暂无分享,去创建一个
[1] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[2] Salvatore J. Stolfo,et al. On the feasibility of online malware detection with performance counters , 2013, ISCA.
[3] Marco Chiappetta,et al. Real time detection of cache-based side-channel attacks using hardware performance counters , 2016, Appl. Soft Comput..
[4] Kevin W. Hamlen,et al. SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks , 2018, ESORICS.
[5] Nikita Borisov,et al. Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises , 2017, RAID.
[6] Jeremy Clark,et al. A First Look at Browser-Based Cryptojacking , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[7] Haibo Chen,et al. Security breaches as PMU deviation: detecting and identifying security attacks using performance counters , 2011, APSys.
[8] Stefan Savage,et al. Botcoin: Monetizing Stolen Cycles , 2014, NDSS.
[9] Ramesh Karri,et al. Hardware Performance Counter-Based Malware Identification and Detection with Adaptive Compressive Sensing , 2016, ACM Trans. Archit. Code Optim..
[10] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] Mauro Conti,et al. On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective , 2018, Comput. Secur..
[12] Hyoungshick Kim,et al. The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns , 2018, ARES.
[13] Ramesh Karri,et al. NumChecker: Detecting kernel control-flow modifying rootkits by using Hardware Performance Counters , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).
[14] C. Mora,et al. Bitcoin emissions alone could push global warming above 2°C , 2018, Nature Climate Change.
[15] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[16] Qixu Liu,et al. A Novel Approach for Detecting Browser-Based Silent Miner , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[17] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[18] Christopher Krügel,et al. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense , 2018, CCS.
[19] Michail Maniatakos,et al. ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[20] Jan Rüth,et al. Digging into Browser-based Crypto Mining , 2018, Internet Measurement Conference.