A First Look at Browser-Based Cryptojacking
暂无分享,去创建一个
Jeremy Clark | Shayan Eskandari | Troy Mursch | Andreas Leoutsarakos | Jeremy Clark | Shayan Eskandari | Andreas Leoutsarakos | Troy Mursch
[1] Kevin Lee,et al. An Empirical Analysis of Linkability in the Monero Blockchain , 2017, ArXiv.
[2] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[3] Ethan Heilman,et al. An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..
[4] Kirstie Hawkey,et al. On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings , 2011, SOUPS.
[5] Stefan Savage,et al. Botcoin: Monetizing Stolen Cycles , 2014, NDSS.
[6] Arvind Narayanan,et al. Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .
[7] Dan Boneh,et al. Busting frame busting a study of clickjacking vulnerabilities on popular sites , 2010 .
[8] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[9] Adrienne Porter Felt,et al. Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors , 2017, CCS.
[10] Lorrie Faith Cranor,et al. Crying Wolf: An Empirical Study of SSL Warning Effectiveness , 2009, USENIX Security Symposium.
[11] Nikita Borisov,et al. Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises , 2017, RAID.
[12] J. Alex Halderman,et al. A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.