{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T11:13:21Z","timestamp":1769944401454,"version":"3.49.0"},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["CSIT 2 EP\/N508664\/1"],"award-info":[{"award-number":["CSIT 2 EP\/N508664\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/msec.2019.2920585","type":"journal-article","created":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T17:07:15Z","timestamp":1562519235000},"page":"16-22","source":"Crossref","is-referenced-by-count":27,"title":["You Could Be Mine(d): The Rise of Cryptojacking"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8424-2757","authenticated-orcid":false,"given":"Domhnall","family":"Carlin","sequence":"first","affiliation":[{"name":"Centre for Secure Information Technologies, Queen's University Belfast, Belfast, North Ireland"}]},{"given":"Jonah","family":"Burgess","sequence":"additional","affiliation":[{"name":"Centre for Secure Information Technologies, Queen's University Belfast, Belfast, North Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7792-336X","authenticated-orcid":false,"given":"Philip","family":"O'Kane","sequence":"additional","affiliation":[{"name":"Centre for Secure Information Technologies, Queen's University Belfast, Belfast, North Ireland"}]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[{"name":"Centre for Secure Information Technologies, Queen's University Belfast, Belfast, North Ireland"}]}],"member":"263","reference":[{"key":"ref10","year":"2018","journal-title":"Basic attention token (BAT) Blockchain based digital advertising"},{"key":"ref11","author":"liu","year":"2018","journal-title":"Malvertising campaign abuses google's doubleclick to deliver cryptocurrency miners"},{"key":"ref12","author":"segura","year":"2018","journal-title":"The state of malicious cryptomining"},{"key":"ref13","author":"goodin","year":"2017","journal-title":"Currency-mining android malware is so aggressive it can physically harm phones"},{"key":"ref14","year":"2018","journal-title":"NCSC advice Malicious software used to illegally mine cryptocurrency"},{"key":"ref15","author":"segura","year":"2017","journal-title":"Persistent Drive-by Cryptomining Coming to a Browser Near You"},{"key":"ref16","year":"2006","journal-title":"No 05-1421 United States of America v James E Macewan"},{"key":"ref4","author":"liao","year":"2018","journal-title":"Cryptojacking rates increased by 85 times in q4 2017 as bitcoin prices spiked report"},{"key":"ref3","author":"mertens","year":"2018","journal-title":"The crypto miners fight for CPU cycles"},{"key":"ref6","author":"meshkov","year":"2017","journal-title":"Crypto-streaming strikes back"},{"key":"ref5","year":"2017","journal-title":"Malwarebytes reveals 2018 security predictions"},{"key":"ref8","author":"helme","year":"2018","journal-title":"Protect your site from cryptojacking with csp + sri"},{"key":"ref7","author":"avital","year":"2018","journal-title":"New research Crypto-mining drives almost 90% of all remote code execution attacks"},{"key":"ref2","year":"2014","journal-title":"Rubin v New Jersey (Tidbit)"},{"key":"ref1","author":"viscuso","year":"2017","journal-title":"What is a non-malware (or fileless) attack?"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00014"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/9041676\/08753587.pdf?arnumber=8753587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:55:55Z","timestamp":1651780555000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8753587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":16,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/msec.2019.2920585","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}