The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns
暂无分享,去创建一个
Hyoungshick Kim | Gerhard Pötzelsberger | Sebastian Schrittwieser | Robert Luh | Tobias Dam | Damjan Buhov | Julian Rauchberger | Hyoungshick Kim | S. Schrittwieser | Gerhard Pötzelsberger | R. Luh | D. Buhov | Tobias Dam | Julian Rauchberger
[1] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] Fang Yu,et al. Knowing your enemy: understanding and detecting malicious web advertising , 2012, CCS '12.
[3] Jérôme Segura. A look into the global ‘ drive-by cryptocurrency mining ’ phenomenon , 2017 .
[4] Stefan Savage,et al. Botcoin: Monetizing Stolen Cycles , 2014, NDSS.
[5] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[6] Gianluca Stringhini,et al. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements , 2014, Internet Measurement Conference.
[7] Tsz Hon Yuen,et al. RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero , 2017, ESORICS.
[8] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[9] Elmar Gerhards-Padilla,et al. Case study of the Miner Botnet , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[10] Nicolas van Saberhagen. CryptoNote v 2.0 , 2013 .
[11] Jeffrey S. Rosenschein,et al. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.
[12] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.