Visible to the public Detecting Cryptomining Using Dynamic Analysis

TitleDetecting Cryptomining Using Dynamic Analysis
Publication TypeConference Paper
Year of Publication2018
AuthorsCarlin, D., O'Kane, P., Sezer, S., Burgess, J.
Conference Name2018 16th Annual Conference on Privacy, Security and Trust (PST)
PublisherIEEE
ISBN Number978-1-5386-7493-2
KeywordsBrowsers, computer security, cryptocurrency, cryptojacking, Human Behavior, invasive software, Malware, Metrics, pubcrawl, resilience, Resiliency, Runtime, Standards
Abstract

With the rise in worth and popularity of cryptocurrencies, a new opportunity for criminal gain is being exploited and with little currently offered in the way of defence. The cost of mining (i.e., earning cryptocurrency through CPU-intensive calculations that underpin the blockchain technology) can be prohibitively expensive, with hardware costs and electrical overheads previously offering a loss compared to the cryptocurrency gained. Off-loading these costs along a distributed network of machines via malware offers an instantly profitable scenario, though standard Anti-virus (AV) products offer some defences against file-based threats. However, newer fileless malicious attacks, occurring through the browser on seemingly legitimate websites, can easily evade detection and surreptitiously engage the victim machine in computationally-expensive cryptomining (cryptojacking). With no current academic literature on the dynamic opcode analysis of cryptomining, to the best of our knowledge, we present the first such experimental study. Indeed, this is the first such work presenting opcode analysis on non-executable files. Our results show that browser-based cryptomining within our dataset can be detected by dynamic opcode analysis, with accuracies of up to 100%. Further to this, our model can distinguish between cryptomining sites, weaponized benign sites, de-weaponized cryptomining sites and real world benign sites. As it is process-based, our technique offers an opportunity to rapidly detect, prevent and mitigate such attacks, a novel contribution which should encourage further future work.

URLhttps://ieeexplore.ieee.org/document/8514167
DOI10.1109/PST.2018.8514167
Citation Keycarlin_detecting_2018