A survey of state-of-the-art on blockchains: Theories, modelings, and tools

H Huang, W Kong, S Zhou, Z Zheng… - ACM Computing Surveys …, 2021 - dl.acm.org
To draw a roadmap of current research activities of the blockchain community, we first
conduct a brief overview of state-of-the-art blockchain surveys published in the past 5 years …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

[HTML][HTML] Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection

G Xu, W Dong, J Xing, W Lei, J Liu, L Gong… - Digital Communications …, 2023 - Elsevier
Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly
executes the cryptocurrency mining program in the target host to gain profits. It has been …

Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review

E Badawi, GV Jourdan - IEEE Access, 2020 - ieeexplore.ieee.org
Cryptocurrencies have been a target for cybercriminal activities because of the pseudo-
anonymity and privacy they offer. Researchers have been actively working on analyzing and …

[HTML][HTML] Cryptomining makes noise: Detecting cryptojacking via machine learning

M Caprolu, S Raponi, G Oligeri, R Di Pietro - Computer Communications, 2021 - Elsevier
Cryptojacking occurs when an adversary illicitly runs crypto-mining software over the
devices of unaware users. This novel cybersecurity attack, that is emerging in both the …

Invisible poison: A blackbox clean label backdoor attack to deep neural networks

R Ning, J Li, C Xin, H Wu - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
This paper reports a new clean-label data poisoning backdoor attack, named Invisible
Poison, which stealthily and aggressively plants a backdoor in neural networks. It converts a …

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

B Zou, C Cao, L Wang, S Fu, T Qiao, J Sun - Computers & Security, 2024 - Elsevier
The struggle between security researchers and malware perpetuates an endless arms race.
Recent studies indicate that converting malware into grayscale images and using …

[HTML][HTML] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments

L Caviglione, W Mazurczyk, M Repetto… - Computer Networks, 2021 - Elsevier
Modern malware is becoming hard to spot since attackers are increasingly adopting new
techniques to elude signature-and rule-based detection mechanisms. Among the others …

Scams and solutions in cryptocurrencies—A survey analyzing existing machine learning models

LP Krishnan, I Vakilinia, S Reddivari, S Ahuja - Information, 2023 - mdpi.com
With the emergence of cryptocurrencies and Blockchain technology, the financial sector is
turning its gaze toward this latest wave. The use of cryptocurrencies is becoming very …

Statistical perspectives on reliability of artificial intelligence systems

Y Hong, J Lian, L Xu, J Min, Y Wang… - Quality …, 2023 - Taylor & Francis
Artificial intelligence (AI) systems are increasingly popular in many applications.
Nevertheless, AI technologies are still developing, and many issues need to be addressed …