2020
DOI: 10.1109/msec.2019.2920585
|View full text |Cite
|
Sign up to set email alerts
|

You Could Be Mine(d): The Rise of Cryptojacking

Abstract: From driverless cars to propertyless rental companies, nowadays '-less' is more. Traditional maliciousware attacks is following this trendhave evolved beyond file-based methods, with malicious files now existing as processes and services in order to evade detection. This article examines the rise of cryptojacking-the use of another's machine for profit through cryptocurrency mining, and how we're all at risk.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(20 citation statements)
references
References 1 publication
0
20
0
Order By: Relevance
“…A malicious cryptocurrency mining script can be injected into websites in a number of ways [1], [2]: 1) Website Webpage C/C++ WASM Module…”
Section: A Cryptocurrency Mining and Cryptojackingmentioning
confidence: 99%
See 4 more Smart Citations
“…A malicious cryptocurrency mining script can be injected into websites in a number of ways [1], [2]: 1) Website Webpage C/C++ WASM Module…”
Section: A Cryptocurrency Mining and Cryptojackingmentioning
confidence: 99%
“…The first component of MINOS is the Wasm Module Auto-Collector. As the user is browsing the Internet, this component checks if the website being visited currently produce any Wasm binaries, and if so, downloads them to a specified folder ( 1 ). The second part is the preprocessor, which reads the specified folder where the Auto-collector downloads the Wasm binaries, and converts each binary in the folder to a gray-scale image ( 2 ).…”
Section: B System Modelmentioning
confidence: 99%
See 3 more Smart Citations