{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T09:03:12Z","timestamp":1769936592852,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230869","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["The Other Side of the Coin"],"prefix":"10.1145","author":[{"given":"Julian","family":"Rauchberger","sequence":"first","affiliation":[{"name":"Institute for IT Security Research, St. P\u00f6lten UAS, Austria"}]},{"given":"Sebastian","family":"Schrittwieser","sequence":"additional","affiliation":[{"name":"Josef Ressel Center TARGET, St. P\u00f6lten UAS, Austria"}]},{"given":"Tobias","family":"Dam","sequence":"additional","affiliation":[{"name":"Institute for IT Security Research, St. P\u00f6lten UAS, Austria"}]},{"given":"Robert","family":"Luh","sequence":"additional","affiliation":[{"name":"Josef Ressel Center TARGET, St. P\u00f6lten UAS, Austria"}]},{"given":"Damjan","family":"Buhov","sequence":"additional","affiliation":[{"name":"Josef Ressel Center TARGET, St. P\u00f6lten UAS, Austria"}]},{"given":"Gerhard","family":"P\u00f6tzelsberger","sequence":"additional","affiliation":[{"name":"Institute for IT Security Research, St. P\u00f6lten UAS, Austria"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alexa Top 1 Million Sites. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip.  Alexa Top 1 Million Sites. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip."},{"key":"e_1_3_2_1_2_1","unstructured":"Belkacim I. MinerBlock Browser Extension. https:\/\/github.com\/xd4rker\/MinerBlock.  Belkacim I. MinerBlock Browser Extension. https:\/\/github.com\/xd4rker\/MinerBlock."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_4_1","volume-title":"December's Most Wanted Malware: Crypto-Miners Affect 55% of Businesses Worldwide","author":"Check Point Research Team","year":"2018","unstructured":"Check Point Research Team . December's Most Wanted Malware: Crypto-Miners Affect 55% of Businesses Worldwide , 2018 . https:\/\/blog.checkpoint.com\/2018\/01\/15\/decembers-wanted-malware-crypto-miners-affect-55-businesses-worldwide\/. Check Point Research Team. December's Most Wanted Malware: Crypto-Miners Affect 55% of Businesses Worldwide, 2018. https:\/\/blog.checkpoint.com\/2018\/01\/15\/decembers-wanted-malware-crypto-miners-affect-55-businesses-worldwide\/."},{"key":"e_1_3_2_1_5_1","volume-title":"First week status report","author":"Coinhive","year":"2017","unstructured":"Coinhive . First week status report , 2017 . https:\/\/coinhive.com\/blog\/status-report. Coinhive. First week status report, 2017. https:\/\/coinhive.com\/blog\/status-report."},{"key":"e_1_3_2_1_6_1","volume-title":"Don't Mine Me Coinhive","author":"Davidi A.","year":"2017","unstructured":"Davidi , A. Don't Mine Me Coinhive , 2017 . https:\/\/www.trustwave.com\/Resources\/SpiderLabs-Blog\/%E2%80%9CDon-t-Mine-Me%E2%80%9D-%E2%80%93-Coinhive\/. Davidi, A. Don't Mine Me Coinhive, 2017. https:\/\/www.trustwave.com\/Resources\/SpiderLabs-Blog\/%E2%80%9CDon-t-Mine-Me%E2%80%9D-%E2%80%93-Coinhive\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Cryptojacking -- Cryptomining in the browser","author":"European Union Agency for Network and Information Security (ENISA).","year":"2017","unstructured":"European Union Agency for Network and Information Security (ENISA). Cryptojacking -- Cryptomining in the browser , 2017 . https:\/\/www.enisa.europa.eu\/publications\/info-notes\/cryptojacking-cryptomining-in-the-browser. European Union Agency for Network and Information Security (ENISA). Cryptojacking -- Cryptomining in the browser, 2017. https:\/\/www.enisa.europa.eu\/publications\/info-notes\/cryptojacking-cryptomining-in-the-browser."},{"key":"e_1_3_2_1_8_1","volume-title":"Phantomjs: headless webkit with javascript api. WSEAS Trans. Commun","author":"Hidayat A.","year":"2013","unstructured":"Hidayat , A. Phantomjs: headless webkit with javascript api. WSEAS Trans. Commun ( 2013 ), 457--477. Hidayat, A. Phantomjs: headless webkit with javascript api. WSEAS Trans. Commun (2013), 457--477."},{"key":"e_1_3_2_1_9_1","unstructured":"Hill R. ublock Origin Browser Extension. https:\/\/github.com\/gorhill\/uBlock\/.  Hill R. ublock Origin Browser Extension. https:\/\/github.com\/gorhill\/uBlock\/."},{"key":"e_1_3_2_1_10_1","volume-title":"NDSS","author":"Huang D. Y.","year":"2014","unstructured":"Huang , D. Y. , Dharmdasani , H. , Meiklejohn , S. , Dave , V. , Crier , C. , McCoy , D. , Savage , S. , Weaver , N. , Snoeren , A. C. , and Levchenko , K . Botcoin: Monetizing stolen cycles . In NDSS ( 2014 ). Huang, D. Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Crier, C., McCoy, D., Savage, S., Weaver, N., Snoeren, A. C., and Levchenko, K. Botcoin: Monetizing stolen cycles. In NDSS (2014)."},{"key":"e_1_3_2_1_11_1","unstructured":"Keramidas R. NoCoin Browser Extension. https:\/\/github.com\/keraf\/NoCoin.  Keramidas R. NoCoin Browser Extension. https:\/\/github.com\/keraf\/NoCoin."},{"key":"e_1_3_2_1_12_1","volume-title":"Browser-based cryptocurrency mining makes unexpected return from the dead","author":"Lau H.","year":"2017","unstructured":"Lau , H. Browser-based cryptocurrency mining makes unexpected return from the dead , 2017 . https:\/\/www.symantec.com\/blogs\/threat-intelligence\/browser-mining-cryptocurrency. Lau, H. Browser-based cryptocurrency mining makes unexpected return from the dead, 2017. https:\/\/www.symantec.com\/blogs\/threat-intelligence\/browser-mining-cryptocurrency."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_14_1","first-page":"919","volume-title":"Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems","author":"Lewenberg Y.","year":"2015","unstructured":"Lewenberg , Y. , Bachrach , Y. , Sompolinsky , Y. , Zohar , A. , and Rosenschein , J. S . Bitcoin mining pools: A cooperative game theoretic analysis . In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems ( 2015 ), International Foundation for Autonomous Agents and Multiagent Systems , pp. 919 --- 927 . Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A., and Rosenschein, J. S. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (2015), International Foundation for Autonomous Agents and Multiagent Systems, pp. 919---927."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382267"},{"key":"e_1_3_2_1_16_1","volume-title":"Cryptocurrency mining affects over 500 million people. And they have no idea it is happening","author":"Meshkov A.","year":"2017","unstructured":"Meshkov , A. Cryptocurrency mining affects over 500 million people. And they have no idea it is happening ., 2017 . https:\/\/blog.adguard.com\/en\/crypto-mining-fever\/. Meshkov, A. Cryptocurrency mining affects over 500 million people. And they have no idea it is happening., 2017. https:\/\/blog.adguard.com\/en\/crypto-mining-fever\/."},{"key":"e_1_3_2_1_17_1","volume-title":"Cryptojacking surges in popularity growing by 31% over the past month","author":"Meshkov A.","year":"2017","unstructured":"Meshkov , A. Cryptojacking surges in popularity growing by 31% over the past month , 2017 . https:\/\/blog.adguard.com\/en\/november_mining_stats\/. Meshkov, A. Cryptojacking surges in popularity growing by 31% over the past month, 2017. https:\/\/blog.adguard.com\/en\/november_mining_stats\/."},{"key":"e_1_3_2_1_18_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"Nakamoto , S. Bitcoin: A peer-to-peer electronic cash system , 2008 . Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, 2008."},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Cyber Conflict (CYCON), 2012 4th International Conference on","author":"Plohmann D.","year":"2012","unstructured":"Plohmann , D. , and Gerhards-Padilla , E . Case study of the miner botnet . In Cyber Conflict (CYCON), 2012 4th International Conference on ( 2012 ), IEEE, pp. 1 --- 16 . Plohmann, D., and Gerhards-Padilla, E. Case study of the miner botnet. In Cyber Conflict (CYCON), 2012 4th International Conference on (2012), IEEE, pp. 1---16."},{"key":"e_1_3_2_1_20_1","volume-title":"A look into the global drive-by cryptocurrency mining phenomenon","author":"Segura J.","year":"2017","unstructured":"Segura , J. A look into the global drive-by cryptocurrency mining phenomenon , 2017 . https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/Drive-by_Mining_FINAL.pdf. Segura, J. A look into the global drive-by cryptocurrency mining phenomenon, 2017. https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/Drive-by_Mining_FINAL.pdf."},{"key":"e_1_3_2_1_21_1","volume-title":"CryptoNight Hash Function","author":"Seigen","year":"2013","unstructured":"Seigen , Jameson, M., Nieminen , T. , Neocortex , and Juarez, A. M . CryptoNight Hash Function , 2013 . https:\/\/cryptonote.org\/cns\/cns008.txt. Seigen, Jameson, M., Nieminen, T., Neocortex, and Juarez, A. M. CryptoNight Hash Function, 2013. https:\/\/cryptonote.org\/cns\/cns008.txt."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"e_1_3_2_1_23_1","volume-title":"Cryptonote v 2. 0","author":"Van Saberhagen N.","year":"2013","unstructured":"Van Saberhagen , N. Cryptonote v 2. 0 , 2013 . https:\/\/cryptonote.org\/whitepaper.pdf. Van Saberhagen, N. Cryptonote v 2. 0, 2013. https:\/\/cryptonote.org\/whitepaper.pdf."},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"A secure decentralised generalised transaction ledger","volume":"151","author":"Wood G.","year":"2014","unstructured":"Wood , G. Ethereum : A secure decentralised generalised transaction ledger . Ethereum Project Yellow Paper 151 ( 2014 ), 1 -- 32 . Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014), 1--32.","journal-title":"Ethereum Project Yellow Paper"},{"key":"e_1_3_2_1_25_1","volume-title":"The zeroaccess botnet---mining and fraud for massive financial gain. Sophos Technical Paper","author":"Wyke J.","year":"2012","unstructured":"Wyke , J. The zeroaccess botnet---mining and fraud for massive financial gain. Sophos Technical Paper ( 2012 ). Wyke, J. The zeroaccess botnet---mining and fraud for massive financial gain. Sophos Technical Paper (2012)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663719"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany","acronym":"ARES 2018","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"]},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230869"}},"subtitle":["A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":26,"alternative-id":["10.1145\/3230833.3230869","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230869","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}