Visible to the public The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web

TitleThe Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web
Publication TypeConference Paper
Year of Publication2019
AuthorsTahir, Rashid, Durrani, Sultan, Ahmed, Faizan, Saeed, Hammas, Zaffar, Fareed, Ilyas, Saqib
Conference NameIEEE INFOCOM 2019 - IEEE Conference on Computer Communications
Date PublishedMay 2019
PublisherIEEE
ISBN Number978-1-7281-0515-4
Keywordsbrowser code, browser cryptojacking, browser extension, Browsers, Computer hacking, countering cryptojacking, covert mining operations, cryptocurrency, cryptocurrency market, cryptography, cryptojacking, data mining, exploitative exercise, Hardware, hardware-assisted profiling, heavily obfuscated code, Human Behavior, human factors, learning (artificial intelligence), Metrics, mining code, mining prevention plug-ins, online front-ends, parasitic miners, pubcrawl, resilience, Resiliency, stealthy mining operations, under-the-hood practices, Web sites
Abstract

With the recent boom in the cryptocurrency market, hackers have been on the lookout to find novel ways of commandeering users' machine for covert and stealthy mining operations. In an attempt to expose such under-the-hood practices, this paper explores the issue of browser cryptojacking, whereby miners are secretly deployed inside browser code without the knowledge of the user. To this end, we analyze the top 50k websites from Alexa and find a noticeable percentage of sites that are indulging in this exploitative exercise often using heavily obfuscated code. Furthermore, mining prevention plug-ins, such as NoMiner, fail to flag such cleverly concealed instances. Hence, we propose a machine learning solution based on hardware-assisted profiling of browser code in real-time. A fine-grained micro-architectural footprint allows us to classify mining applications with \textbackslashtextgreater99% accuracy and even flags them if the mining code has been heavily obfuscated or encrypted. We build our own browser extension and show that it outperforms other plug-ins. The proposed design has negligible overhead on the user's machine and works for all standard off-the-shelf CPUs.

URLhttps://ieeexplore.ieee.org/document/8737360
DOI10.1109/INFOCOM.2019.8737360
Citation Keytahir_browsers_2019