Analyzing In-Browser Cryptojacking
- Saad, M; Mohaisen, D
- 2024
- 点赞
- 收藏
【Author】 Saad, Muhammad; Mohaisen, David
【Source】IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
【影响因子】6.791
【Abstract】Cryptojacking is the permissionless use of a target device to covertly mine cryptocurrencies. With cryptojacking, attackers use malicious JavaScript codes to force web browsers into solving proof-of-work puzzles, thus making money by exploiting the resources of the website visitors. We systematically analyze the static, dynamic, and economic aspects of in-browser cryptojacking to understand and counter such attacks. For static analysis, we perform currency-based and code-based categorization of cryptojacking samples to 1) measure their distribution across websites, 2) highlight their platform affinities, and 3) study their code complexities. We apply machine learning techniques to distinguish cryptojacking scripts from benign and malicious JavaScript samples with 100% accuracy. For dynamic analysis, we analyze the effect of cryptojacking on critical system resources, such as CPU and battery usage. We also perform web browser fingerprinting to analyze the information exchange between the victim node and the dropzone cryptojacking server. We also build an analytical model to empirically evaluate the feasibility of cryptojacking as an alternative to online advertisement. Our results show a sizeable negative profit and loss gap, indicating that the model is economically infeasible. Finally, leveraging insights from our analyses, we build countermeasures for in-browser cryptojacking that improve the existing remedies.
【Keywords】Codes; Internet; Bitcoin; Servers; Peer-to-peer computing; Market research; Browsers; Coinhive; cryptojacking; illegal mining
【发表时间】2024 NOV
【收录时间】2024-11-29
【文献类型】
【主题类别】
--
评论