2021
DOI: 10.48550/arxiv.2103.03851
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SoK: Cryptojacking Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In addition, to the best of our knowledge, there is only one honeypot system for building automation systems. Considering the rapid increase of notorious ransomware attacks [164], cryptocurrency mining attacks [165], [166], and attacks to enterprise IoT systems [167]- [170], we believe that further research is needed which may enable us to protect smart buildings from ransomware attacks. We would like to note that building honeypots and honeynets for the unexplored IoT, IIoT and CPS applications may require realistic process models (e.g., patient vitals models, vehicle operation models, nuclear process models, etc.)…”
Section: B Open Issuesmentioning
confidence: 99%
“…In addition, to the best of our knowledge, there is only one honeypot system for building automation systems. Considering the rapid increase of notorious ransomware attacks [164], cryptocurrency mining attacks [165], [166], and attacks to enterprise IoT systems [167]- [170], we believe that further research is needed which may enable us to protect smart buildings from ransomware attacks. We would like to note that building honeypots and honeynets for the unexplored IoT, IIoT and CPS applications may require realistic process models (e.g., patient vitals models, vehicle operation models, nuclear process models, etc.)…”
Section: B Open Issuesmentioning
confidence: 99%
“…There are three types of cryptojacking attacks. 1) In-browser Cryptojacking: runs with cryptojacking websites that contain hidden mining scripts [29]. 2) In-host Cryptojacking: runs on operating systems and disks (ROM) as malicious programs [29].…”
Section: Introductionmentioning
confidence: 99%
“…1) In-browser Cryptojacking: runs with cryptojacking websites that contain hidden mining scripts [29]. 2) In-host Cryptojacking: runs on operating systems and disks (ROM) as malicious programs [29]. 3) In-memory only Cryptojacking: that runs on memory (RAM) only with malicious scripts [30].…”
Section: Introductionmentioning
confidence: 99%