Analyzing In-browser Cryptojacking

AI-generated keywords: Cryptojacking Malicious Practice Analysis Countermeasures Cybersecurity Threat

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Cryptojacking is a malicious practice where attackers exploit website visitors' processing power to mine cryptocurrencies without consent.
  • The paper "Analyzing In-browser Cryptojacking" by Muhammad Saad and David Mohaisen explores this phenomenon through static, dynamic, and economic analyses.
  • Static analysis techniques are used to categorize cryptojacking samples based on content, currency, and code complexity.
  • Machine learning algorithms are applied to achieve 100% accuracy in distinguishing between benign, malicious, and cryptojacking JavaScript samples.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Muhammad Saad, David Mohaisen

14 pages, 11 tables, 8 figures, and 69 references. arXiv admin note: substantial text overlap with arXiv:1809.02152
License: CC BY-NC-ND 4.0

Abstract: Cryptojacking is the permissionless use of a target device to covertly mine cryptocurrencies. With cryptojacking, attackers use malicious JavaScript codes to force web browsers into solving proof-of-work puzzles, thus making money by exploiting the resources of the website visitors. To understand and counter such attacks, we systematically analyze the static, dynamic, and economic aspects of in-browser cryptojacking. For static analysis, we perform content, currency, and code-based categorization of cryptojacking samples to 1) measure their distribution across websites, 2) highlight their platform affinities, and 3) study their code complexities. We apply machine learning techniques to distinguish cryptojacking scripts from benign and malicious JavaScript samples with 100\% accuracy. For dynamic analysis, we analyze the effect of cryptojacking on critical system resources, such as CPU and battery usage. We also perform web browser fingerprinting to analyze the information exchange between the victim node and the dropzone cryptojacking server. We also build an analytical model to empirically evaluate the feasibility of cryptojacking as an alternative to online advertisement. Our results show a sizeable negative profit and loss gap, indicating that the model is economically infeasible. Finally, leveraging insights from our analyses, we build countermeasures for in-browser cryptojacking that improve the existing remedies.

Submitted to arXiv on 26 Apr. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2304.13253v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In their paper titled "Analyzing In-browser Cryptojacking," authors Muhammad Saad and David Mohaisen delve into the intricate world of cryptojacking, a malicious practice where attackers exploit the processing power of unsuspecting website visitors to mine cryptocurrencies without their consent. The researchers conduct a comprehensive analysis of this phenomenon by examining its static, dynamic, and economic dimensions. To begin with, the authors employ static analysis techniques to categorize cryptojacking samples based on content, currency, and code complexity. This categorization allows them to assess the prevalence of these scripts across websites, identify platform preferences, and understand the intricacies of their coding structures. Through the application of machine learning algorithms, they achieve a remarkable 100% accuracy in distinguishing between benign, malicious, and cryptojacking JavaScript samples.
Created on 01 Dec. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.