequestro de mineração (cryptojacking) [Segura 2018, Rüth et al 2018, Hong et al 2018, Kharraz et al 2019, Zimba and Wang 2018. Nesses ataques, o usuário que tem a máquina sequestrada tipicamente acessa uma página que aparenta ser inócua mas que, de forma escondida, executa Javascript de mineração usando recursos de CPU e memória sem autorização do usuário.…”
Section: Trabalhos Relacionadosunclassified
“…Este trabalhoé focado em uma nova classe de ataques de mineração. Os ataques previamente reportados na literatura [Segura 2018, Rüth et al 2018, Hong et al 2018, Kharraz et al 2019, Zimba and Wang 2018 contavam com usuários honestos sendo explorados remotamente e possivelmente monitorados localmente. Neste trabalho, por outro lado, foi considerado usuários de infraestruturas públicas, e.g., da Universidade Federal do Rio de Janeiro -UFRJ, cujas máquinas podem ser exploradas localmente, por acesso físicoàs mesmas, e monitoradas remotamente, e.g., pela Diretoria de Segurança da Informação da UFRJ.…”
Section: Introductionunclassified
“…A study performed by Luu et al discovered that 8,833 out of the 19,366 existing Ethereum contracts are vulnerable. Atzei et al 8 analysed the security vulnerabilities of Ethereum smart contracts, and provided a taxonomy of common programming pitfalls that may lead to vulnerabilities, Zimba et al 9 investigated crypto mining attacks by examining malware code and suggested mitigations, while Li et al 10 analysed the vulnerabilities in Blockchain systems and compiled a list of security risks to Blockchain systems.…”
Section: Introductionmentioning
confidence: 99%