Главная
Study mode:
on
1
Intro
2
Rising popularity
3
Botnet core
4
Push and pull frameworks
5
The appeal of botnets for cryptomining
6
Types of botnet-based mining activity
7
Consensus protocol
8
Mining environment
9
Browser evolution - HTML, CSS, JavaScript, HTML5
10
Cross Origin Resource Sharing (CORS)
11
How does that help cryptomining?
12
Other factors that aid cryptomining
13
Coinhive - legitimate framework for browser-based mining
14
Issues with cryptojacking
15
Cryptocurrency theft
16
Clipboard Hijacking
17
ZeroAccess Botnet
18
Botnets Targeting Mobile Apps
19
Botnets Targeting Websites
20
Secure Web Development Frameworks
21
Novel approach
22
Future Directions
Description:
Explore the threats botnets pose to cryptocurrency mining in this comprehensive talk. Delve into the history of botnet-inspired threats, operational mechanisms, and significant botnets that have attacked cryptocurrencies. Examine the rising popularity of cryptocurrencies, botnet core structures, and push-pull frameworks. Understand the appeal of botnets for cryptomining, various types of botnet-based mining activities, and consensus protocols. Investigate mining environments, browser evolution, and the role of HTML5 and Cross Origin Resource Sharing (CORS) in facilitating cryptomining. Learn about Coinhive as a legitimate framework for browser-based mining and the issues surrounding cryptojacking. Discover how botnets target cryptocurrency theft, clipboard hijacking, mobile apps, and websites. Analyze the ZeroAccess Botnet and explore secure web development frameworks. Gain insights into novel approaches, countermeasures, and future directions for growing cryptocurrency usage and security. Read more

Botnets for Mining Cryptocurrencies - Renita Murimi

CAE in Cybersecurity Community
Add to list
0:00 / 0:00