A first look at browser-based Cryptojacking

نویسندگان

  • Shayan Eskandari
  • Andreas Leoutsarakos
  • Troy Mursch
  • Jeremy Clark
چکیده

In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar codebases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency—typically without her consent or knowledge—and pays out the seigniorage to the website. Websites may consciously employ this as an alternative or to supplement advertisement revenue, may offer premium content in exchange for mining, or may be unwittingly serving the code as a result of a breach (in which case the seigniorage is collected by the attacker). The cryptocurrency Monero is preferred seemingly for its unfriendliness to large-scale ASIC mining that would drive browser-based efforts out of the market, as well as for its purported privacy features. In this paper, we survey this landscape, conduct some measurements to establish its prevalence and profitability, outline an ethical framework for considering whether it should be classified as an attack or business opportunity, and make suggestions for the detection, mitigation and/or prevention of browser-based mining for non-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Security Analysis of Browser Extensions

Browser Extensions (often called plugins or addons) are small pieces of code that let developers add additional functionality to the browser. However, with extensions comes a security price: the user must trust the developer. We look at ways in which this trust can be broken and malicious extensions installed. We also look at silent installations of plugins in various browsers and work on ways ...

متن کامل

مطالعه تطبیقی دیدگاه حکیم ابو نصر فارابی و جان هنری نیومن در خصوص علوم

The present study aimed to compare the perspective of Farabi and Newman on the science, and using the method of analytical descriptive-"comparative analysis" is done. Accordingly, in the first of two overall mastermind introduced, then research questions provided. The findings show that in general the two views can be joined to make science relevant and thoughtful, and consists of three total-l...

متن کامل

The Extended Sub-look Analysis In Polarimetric SAR Data For Ship Detection

The monitoring of maritime areas with remote sensing is essential for security reasons and also for the conservation of environment. The synthetic aperture radar (SAR) can play an important role in this matter by considering the possibility of acquiring high-resolution images at nighttime and under cloud cover. Recently, the new approaches based on the sub-look analysis for preserving the infor...

متن کامل

The UCSC Archaeal Genome Browser: 2012 update

The UCSC Archaeal Genome Browser (http://archaea.ucsc.edu) offers a graphical web-based resource for exploration and discovery within archaeal and other selected microbial genomes. By bringing together existing gene annotations, gene expression data, multiple-genome alignments, pre-computed sequence comparisons and other specialized analysis tracks, the genome browser is a powerful aggregator o...

متن کامل

What Are Browser Exploit Kits up To? a Look into Sweet Orange and Propack

At the VB2011 conference, our team discussed the techniques used by the Blackhole and Phoenix browser exploit packs (BEPs) [1] to spread malware. Blackhole has become a major player in the world of BEPs, but it is not the only one in demand. Sweet Orange and ProPack have recently entered the market, and both are gaining popularity. A simple traffi c analysis of Sweet Orange can be found in [2]....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018