Visible to the public MANiC: Multi-step Assessment for Crypto-miners

TitleMANiC: Multi-step Assessment for Crypto-miners
Publication TypeConference Paper
Year of Publication2019
AuthorsBurgess, Jonah, Carlin, Domhnall, O'Kane, Philip, Sezer, Sakir
Conference Name2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
Date PublishedJune 2019
PublisherIEEE
ISBN Number978-1-7281-0229-0
Keywordsapplication program interfaces, bitcoin, blacklisting, browser security, browser-hijacking, Browsers, Browsers host, composability, compositionality, CPU-based mining, Crypto-miners, Crypto-mining, crypto-mining scripts, cryptocurrencies, cryptojacking, CryptoJacking websites, data mining, Drive-by Mining, Human Behavior, human factors, malicious activities, Malicious URL, Malware, Metrics, Multistep assessment, normal browser behaviour, online front-ends, profitability, pubcrawl, related CryptoJacking research, resilience, Resiliency, suspicious behaviour, Web Browser Security, Web sites, Web-based Threats
Abstract

Modern Browsers have become sophisticated applications, providing a portal to the web. Browsers host a complex mix of interpreters such as HTML and JavaScript, allowing not only useful functionality but also malicious activities, known as browser-hijacking. These attacks can be particularly difficult to detect, as they usually operate within the scope of normal browser behaviour. CryptoJacking is a form of browser-hijacking that has emerged as a result of the increased popularity and profitability of cryptocurrencies, and the introduction of new cryptocurrencies that promote CPU-based mining. This paper proposes MANiC (Multi-step AssessmeNt for Crypto-miners), a system to detect CryptoJacking websites. It uses regular expressions that are compiled in accordance with the API structure of different miner families. This allows the detection of crypto-mining scripts and the extraction of parameters that could be used to detect suspicious behaviour associated with CryptoJacking. When MANiC was used to analyse the Alexa top 1m websites, it detected 887 malicious URLs containing miners from 11 different families and demonstrated favourable results when compared to related CryptoJacking research. We demonstrate that MANiC can be used to provide insights into this new threat, to identify new potential features of interest and to establish a ground-truth dataset, assisting future research.

URLhttps://ieeexplore.ieee.org/document/8885003
DOI10.1109/CyberSecPODS.2019.8885003
Citation Keyburgess_manic_2019