In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to mine cryptocurrency without obtaining the users' consent. In this paper, we design, implement, and evaluate Outguard, an automated cryptojacking detection system. We construct a large ground-truth dataset, extract several features using an instrumented web browser, and ultimately select seven distinctive features that are used to build an SVM classification model. Outguardachieves a 97.9% TPR and 1.1% FPR and is reasonably tolerant to adversarial evasions. We utilized Outguardin the wild by deploying it across the Alexa Top 1M websites and found 6,302 cryptojacking sites, of which 3,600 are new detections that were absent from the training data. These cryptojacking sites paint a broad picture of the cryptojacking ecosystem, with particular emphasis on the prevalence of cryptojacking websites and the shared infrastructure that provides clues to the operators behind the cryptojacking phenomenon.
CITATION STYLE
Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., … Bailey, M. (2019). Outguard: Detecting in-browser covert cryptocurrency mining in the wild. In The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019 (pp. 840–852). Association for Computing Machinery, Inc. https://doi.org/10.1145/3308558.3313665
Mendeley helps you to discover research relevant for your work.