Proceedings of the 14th International Conference on Availability, Reliability and Security 2019
DOI: 10.1145/3339252.3339261
|View full text |Cite
|
Sign up to set email alerts
|

Thieves in the Browser

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…In such situations, a user must be vigilant of the means and methods of cryptojacking, high utilization of CPU, 119,123 battery consumption, 124 overheating, sluggish performance, up‐to‐date security measures, 116,117 responsible websites, anti‐malware software, add‐ons specifically designed to detect and block cryptojacking scripts, Ad blockers by blocking malicious advertisements, script‐blocking extensions or browser settings to disable JavaScript on websites, user educations are some detections and countermeasures that can significantly reduce the risk of falling victim to cryptojacking attacks and protect their computing resources from unauthorized cryptocurrency mining 117,124 . Musch et al 125 proposed a 3‐phase analysis approach to detect cryptojacking scripts. Saad et al 124 built an analytical model to scrutinize the practicality of cryptojacking as an alternative to online advertisement and they underlined that it was not feasible.…”
Section: Discussion Of the Endpoint Vulnerabilitiesmentioning
confidence: 99%
“…In such situations, a user must be vigilant of the means and methods of cryptojacking, high utilization of CPU, 119,123 battery consumption, 124 overheating, sluggish performance, up‐to‐date security measures, 116,117 responsible websites, anti‐malware software, add‐ons specifically designed to detect and block cryptojacking scripts, Ad blockers by blocking malicious advertisements, script‐blocking extensions or browser settings to disable JavaScript on websites, user educations are some detections and countermeasures that can significantly reduce the risk of falling victim to cryptojacking attacks and protect their computing resources from unauthorized cryptocurrency mining 117,124 . Musch et al 125 proposed a 3‐phase analysis approach to detect cryptojacking scripts. Saad et al 124 built an analytical model to scrutinize the practicality of cryptojacking as an alternative to online advertisement and they underlined that it was not feasible.…”
Section: Discussion Of the Endpoint Vulnerabilitiesmentioning
confidence: 99%
“…Overall, this dynamic approach achieved a recall value of 90% while using the network traffic studied via the Stratum protocol as a dataset of six cryptocurrencies. Musch et al [22] presented an in-browser cryptojacking attack and examined its three phases. They also used Alexa's top 1 million websites as a dataset for their study.…”
Section: Dynamic Approachesmentioning
confidence: 99%
“…The authors explored the challenges in cryptojacking detection and highlight the vulnerabilities in the system. Musch et al [19] propose a three-phase analysis approach to identify mining scripts. The authors conclude that cryptojacking is common, with every 500th site hosting cryptojacking malware.…”
Section: Related Workmentioning
confidence: 99%