MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
暂无分享,去创建一个
Christopher Krügel | Giovanni Vigna | Herbert Bos | Veelasha Moonsamy | Radhesh Krishnan Konoth | Martina Lindorfer | Emanuele Vineti | H. Bos | Christopher Krügel | Giovanni Vigna | Martina Lindorfer | Emanuele Vineti | Veelasha Moonsamy | G. Vigna
[1] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[2] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[3] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[4] Lorrie Faith Cranor,et al. Americans' attitudes about internet behavioral advertising practices , 2010, WPES '10.
[5] Carsten Willems,et al. Automated Identification of Cryptographic Primitives in Binary Programs , 2011, RAID.
[6] Wouter Joosen,et al. You are what you include: large-scale evaluation of remote javascript inclusions , 2012, CCS.
[7] Jean-Yves Marion,et al. Aligot: cryptographic function identification in obfuscated binary programs , 2012, CCS.
[8] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[9] Christopher Krügel,et al. Delta: automatic identification of unknown web-based infection campaigns , 2013, CCS.
[10] Davide Balzarotti,et al. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web , 2013, NDSS.
[11] Gianluca Stringhini,et al. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements , 2014, Internet Measurement Conference.
[12] Stefan Savage,et al. Botcoin: Monetizing Stolen Cycles , 2014, NDSS.
[13] Thomas C. Schmidt,et al. Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics , 2015, WOOT.
[14] Christopher Krügel,et al. Meerkat: Detecting Website Defacements through Image-based Object Recognition , 2015, USENIX Security Symposium.
[15] Vijay Erramilli,et al. I always feel like somebody's watching me: measuring online behavioural advertising , 2014, CoNEXT.
[16] Ruby B. Lee,et al. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds , 2016, RAID.
[17] Andrea Baronchelli,et al. Bitcoin ecology: Quantifying and modelling the long-term dynamics of the cryptocurrency market , 2017, ArXiv.
[18] Nikita Borisov,et al. Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises , 2017, RAID.
[19] Jiang Ming,et al. Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[20] Luke Wagner. Turbocharging the web , 2017, IEEE Spectrum.
[21] Alon Zakai,et al. Bringing the web up to speed with WebAssembly , 2017, PLDI.
[22] Evangelos P. Markatos,et al. The Cost of Digital Advertisement: Comparing User and Advertiser Views , 2018, WWW.
[23] Jan Rüth,et al. Digging into Browser-based Crypto Mining , 2018, Internet Measurement Conference.
[24] Katharina Krombholz,et al. Investigating System Operators' Perspective on Security Misconfigurations , 2018, CCS.
[25] Kevin W. Hamlen,et al. SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks , 2018, ESORICS.
[26] Jeremy Clark,et al. A First Look at Browser-Based Cryptojacking , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[27] Evangelos P. Markatos,et al. Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model , 2018, ArXiv.
[28] Neil Gandal,et al. The Rise and Fall of Cryptocurrencies , 2018 .
[29] Marco Balduzzi,et al. Investigating Web Defacement Campaigns at Large , 2018, AsiaCCS.