2022
DOI: 10.1007/s11416-022-00420-7
|View full text |Cite
|
Sign up to set email alerts
|

MinerAlert: an hybrid approach for web mining detection

Abstract: The introduction of new memory-based crypto-mining techniques and the rise of new web technologies like WebAssembly, made the use of browsers for crypto-currencies mining more and more convenient and popular. That, in turn, originated a new form of computer piracy, called cryptojacking, which is rapidly gaining ground on the web. A cryptojacking site exploits its visitors’ hardware resources to secretly mine crypto-currencies. This paper analyzes current web-based cryptojacking detection methods in order to pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…The regional pollution near mine alteration has significant pipeline flow characteristics. By blocking the channel of polluted water into the karst pipeline through curtain blocking, the flow of pollution can be separated and the path of pollutants into the mine karst pipeline can be controlled [13].…”
Section: End Pollution Channel Curtain Blocking Technology Based On P...mentioning
confidence: 99%
“…The regional pollution near mine alteration has significant pipeline flow characteristics. By blocking the channel of polluted water into the karst pipeline through curtain blocking, the flow of pollution can be separated and the path of pollutants into the mine karst pipeline can be controlled [13].…”
Section: End Pollution Channel Curtain Blocking Technology Based On P...mentioning
confidence: 99%
“…In order to not letting the user being aware of such activity, the apps listen to events related to the battery and stop the mining activity as soon as a threshold is reached. The apps download the configuration files for the mining from a link 9 which was no longer available during our analysis. We were also unable to run the app which kept crashing on the test device.…”
Section: Functioning and Evasion Techniques Of The Crypto Jacking Appsmentioning
confidence: 99%
“…Considering that two majors events happened around that time, namely (1) the Google Play Store's policy to ban apps that mine using the device's resources starting from July 2018 [6], [7] and (2) the discontinuation of Coinhive, which alone contributed to more than half of the mining apps in the studied period [8], the lack of research on the subject appears to us as a counter-intuitive outcome. In comparison, many recent studies of web-based [9], [10], [11], and general-purpose miners [12], [13], [14] have been conducted. The prevalence of the cryptojacking problem on Android devices and its expected damaging effects make it essential to understand the various mechanisms currently used to mine cryptocurrencies on Android devices [15].…”
Section: Introductionmentioning
confidence: 99%