Главная
Study mode:
on
1
Intro
2
2017: The year of cryptocurrencies
3
Brought a new cyberthreat: Cryptojacking
4
Motivation
5
Existing defenses
6
Contributions
7
Catalysts of drive-by mining
8
Lead to proliferation of in-browser mining services
9
Threat model: Drive-by mining
10
Part 1: In-depth analysis
11
Data collection
12
Large-scale Analysis: Experiment Set-Up
13
Detecting Mining Payload (WASM)
14
Detecting Stratum communication
15
Prevalence of drive-by mining
16
Evasion techniques
17
Profit Estimation
18
4. Identifying Campaigns
19
Drive-by mining services commonalities
20
CryptoNight Algorithm
21
Analyzing WASM
22
Evaluation of CryptoNight detection
23
Mine Sweeper stage 2
24
Evaluation of CPU Cache Events Monitoring
25
Conclusion
Description:
Explore the emerging cyberthreat of cryptojacking in this 25-minute conference talk from the Association for Computing Machinery (ACM). Delve into the world of drive-by cryptocurrency mining, examining its catalysts, prevalence, and evasion techniques. Gain insights into the threat model, large-scale analysis methodologies, and profit estimation of this cybercriminal activity. Learn about the MineSweeper defense system, including its detection techniques for mining payloads and Stratum communication. Understand the commonalities among drive-by mining services, the CryptoNight algorithm, and the evaluation of detection methods. Discover the implications of this cybersecurity challenge and potential defensive strategies in the evolving landscape of cryptocurrency mining.

Minesweeper - An In-Depth Look into Drive-By Cryptocurrency Mining and Its Defense

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00