Filters








3 Hits in 1.6 sec

MANiC: Multi-step Assessment for Crypto-miners

Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer
2019 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)  
Archive Poster, a popular Chrome extension, was running a crypto-miner on an unknown portion of their user base for several days, allegedly due to the credentials of a developer being stolen [11] .  ...  Since keyword-based detection is vulnerable to obfuscation techniques, MineSweeper also checks for other indicators related to crypto-mining.  ... 
doi:10.1109/cybersecpods.2019.8885003 dblp:conf/cybersecpods/BurgessCOS19 fatcat:3d2s3cbmzfftbktkvubdxvmngm

Abstracts from the 2020 OAS Annual Meeting

The Ohio Academy of Science
2020 The Ohio journal of science  
Cryptojacking is the unauthorized use of computers to mine cryptocurrency using malicious scripts. It emerged after 2017.  ...  Board No. 61 -STRIP MINING HISTORY OF THE WILDS BASED ON NDVI ANALYSIS OF LANDSAT DATA.  ... 
doi:10.18061/ojs.v120i1.7574 fatcat:r3h6kaarevfmjkkg4k2zd35wk4

Blockchain Oracle Design Patterns [article]

Amirmohammad Pasdar, Zhongli Dong, Young Choon Lee
2021 arXiv   pre-print
We classify the blockchain oracle techniques into two major groups such as voting-based strategies and reputation-based ones.  ...  Posters post the data on the chain, and this responsibility is shared among many Posters.  ...  (e.g., sBTC), inverse cryptocurrencies, and cryptocurrency indexes [42] .  ... 
arXiv:2106.09349v1 fatcat:jcobgywz2zfgvfragre5qpolc4