Minesweeper - An In-Depth Look into Drive-By Cryptocurrency Mining and Its Defense
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
2017: The year of cryptocurrencies
Brought a new cyberthreat: Cryptojacking
Motivation
Existing defenses
Contributions
Catalysts of drive-by mining
Lead to proliferation of in-browser mining services
Threat model: Drive-by mining
Part 1: In-depth analysis
Data collection
Large-scale Analysis: Experiment Set-Up
Detecting Mining Payload (WASM)
Detecting Stratum communication
Prevalence of drive-by mining
Evasion techniques
Profit Estimation
4. Identifying Campaigns
Drive-by mining services commonalities
CryptoNight Algorithm
Analyzing WASM
Evaluation of CryptoNight detection
Mine Sweeper stage 2
Evaluation of CPU Cache Events Monitoring
Conclusion
Taught by
Association for Computing Machinery (ACM)