The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web

IEEE INFOCOM 2019 - IEEE Conference on Computer Communications(2019)

引用 37|浏览57
暂无评分
摘要
With the recent boom in the cryptocurrency market, hackers have been on the lookout to find novel ways of commandeering users’ machine for covert and stealthy mining operations. In an attempt to expose such under-the-hood practices, this paper explores the issue of browser cryptojacking, whereby miners are secretly deployed inside browser code without the knowledge of the user. To this end, we analyze the top 50k websites from Alexa and find a noticeable percentage of sites that are indulging in this exploitative exercise often using heavily obfuscated code. Furthermore, mining prevention plug-ins, such as NoMiner, fail to flag such cleverly concealed instances. Hence, we propose a machine learning solution based on hardware-assisted profiling of browser code in real-time. A fine-grained micro-architectural footprint allows us to classify mining applications with >99% accuracy and even flags them if the mining code has been heavily obfuscated or encrypted. We build our own browser extension and show that it outperforms other plug-ins. The proposed design has negligible overhead on the user’s machine and works for all standard off-the-shelf CPUs.
更多
查看译文
关键词
Browsers,Hardware,Cryptocurrency,Computer hacking,Data mining
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要