Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Minesweeper - An In-Depth Look into Drive-By Cryptocurrency Mining and Its Defense
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 2017: The year of cryptocurrencies
- 3 Brought a new cyberthreat: Cryptojacking
- 4 Motivation
- 5 Existing defenses
- 6 Contributions
- 7 Catalysts of drive-by mining
- 8 Lead to proliferation of in-browser mining services
- 9 Threat model: Drive-by mining
- 10 Part 1: In-depth analysis
- 11 Data collection
- 12 Large-scale Analysis: Experiment Set-Up
- 13 Detecting Mining Payload (WASM)
- 14 Detecting Stratum communication
- 15 Prevalence of drive-by mining
- 16 Evasion techniques
- 17 Profit Estimation
- 18 4. Identifying Campaigns
- 19 Drive-by mining services commonalities
- 20 CryptoNight Algorithm
- 21 Analyzing WASM
- 22 Evaluation of CryptoNight detection
- 23 Mine Sweeper stage 2
- 24 Evaluation of CPU Cache Events Monitoring
- 25 Conclusion