Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243858
|View full text |Cite
|
Sign up to set email alerts
|

MineSweeper

Abstract: A wave of alternative coins that can be effectively mined without specialized hardware, and a surge in cryptocurrencies' market value has led to the development of cryptocurrency mining (cryptomining) services, such as Coinhive, which can be easily integrated into websites to monetize the computational power of their visitors. While legitimate website operators are exploring these services as an alternative to advertisements, they have also drawn the attention of cybercriminals: drive-by mining (also known as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 101 publications
(14 citation statements)
references
References 20 publications
0
13
0
1
Order By: Relevance
“…A similar study has addressed the clandestine ecosystem of malicious Monero mining binaries [20]. Other longitudinal studies addressed in-browser cryptojacking, most prominently MineSweeper [28], presenting a new detection technique using static JavaScript analysis and monitoring CPU cache events during Web-Assembly execution. An analysis of Alexa's top 1 million sites provided insights into campaigns' earning estimates, distribution networks, pools, proxies and services.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A similar study has addressed the clandestine ecosystem of malicious Monero mining binaries [20]. Other longitudinal studies addressed in-browser cryptojacking, most prominently MineSweeper [28], presenting a new detection technique using static JavaScript analysis and monitoring CPU cache events during Web-Assembly execution. An analysis of Alexa's top 1 million sites provided insights into campaigns' earning estimates, distribution networks, pools, proxies and services.…”
Section: Related Workmentioning
confidence: 99%
“…Previous longitudinal studies investigated the distribution of well-known cryptomining services in web pages [25,28,27]. Our collection included the top 3: Coinhive, CoinIMP [109], and CryptoLoot [22].…”
Section: Detection Of In-browser Miningmentioning
confidence: 99%
See 1 more Smart Citation
“…Utilizar todo o poder computacional dos usuários pode prejudicar as suas experiências ao navegar na própria página, impactando negativamente na sua popularidade. No entanto, atacantes podem bene ciar-se economicamente de ataques de in-browser cryptojacking ao infectar páginas que oferecem entretenimento e conteúdo envolvendo pirataria, pois usuários passam mais tempo procurando por recursos nessa categoria de páginas Konoth et al (2018), Hong et al (2018).…”
Section: Mineração Através De Navegadoresunclassified
“…• Ponzi schemes (Vasek & Moore, 2015;Esoimeme, 2018;Bartoletti, Pes, & Serusi, 2018;Zhang, Kang, Dai, Chen, & Zhu, 2021;Wang, Cheng, Zheng, Yang, & Zhu, 2021); • money laundering (Levin, O'Brien, & Zuberi, 2015;Rivera, 2019;Hendrickson & Luther, 2022;Bartoletti et al, 2018;Barth, Herath, & Xu, 2020;Broadhead, 2018;van Wegberg, Oerlemans, & van Deventer, 2018;Dupuis & Gleason, 2021;Wronka, 2022); • mining botnets (Huang et al, 2014;Konoth et al, 2018) and the theft of "brainwallets" (Vasek, Bonneau, Castellucci, Keith, & Moore, 2016).…”
Section: Introductionmentioning
confidence: 99%