Comment
Author: Admin | 2025-04-28
The biggest mining operations ever discovered. https://perma.cc/SVN4-C5B4[4]Cyren. 2014. F-prot Antivirus. http://www.f-prot.com[5]Shayan Eskandari, Andreas Leoutsarakos, Troy Mursch, and Jeremy Clark. 2018. A first look at browser-based Cryptojacking. In IEEE Security & Privacy on the Blockchain. IEEE, London, UK, 58--66.[6]Daniel Goldberg. 2016. Guardicore: The Photominer campaign. https://perma.cc/JE3Y-F42L[7]Josh Grunzweig. 2018. Palo Alto Networks: The Rise of the Cryptocurrency Miners. https://perma.cc/4VZL-J45Q[8]Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, and Haixin Duan. 2018. How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. In Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, Toronto, Canada, 1701--1713.[9]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C Snoeren, and Kirill Levchenko. 2014. Botcoin: Monetizing Stolen Cycles. In Proceedings of the Network and Distributed System Security Symposium (NDSS). Citeseer, Internet Society, San Diego, CA, USA, 1--16.[10]Kafeine. 2017. Proofpoint: Adylkuzz cryptocurrency mining malware Spreading for weeks via EternalBlue/DoublePulsar. https://perma.cc/3V7G-CDEN[11]Kafeine. 2018. Proofpoint: Smominru Monero mining botnet making millions for operators. https://perma.cc/V5UR-TDLU[12]Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Brad Miller, Vaishaal Shankar, Rekha Bachwani, Anthony D Joseph, and J Doug Tygar. 2015. Better malware ground truth: Techniques for weighting anti-virus vendor labels. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. ACM, Denver, Colorado, USA, 45--56.[13]Amin Kharraz, Zane Ma, Paul Murley, Charles Lever, Joshua Mason, Andrew Miller, Nikita Borisov, Manos Antonakakis, and Michael Bailey. 2019. Outguard: Detecting In-Browser Covert Cryptocurrency Mining in the Wild. In Proceedings of The Web Conference (WWW). ACM, San Francisco, USA, 840--852.[14]Hahnsang Kim, Joshua Smith, and Kang G Shin. 2008. Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services. ACM, Breckenridge, CO, USA,
Add Comment