2021
DOI: 10.1007/978-981-15-9019-1_4
|View full text |Cite
|
Sign up to set email alerts
|

Facilitating Cryptojacking Through Internet Middle Boxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Coinhive is an example of a rogue mining program [57]. The programs mining Monero are packed in JavaScript at the browser end, and website dealers are able to utilize the computing power of users' computers to mine Monero by embedding Coinhive programming code in their websites [58]. Therefore, in recent years, it has been discovered that cryptocurrency mining and mining kidnapping are a primary threat in terms of network crimes.…”
Section: Common Virus Attack Methodsmentioning
confidence: 99%
“…Coinhive is an example of a rogue mining program [57]. The programs mining Monero are packed in JavaScript at the browser end, and website dealers are able to utilize the computing power of users' computers to mine Monero by embedding Coinhive programming code in their websites [58]. Therefore, in recent years, it has been discovered that cryptocurrency mining and mining kidnapping are a primary threat in terms of network crimes.…”
Section: Common Virus Attack Methodsmentioning
confidence: 99%