Minesweeper - An In-Depth Look into Drive-By Cryptocurrency Mining and Its Defense

Minesweeper - An In-Depth Look into Drive-By Cryptocurrency Mining and Its Defense

Association for Computing Machinery (ACM) via YouTube Direct link

Intro

1 of 25

1 of 25

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Minesweeper - An In-Depth Look into Drive-By Cryptocurrency Mining and Its Defense

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 2017: The year of cryptocurrencies
  3. 3 Brought a new cyberthreat: Cryptojacking
  4. 4 Motivation
  5. 5 Existing defenses
  6. 6 Contributions
  7. 7 Catalysts of drive-by mining
  8. 8 Lead to proliferation of in-browser mining services
  9. 9 Threat model: Drive-by mining
  10. 10 Part 1: In-depth analysis
  11. 11 Data collection
  12. 12 Large-scale Analysis: Experiment Set-Up
  13. 13 Detecting Mining Payload (WASM)
  14. 14 Detecting Stratum communication
  15. 15 Prevalence of drive-by mining
  16. 16 Evasion techniques
  17. 17 Profit Estimation
  18. 18 4. Identifying Campaigns
  19. 19 Drive-by mining services commonalities
  20. 20 CryptoNight Algorithm
  21. 21 Analyzing WASM
  22. 22 Evaluation of CryptoNight detection
  23. 23 Mine Sweeper stage 2
  24. 24 Evaluation of CPU Cache Events Monitoring
  25. 25 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.