A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

Cryptocurrency scams: analysis and perspectives

M Bartoletti, S Lande, A Loddo, L Pompianu… - Ieee …, 2021 - ieeexplore.ieee.org
Since the inception of Bitcoin in 2009, the market of cryptocurrencies has grown beyond the
initial expectations, as witnessed by the thousands of tokenised assets available on the …

Machine learning for security and the internet of things: the good, the bad, and the ugly

F Liang, WG Hatcher, W Liao, W Gao, W Yu - Ieee Access, 2019 - ieeexplore.ieee.org
The advancement of the Internet of Things (IoT) has allowed for unprecedented data
collection, automation, and remote sensing and actuation, transforming autonomous …

Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses

AA Elkhail, RUD Refat, R Habre, A Hafeez… - IEEE …, 2021 - ieeexplore.ieee.org
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …

Catching phishers by their bait: Investigating the dutch phishing landscape through phishing kit detection

H Bijmans, T Booij, A Schwedersky… - 30th USENIX security …, 2021 - usenix.org
Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal
entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking …

Cryptojacking detection with cpu usage metrics

F Gomes, M Correia - 2020 IEEE 19th International Symposium …, 2020 - ieeexplore.ieee.org
Cryptojacking is currently being exploited by cyber-criminals. This form of malware runs in
the computers of victims without their consent. It often infects browsers and does CPU …

Minerray: Semantics-aware analysis for ever-evolving cryptojacking detection

A Romano, Y Zheng, W Wang - Proceedings of the 35th IEEE/ACM …, 2020 - dl.acm.org
Recent advances in web technology have made in-browser cryptomining a viable funding
model. However, these services have been abused to launch large-scale cryptojacking …

[PDF][PDF] A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.

E Tekiner, A Acar, AS Uluagac - NDSS, 2022 - ndss-symposium.org
Recently, cryptojacking malware has become an easy way of reaching and profiting from a
large number of victims. Prior works studied the cryptojacking detection systems focusing on …

Just the tip of the iceberg: Internet-scale exploitation of routers for cryptojacking

HLJ Bijmans, TM Booij, C Doerr - … of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
The release of an efficient browser-based cryptominer, as introduced by Coinhive in 2017,
has quickly spread throughout the web either as a new source of revenue for websites or …