July 26, 2021
July 26, 2021
July 19, 2022
Computing and Information Technology
A drastic surge on the cryptocurrency market of late 2017 and early 2018 lead to development and widespread implementation of web-based cryptomining. Initially providing a valid alternative to a regular advertisement-based forms of monetization, cryptomining quickly became a novelty form of malware by silently executing in the background without obtaining explicit consent from a user, an activity later became commonly known as drive-by mining or cryptojacking. To solve the issue of timely detection and prevention of cryptojacking, a number of in-browser solutions were developed, but neither of these achieved an absolute efficacy in eliminating targeted cybersecurity issues. This paper, provides a brief overview for this relatively newform of malware, analyzes technology used for browser cryptomining defined by two evolutionary phases of cryptojacking, and the financial reasoning behind this phenomenon. By examining the steps and stages of web-based cryptomining and distinguishing potential detectable characteristics, this paper attempts to outline possible preventive anti-malware approach that can be developed as a counter-measure to this online threat.
Anand, V., & Kudriashov, D. (2021, July), Web-based Cryptomining Detection Paper presented at 2021 ASEE Virtual Annual Conference Content Access, Virtual Conference. 10.18260/1-2--38036
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2021 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015