Circuit: A Java']JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites

被引:2
|
作者
Hong, Hyunji [1 ]
Woo, Seunghoon [1 ]
Park, Sunghan [1 ]
Lee, Jeongwook [1 ]
Lee, Heejo [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 02841, South Korea
关键词
Codes; Computer security; Cryptocurrency; Engines; Instruction sets; Behavioral sciences; Syntactics; Cyberattack; Browsers; Browser security; web security; cryptojacking;
D O I
10.1109/ACCESS.2022.3204814
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptojacking is often used by attackers as a means of gaining profits by exploiting users' resources without their consent, despite the anticipated positive effect of browser-based cryptomining. Previous approaches have attempted to detect cryptojacking websites, but they have the following limitations: (1) they failed to detect several cryptojacking websites either because of their evasion techniques or because they cannot detect JavaScript-based cryptojacking and (2) they yielded several false alarms by focusing only on limited characteristics of cryptojacking, such as counting computer resources. In this paper, we propose CIRCUIT, a precise approach for detecting cryptojacking websites. We primarily focuse on the JavaScript memory heap, which is resilient to script code obfuscation and provides information about the objects declared in the script code and their reference relations. We then extract a reference flow that can represent the script code behavior of the website from the JavaScript memory heap. Hence, CIRCUIT determines that a website is running cryptojacking if it contains a reference flow for cryptojacking. In our experiments, we found 1,813 real-world cryptojacking websites among 300K popular websites. Moreover, we provided new insights into cryptojacking by modeling the identified evasion techniques and considering the fact that characteristics of cryptojacking websites now appear on normal websites as well.
引用
收藏
页码:95356 / 95368
页数:13
相关论文
共 36 条
  • [21] TransAST: A Machine Translation-Based Approach for Obfuscated Malicious Java']JavaScript Detection
    Qin, Yan
    Wang, Weiping
    Chen, Zixian
    Song, Hong
    Zhang, Shigeng
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 327 - 338
  • [22] A Practical Guide for Detecting Java']JavaScript-based Malware using Hidden Markov Models and Linear Classifiers
    Cosovan, Doina
    Benchea, Razvan
    Gavrilut, Dragos
    16TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2014), 2014, : 236 - 243
  • [23] SANDDRILLER: A Fully-Automated Approach for Testing Language-Based Java']JavaScript Sandboxes
    AlHamdan, Abdullah
    Staicu, Cristian-Alexandru
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 3457 - 3474
  • [24] A Specification-Based Approach to the Testing of Java Memory Bloat
    Qian, Ju
    Zhou, Xiaoyu
    Dang, Wanchun
    Wang, Ziyuan
    Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security, QRS 2016, 2016, : 347 - 352
  • [25] DETECTING SERVER-SIDE ENDPOINTS IN WEB APPLICATIONS BASED ON STATIC ANALYSIS OF CLIENT-SIDE Java']JavaScript CODE
    Sigalov, D. A.
    Khashaev, A. A.
    Gamayunov, D. Yu.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2021, (53): : 32 - 54
  • [26] A machine learning approach to detection of Java']JavaScript-based attacks using AST features and paragraph vectors
    Ndichu, Samuel
    Kim, Sangwook
    Ozawa, Seiichi
    Misu, Takeshi
    Makishima, Kazuo
    APPLIED SOFT COMPUTING, 2019, 84
  • [27] Reducing Memory in Software-Based Thread-Level Speculation for Java']JavaScript Virtual Machine Execution of Web Applications
    Martinsen, Jan Kasper
    Grahn, Hakan
    Isberg, Anders
    Sundstrom, Henrik
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 181 - 184
  • [28] Label propagation-based approach for detecting review spammer groups on e-commerce websites
    Zhang, Fuzhi
    Hao, Xiaoyan
    Chao, Jinbo
    Yuan, Shuai
    KNOWLEDGE-BASED SYSTEMS, 2020, 193 (193)
  • [29] A detecting approach of harmonic currents based on the circuit model and neural network theory
    Liu, ZZ
    Zhao, Y
    Zhang, X
    Conference Record of the 2005 IEEE Industry Applications Conference, Vols 1-4, 2005, : 1904 - 1907
  • [30] Neuron adaptive detecting approach of harmonic current based on realization of analog circuit
    Wang, Qun
    Xie, Pinfang
    Wu, Ning
    Su, Xiangfeng
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 1999, 19 (06): : 42 - 46