Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
Title | Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Saad, Muhammad, Khormali, Aminollah, Mohaisen, Aziz |
Conference Name | 2019 APWG Symposium on Electronic Crime Research (eCrime) |
Date Published | Nov. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6383-3 |
Keywords | code complexities, code-based categorization, codes, computer network security, cryptography, cryptojacking, cryptojacking attackers, cryptojacking scripts, dropzone cryptojacking server, dynamic analysis, economic analysis, Human Behavior, human factors, in-browser cryptojacking, Internet, Java, malicious JavaScript codes, Metrics, pubcrawl, resilience, Resiliency, static analysis, unsupervised learning, Web browser fingerprinting, Web sites |
Abstract | Cryptojacking is the permissionless use of a target device to covertly mine cryptocurrencies. With cryptojacking attackers use malicious JavaScript codes to force web browsers into solving proof-of-work puzzles, thus making money by exploiting resources of the website visitors. To understand and counter such attacks, we systematically analyze the static, dynamic, and economic aspects of in-browser cryptojacking. For static analysis, we perform content-, currency-, and code-based categorization of cryptojacking samples to 1) measure their distribution across websites, 2) highlight their platform affinities, and 3) study their code complexities. We apply unsupervised learning to distinguish cryptojacking scripts from benign and other malicious JavaScript samples with 96.4% accuracy. For dynamic analysis, we analyze the effect of cryptojacking on critical system resources, such as CPU and battery usage. Additionally, we perform web browser fingerprinting to analyze the information exchange between the victim node and the dropzone cryptojacking server. We also build an analytical model to empirically evaluate the feasibility of cryptojacking as an alternative to online advertisement. Our results show a large negative profit and loss gap, indicating that the model is economically impractical. Finally, by leveraging insights from our analyses, we build countermeasures for in-browser cryptojacking that improve upon the existing remedies. |
URL | https://ieeexplore.ieee.org/document/9037576 |
DOI | 10.1109/eCrime47957.2019.9037576 |
Citation Key | saad_dine_2019 |
- Human Factors
- Web sites
- Web browser fingerprinting
- Unsupervised Learning
- static analysis
- Resiliency
- resilience
- pubcrawl
- Metrics
- malicious JavaScript codes
- Java
- internet
- in-browser cryptojacking
- code complexities
- Human behavior
- economic analysis
- dynamic analysis
- dropzone cryptojacking server
- cryptojacking scripts
- cryptojacking attackers
- cryptojacking
- Cryptography
- computer network security
- codes
- code-based categorization