摘要(英) |
Since Coinhive released its browser-based cryptocurrency mining code in September 2017, many websites embed mining JavaScript to mine cryptocurrency by using CPU resources without the consent of the device owner, it’s called Cryptojacking. And Cryptojacking has become the latest attack trend in computer security field. Many security specialists provide some methods to block the mining scripts, such as filtering mining scripts by blacklist. However, due to the significant increase in the Cryptojacking attacks, the static blacklist mechanism has become useless to protect users in time.
In this paper, we design and implement the mining identification mechanism which based on the observation of users’ computer resources. Our mechanism observes the changes of CPU usages in time to identify whether or not a website uses the mining scripts and notify the users.
The experiment results show that our system is more accurate than the blacklist mechanism and our system does not need to update system regularly. But the blacklist mechanism has to update blacklist constantly.
Abuse of web mining scripts and illegal acts of Cryptojacking are becoming more and more serious. The way to prevent Cryptojacking effectively will become a new issue for security. And the goal of our study is to protect people from becoming miners. |
參考文獻 |
[1] S. Nakamoto, "Bitcoin: a peer-to-peer electronic cash system," 2009. [Online]. Available: http://www.bitcoin.org/bitcoin.pdf.
[2] S. Nakamoto, "Satoshi. Bitcoin v0.1 released," Jan. 2009. [Online]. Available: https://www.mail-archive.com/cryptography@metzdowd.com/msg10142.html.
[3] B. Wiki, "Important milestones of the bitcoin project," [Online]. Available: https://en.bitcoin.it/wiki/Category:History. [Accessed 23 Jun. 2018].
[4] M. B. Taylor, "The Evolution of Bitcoin Hardware," IEEE Computer, vol. 50, no. 9, pp. 58-66, 2017.
[5] R. Quigley, "Bitcoin For the Uninitiated: Now, A Browser-Based Mining Client," 19 May 2011. [Online]. Available: https://www.themarysue.com/browser-based-bitcoin-mining/. [Accessed 23 Jun. 2018].
[6] B. Magazine, "Bitpay Breaks Daily Volume Record with Butterfly ASIC mining release," Jun. 2012. [Online]. Available: https://bitcoinmagazine.com/articles/bitpay-breaks-daily-volume-record-with-butterfly-asic-mining-release-1340734589/. [Accessed 24 Jun. 2018].
[7] Coinhive, "Monetize Your Business With Your Users′ CPU Power," [Online]. Available: https://coinhive.com/. [Accessed 3 Jul. 2018].
[8] J. Hruska, "Browser-based mining malware found on pirate bay," Sep. 2017. [Online]. Available: https://www.extremetech.com/internet/255971-browserbased-cryptocurrency-malware-appears-online-pirate-bay. [Accessed 3 Jul. 2018].
[9] J. Segura, "A look into the global drive-by cryptocurrency mining phenomenon," Nov. 2017. [Online]. Available: https://blog.malwarebytes.com/cybercrime/2017/11/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon/. [Accessed 23 Jun. 2018].
[10] W. d. Groot, "Cryptojacking found on 2496 online stores," 7 Nov. 2017. [Online]. Available: https://gwillem.gitlab.io/2017/11/07/cryptojacking-found-on-2496-stores/. [Accessed 24 Jun. 2018].
[11] CryptoMineDev, "MinerBlock," 2017, 18 Sep.. [Online]. Available: https://github.com/xd4rker/MinerBlock. [Accessed 3 Jul. 2018].
[12] Keraf, "No Coin," 11 Sep. 2017. [Online]. Available: https://github.com/keraf/NoCoin/. [Accessed 3 Jul. 2018].
[13] Tunghobrens, "Anti Miner - No 1 Coin Minerblock," [Online]. Available: https://chrome.google.com/webstore/detail/anti-miner-no-1-coin-mine/ibhpgkhoicjhklmbhdoeikeggbeejonj. [Accessed 6 Jul. 2018].
[14] Trend Micro, "Cluster of Coins: How Machine Learning Detects Cryptocurrency-mining Malware," 26 May 2018. [Online]. Available: http://newsroom.trendmicro.com/blog/security-intelligence/cluster-coins-how-machine-learning-detects-cryptocurrency-mining-malware. [Accessed 3 Jul. 2018].
[15] BitcoinPlus.com, "Get Bitcoin. It′s Easy," May. 2011. [Online]. Available: https://web.archive.org/web/20110823093029/http://www.bitcoinplus.com/. [Accessed 23 Jun. 2018].
[16] Monero, "Monero - secure, private, untraceable," 2014. [Online]. Available: https://getmonero.org/. [Accessed 3 Jul. 2018].
[17] Chrome, "What are extensions?," 2018. [Online]. Available: https://developer.chrome.com/extensions. [Accessed 3 Jul. 2018].
[18] MDN, "Browser Extensions - Mozilla | MDN," 2018. [Online]. Available: https://developer.mozilla.org/en-US/Add-ons/WebExtensions. [Accessed 3 Jul. 2018]. |