A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
SoK: cryptojacking malware
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
Cryptocurrency scams: analysis and perspectives
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the
initial expectations, as witnessed by the thousands of tokenised assets available on the …
initial expectations, as witnessed by the thousands of tokenised assets available on the …
Machine learning for security and the internet of things: the good, the bad, and the ugly
The advancement of the Internet of Things (IoT) has allowed for unprecedented data
collection, automation, and remote sensing and actuation, transforming autonomous …
collection, automation, and remote sensing and actuation, transforming autonomous …
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …
new developments, modern vehicles are getting increasingly astute and offering growing …
Catching phishers by their bait: Investigating the dutch phishing landscape through phishing kit detection
Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal
entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking …
entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking …
Cryptojacking detection with cpu usage metrics
F Gomes, M Correia - 2020 IEEE 19th International Symposium …, 2020 - ieeexplore.ieee.org
Cryptojacking is currently being exploited by cyber-criminals. This form of malware runs in
the computers of victims without their consent. It often infects browsers and does CPU …
the computers of victims without their consent. It often infects browsers and does CPU …
Minerray: Semantics-aware analysis for ever-evolving cryptojacking detection
Recent advances in web technology have made in-browser cryptomining a viable funding
model. However, these services have been abused to launch large-scale cryptojacking …
model. However, these services have been abused to launch large-scale cryptojacking …
[PDF][PDF] A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.
Recently, cryptojacking malware has become an easy way of reaching and profiting from a
large number of victims. Prior works studied the cryptojacking detection systems focusing on …
large number of victims. Prior works studied the cryptojacking detection systems focusing on …
Just the tip of the iceberg: Internet-scale exploitation of routers for cryptojacking
HLJ Bijmans, TM Booij, C Doerr - … of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
The release of an efficient browser-based cryptominer, as introduced by Coinhive in 2017,
has quickly spread throughout the web either as a new source of revenue for websites or …
has quickly spread throughout the web either as a new source of revenue for websites or …