Outguard: Detecting in-browser covert cryptocurrency mining in the wild

69Citations
Citations of this article
89Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to mine cryptocurrency without obtaining the users' consent. In this paper, we design, implement, and evaluate Outguard, an automated cryptojacking detection system. We construct a large ground-truth dataset, extract several features using an instrumented web browser, and ultimately select seven distinctive features that are used to build an SVM classification model. Outguardachieves a 97.9% TPR and 1.1% FPR and is reasonably tolerant to adversarial evasions. We utilized Outguardin the wild by deploying it across the Alexa Top 1M websites and found 6,302 cryptojacking sites, of which 3,600 are new detections that were absent from the training data. These cryptojacking sites paint a broad picture of the cryptojacking ecosystem, with particular emphasis on the prevalence of cryptojacking websites and the shared infrastructure that provides clues to the operators behind the cryptojacking phenomenon.

Cite

CITATION STYLE

APA

Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., … Bailey, M. (2019). Outguard: Detecting in-browser covert cryptocurrency mining in the wild. In The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019 (pp. 840–852). Association for Computing Machinery, Inc. https://doi.org/10.1145/3308558.3313665

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free