Circuit: A Java']JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites

被引:2
|
作者
Hong, Hyunji [1 ]
Woo, Seunghoon [1 ]
Park, Sunghan [1 ]
Lee, Jeongwook [1 ]
Lee, Heejo [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 02841, South Korea
关键词
Codes; Computer security; Cryptocurrency; Engines; Instruction sets; Behavioral sciences; Syntactics; Cyberattack; Browsers; Browser security; web security; cryptojacking;
D O I
10.1109/ACCESS.2022.3204814
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptojacking is often used by attackers as a means of gaining profits by exploiting users' resources without their consent, despite the anticipated positive effect of browser-based cryptomining. Previous approaches have attempted to detect cryptojacking websites, but they have the following limitations: (1) they failed to detect several cryptojacking websites either because of their evasion techniques or because they cannot detect JavaScript-based cryptojacking and (2) they yielded several false alarms by focusing only on limited characteristics of cryptojacking, such as counting computer resources. In this paper, we propose CIRCUIT, a precise approach for detecting cryptojacking websites. We primarily focuse on the JavaScript memory heap, which is resilient to script code obfuscation and provides information about the objects declared in the script code and their reference relations. We then extract a reference flow that can represent the script code behavior of the website from the JavaScript memory heap. Hence, CIRCUIT determines that a website is running cryptojacking if it contains a reference flow for cryptojacking. In our experiments, we found 1,813 real-world cryptojacking websites among 300K popular websites. Moreover, we provided new insights into cryptojacking by modeling the identified evasion techniques and considering the fact that characteristics of cryptojacking websites now appear on normal websites as well.
引用
收藏
页码:95356 / 95368
页数:13
相关论文
共 36 条
  • [1] Testing Heap-Based Programs with Java']Java StarFinder
    Pham, Long H.
    Quang Loc Le
    Phan, Quoc-Sang
    Sun, Jun
    Qin, Shengchao
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 268 - 269
  • [2] A novel approach for detecting heap-based loop-carried dependences
    Tineo, A
    Corbera, F
    Navarro, A
    Asenjo, R
    Zapata, EL
    2005 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSSING, PROCEEDINGS, 2005, : 99 - 106
  • [3] Towards Heap-Based Memory Corruption Discovery
    Wang, Wenzhi
    Fan, Meng
    Yu, Aimin
    Meng, Dan
    2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 502 - 511
  • [4] Shadow-Heap: Preventing Heap-based Memory Corruptions by Metadata Validation
    Bouche, Johannes
    Atkinson, Lukas
    Kappes, Martin
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [5] A smart fuzzing method for detecting heap-based vulnerabilities in executable codes
    Mouzarani, Maryam
    Sadeghiyan, Babak
    Zolfaghari, Mohammad
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5098 - 5115
  • [6] A Smart Fuzzing Method for Detecting Heap-Based Buffer Overflow in Executable Codes
    Mouzarani, Maryam
    Sadeghiyan, Babak
    Zolfaghari, Mohammad
    2015 IEEE 21ST PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2015, : 42 - 49
  • [7] A deep learning approach for detecting malicious Java']JavaScript code
    Wang, Yao
    Cai, Wan-dong
    Wei, Peng-cheng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1520 - 1534
  • [8] CtxFuzz: Discovering Heap-Based Memory Vulnerabilities Through Context Heap Operation Sequence Guided Fuzzing
    Jiang, Jiacheng
    Wen, Cheng
    Qin, Shengchao
    THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, TASE 2024, 2024, 14777 : 205 - 223
  • [9] Dynamic Software Birthmark for Java']Java Based on Heap Memory Analysis
    Chan, Patrick P. F.
    Hui, Lucas C. K.
    Yiu, S. M.
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 94 - 107
  • [10] Detecting Obfuscated Suspicious Java']JavaScript Based on Collaborative Training
    Wu, Hongcheng
    Qin, Sujuan
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1962 - 1966