{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T10:18:04Z","timestamp":1770027484568,"version":"3.49.0"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030350543","type":"print"},{"value":"9783030350550","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35055-0_10","type":"book-chapter","created":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T19:05:21Z","timestamp":1573585521000},"page":"155-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Experimental Analysis of Cryptojacking Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5509-0184","authenticated-orcid":false,"given":"Per H\u00e5kon","family":"Meland","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7454-6557","authenticated-orcid":false,"given":"Bent Heier","family":"Johansen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5739-8265","authenticated-orcid":false,"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,13]]},"reference":[{"issue":"3","key":"10_CR1","first-page":"1210","volume":"9","author":"HH Al Hajri","year":"2019","unstructured":"Al Hajri, H.H., Al Mughairi, B.M., Hossain, M.I., Karim, A.M.: Crypto jacking a technique to leverage technology to mine crypto currency. Int. J. Acad. Res. Bus. Social Sci. 9(3), 1210\u20131221 (2019)","journal-title":"Int. J. Acad. Res. Bus. Social Sci."},{"key":"10_CR2","unstructured":"Alexa. \nhttps:\/\/www.alexa.com\/\n\n. Accessed 23 Aug 2019"},{"key":"10_CR3","unstructured":"Analyze power use with battery historian. \nhttps:\/\/developer.android.com\/topic\/performance\/power\/battery-historian\n\n. Accessed 24 May 2019"},{"key":"10_CR4","unstructured":"App store review guidelines. \nhttps:\/\/developer.apple.com\/app-store\/review\/guidelines\/\n\n. Accessed 22 Aug 2019"},{"key":"10_CR5","unstructured":"Bijmans, H.L., Booij, T.M., Doerr, C.: Inadvertently making cyber criminals rich: a comprehensive study of cryptojacking campaigns at internet scale. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1627\u20131644 (2019)"},{"issue":"3","key":"10_CR6","first-page":"1210","volume":"9","author":"D Carlin","year":"2019","unstructured":"Carlin, D., Burgess, J., O\u2019Kane, P., Sezer, S.: You could be mine (d): the rise of cryptojacking. IEEE Secur. Priv. 9(3), 1210\u20131221 (2019)","journal-title":"IEEE Secur. Priv."},{"key":"10_CR7","unstructured":"Coinhive.com. \nhttps:\/\/coinhive.com\/\n\n. Accessed 8 Apr 2019"},{"key":"10_CR8","unstructured":"Discontinuation of coinhive (2019). \nhttps:\/\/coinhive.com\/blog\/en\/discontinuation-of-coinhive\n\n. Accessed 24 May 2019"},{"key":"10_CR9","unstructured":"Top 100 cryptocurrencies by market capitalization (2019). \nhttps:\/\/coinmarketcap.com\n\n. Accessed 22 Aug 2019"},{"key":"10_CR10","unstructured":"Mine monero from your browser. \nhttps:\/\/coinwebmining.com\/browser-miner\/monero\n\n. Accessed 24 May 2019"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious Javascript code. In: Proceedings of the 19th International Conference on World Wide Web, pp. 281\u2013290. ACM (2010)","DOI":"10.1145\/1772690.1772720"},{"key":"10_CR12","unstructured":"Cox, J.: Creators of in-browser cryptocurrency miner \u2018coinhive\u2019 say their reputation couldn\u2019t be much worse. \nhttps:\/\/motherboard.vice.com\/en_us\/article\/vbpbz4\/creators-of-in-browser-cryptocurrency-miner-coinhive-say-their-reputation-couldnt-be-much-worse\n\n (2018). Accessed 24 May 2019"},{"key":"10_CR13","unstructured":"Cpuminer-multi. \nhttps:\/\/github.com\/tpruvot\/cpuminer-multi\n\n. Accessed 24 May 2019"},{"key":"10_CR14","unstructured":"Dean, M.: 5 best cryptojacking blockers to use on your windows pc. \nhttps:\/\/windowsreport.com\/cryptojacking-blockers\/\n\n. Accessed 24 May 2019"},{"key":"10_CR15","unstructured":"Deep miner. \nhttps:\/\/github.com\/deepwn\/deepMiner\n\n. Accessed 24 May 2019"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Eskandari, S., Leoutsarakos, A., Mursch, T., Clark, J.: A first look at browser-based cryptojacking. In: 2018 IEEE European Symposium on Security and Privacy Workshops (2018)","DOI":"10.1109\/EuroSPW.2018.00014"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Internet Organised Crime Threat Assessment (IOCTA) 2018 (2018). \nhttps:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment-iocta-2018","DOI":"10.1016\/S1353-4858(18)30096-5"},{"key":"10_CR18","unstructured":"Frigioiu, A.: Crypto miners: the rise of a malware empire (2018). \nhttps:\/\/blog.avira.com\/crypto-miners-coinhive-malware-empire\/\n\n. Accessed 24 May 2019"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Hong, G., et al.: How you get shot in the back: a systematical study about cryptojacking in the real world. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1701\u20131713. ACM (2018)","DOI":"10.1145\/3243734.3243840"},{"key":"10_CR20","unstructured":"Hron, M.: Protect yourself from cryptojacking. \nhttps:\/\/blog.avast.com\/protect-yourself-from-cryptojacking\n\n (2018). Accessed 23 Aug 2019"},{"key":"10_CR21","unstructured":"istat menus. \nhttps:\/\/itunes.apple.com\/us\/app\/istat-menus\/id1319778037?mt=12\n\n. Accessed 24 May 2019"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Kharraz, A., et al.: Outguard: detecting in-browser covert cryptocurrency mining in the wild. In: The World Wide Web Conference, pp. 840\u2013852. WWW 2019, ACM, New York, NY, USA (2019). \nhttps:\/\/doi.org\/10.1145\/3308558.3313665","DOI":"10.1145\/3308558.3313665"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Konoth, R.K., et al.: Minesweeper: an in-depth look into drive-by cryptocurrency mining and its defense. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1714\u20131730. ACM (2018)","DOI":"10.1145\/3243734.3243858"},{"key":"10_CR24","unstructured":"Liao, S.: Calendar app in MAC app store mines cryptocurrency in the background (2018). \nhttps:\/\/www.theverge.com\/2018\/3\/12\/17110810\/apple-app-store-mac-cryptocurrency-monero-calendar-2-qbix\n\n. Accessed 22 Aug 2019"},{"key":"10_CR25","unstructured":"Monero miner for web browsers. \nhttps:\/\/minero.cc\/\n\n. Accessed 24 May 2019"},{"key":"10_CR26","unstructured":"Monero.com. \nhttps:\/\/monero.org\/\n\n. Accessed 24 May 2019"},{"key":"10_CR27","unstructured":"Musch, M., Wressnegger, C., Johns, M., Rieck, K.: Web-based cryptojacking in the wild (2018). arXiv preprint \narXiv:1808.09474"},{"key":"10_CR28","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). \nhttps:\/\/bitcoin.org\/bitcoin.pdf\n\n. Accessed 23 Aug 2019"},{"issue":"5","key":"10_CR29","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1353-4858(19)30061-3","volume":"2019","author":"VL Nguyen","year":"2019","unstructured":"Nguyen, V.L., Lin, P.C., Hwang, R.H.: Web attacks: defeating monetisation attempts. Netw. Secur. 2019(5), 11\u201319 (2019)","journal-title":"Netw. Secur."},{"issue":"4","key":"10_CR30","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/S1361-3723(19)30043-0","volume":"2019","author":"J Norman","year":"2019","unstructured":"Norman, J.: How not to become a crypto-jacking statistic. Comput. Fraud Secur. 2019(4), 18\u201319 (2019)","journal-title":"Comput. Fraud Secur."},{"key":"10_CR31","unstructured":"Papadopoulos, P., Ilia, P., Markatos, E.P.: Truth in web mining: measuring the profitability and cost of cryptominers as a web monetization model (2018). \narXiv:1806.01994v1\n\n. Accessed 24 May 2019"},{"key":"10_CR32","unstructured":"Partz, H.: Coinhive code found on 300+ websites worldwide in recent cryptojacking campaign (2018). Accessed 24 May 2019"},{"key":"10_CR33","unstructured":"Pastrana, S., Suarez-Tangil, G.: A first look at the crypto-mining malware ecosystem: a decade of unrestricted wealth. arXiv preprint (2019) \narXiv:1901.00846"},{"key":"10_CR34","unstructured":"Pedersen, P.: The open source community as a top 100 country. \nhttp:\/\/www.inside-open-source.com\/2007\/11\/open-source-community-as-top-100.html\n\n. Accessed 23 Aug 2019"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"R\u00fcth, J., Zimmermann, T., Wolsing, K., Hohlfeld, O.: Digging into browser-based crypto mining. Chair of Communication and Distributed Systems, RWTH Aachen University (2018). Accessed 24 May 2019","DOI":"10.1145\/3278532.3278539"},{"key":"10_CR36","unstructured":"Saad, M., Khormali, A., Mohaisen, A.: End-to-end analysis of in-browser cryptojacking (2018). \narXiv:1809.02152v1\n\n. Accessed 24 May 2019"},{"key":"10_CR37","unstructured":"Saberhagen, N.V.: Cryptonote v 2.0 (2013). Accessed 24 May 2019"},{"issue":"9","key":"10_CR38","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1361-3723(18)30086-1","volume":"2018","author":"K Sigler","year":"2018","unstructured":"Sigler, K.: Crypto-jacking: how cyber-criminals are exploiting thecrypto-currency boom. Comput. Fraud Secur. 2018(9), 12\u201314 (2018). \nhttps:\/\/doi.org\/10.1016\/S1361-3723(18)30086-1\n\n. \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/S1361372318300861","journal-title":"Comput. Fraud Secur."},{"key":"10_CR39","unstructured":"Supportxmr.com. \nhttps:\/\/www.supportxmr.com\/\n\n. Accessed 24 May 2019"},{"key":"10_CR40","unstructured":"Internet security threat report (2019). \nhttps:\/\/www.symantec.com\/en\/sg\/security-center\/threat-report\n\n. Accessed 24 May 2019"},{"key":"10_CR41","unstructured":"Sysbench. \nhttps:\/\/github.com\/akopytov\/sysbench\n\n. Accessed 24 May 2019"},{"key":"10_CR42","doi-asserted-by":"publisher","unstructured":"Tahir, R., Durrani, S., Ahmed, F., Saeed, H., Zaffar, F., Ilyas, S.: The browsers strike back: countering cryptojacking and parasitic miners on the web. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, pp. 703\u2013711. April (2019). \nhttps:\/\/doi.org\/10.1109\/INFOCOM.2019.8737360","DOI":"10.1109\/INFOCOM.2019.8737360"},{"key":"10_CR43","unstructured":"Historical trends in the usage of client-side programming languages for websites. \nhttps:\/\/w3techs.com\/technologies\/history_overview\/client_side_language\/all\n\n. Accessed 24 May 2019"},{"key":"10_CR44","unstructured":"Plugin tag: mining. \nhttps:\/\/wordpress.org\/plugins\/tags\/mining\/\n\n. Accessed 24 May 2019"},{"key":"10_CR45","unstructured":"Wu, L.: Monero-mining hiddenminer android malware can potentially cause device failure. TrendMicro. Accessed 24 May 2019"},{"key":"10_CR46","unstructured":"Xmr-stak: Cryptonight all-in-one mining software. \nhttps:\/\/github.com\/fireice-uk\/xmr-stak\n\n. Accessed 24 May 2019"},{"issue":"6","key":"10_CR47","first-page":"3258","volume":"13","author":"A Zimba","year":"2019","unstructured":"Zimba, A., Wang, Z., Chen, H., Mulenga, M.: Recent advances in cryptovirology: state-of-the-art crypto mining and crypto ransomware attacks. KSII Trans. Internet Inf. Syst. (TIIS) 13(6), 3258\u20133279 (2019)","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"10_CR48","unstructured":"Zmudzinski, A.: Monero developers consider adopting new proof-of-work algorithm in october. Cointelegraph (2019). \nhttps:\/\/cointelegraph.com\/news\/monero-developers-consider-adopting-new-proof-of-work-algorithm-in-october\n\n. Accessed 23 Aug 2019"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35055-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T06:06:05Z","timestamp":1575439565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35055-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030350543","9783030350550"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35055-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aalborg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nordsec2019.cs.aau.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}