Overview
Explore a 14-minute IEEE conference talk that delves into the world of illicit cryptomining on Continuous Integration (CI) service platforms. Learn about the research conducted by a team of experts from Huazhong University of Science and Technology and Indiana University Bloomington on this emerging cybersecurity threat. Discover how attackers exploit CI platforms for unauthorized cryptocurrency mining, understand the implications for DevOps environments, and gain insights into potential mitigation strategies. Examine the intersection of cybersecurity, cloud computing, and blockchain technology in this comprehensive analysis of a growing concern in the software development ecosystem.
Syllabus
Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms
Taught by
IEEE Symposium on Security and Privacy