{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:07:28Z","timestamp":1769940448187,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Mozilla Corporation"},{"name":"Facebook"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416580","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"1129-1140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["MinerRay"],"prefix":"10.1145","author":[{"given":"Alan","family":"Romano","sequence":"first","affiliation":[{"name":"The State University of New York at Buffalo"}]},{"given":"Yunhui","family":"Zheng","sequence":"additional","affiliation":[{"name":"IBM Thomas J. Watson Research Center"}]},{"given":"Weihang","family":"Wang","sequence":"additional","affiliation":[{"name":"The State University of New York at Buffalo"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2012. JavaScript Minifier. https:\/\/javascript-minifier.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2014. asmjs. https:\/\/asmjs.org."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Coinhive: A Crypto Miner for your Website. https:\/\/coinhive.com."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. CoinMarketCap. https:\/\/coinmarketcap.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. Ethereum Core Devs to Move Forward With ASIC-Resistant PoW Algorithm. https:\/\/cointelegraph.com\/news\/ethereum-core-devs-to-move-forward-with-asic-resistant-pow-algorithm."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. ikwilthepiratebay.org. https:\/\/web.archive.org\/web\/20190130093638\/https:\/\/ikwilthepiratebay.org\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2019. JavaScript Obfuscator. https:\/\/obruscator.io\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2019. jjencode - Encode any JavaScript program using only symbols. http:\/\/utf8.jp\/public\/jjencode.html."},{"key":"e_1_3_2_1_9_1","unstructured":"2019. JS Obfuscator. https:\/\/www.cleancss.com\/javascript-obruscate\/index.php."},{"key":"e_1_3_2_1_10_1","unstructured":"2019. JSFuck - Write any JavaScript with 6 Characters: []()!+. http:\/\/www.jsfuck.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2019. White Paper webchain-network\/wiki Wiki. https:\/\/github.com\/webchainnetwork\/wiki\/wiki\/White-Paper#the-protocol."},{"key":"e_1_3_2_1_12_1","unstructured":"2020. Algorithms. https:\/\/xmrig.com\/docs\/algorithms."},{"key":"e_1_3_2_1_13_1","unstructured":"2020. AssemblyScript\/assemblyscript: Definitely not a TypeScript to WebAssembly compiler. https:\/\/github.com\/AssemblyScript\/assemblyscript."},{"key":"e_1_3_2_1_14_1","unstructured":"2020. CoinIMP 0% fee JavaScript Mining Browser Mining Browser Miner. https:\/\/www.coinimp.com\/."},{"key":"e_1_3_2_1_15_1","unstructured":"2020. MinerRay Source Code | miner-ray.github.io. https:\/\/miner-ray.github.io\/."},{"key":"e_1_3_2_1_16_1","unstructured":"2020. The WebAssembly Binary Toolkit. https:\/\/github.com\/WebAssembly\/wabt."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985871"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Jean-Philippe Aumasson Willi Meier Raphael Phan and Luca Henzen. 2014. The Hash Function BLAKE. 10.1007\/978-3-662-44757-4","DOI":"10.1007\/978-3-662-44757-4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"e_1_3_2_1_20_1","unstructured":"Timo Bartkewitz. 2009. Building Hash Functions from Block Ciphers Their Security and Implementation Properties."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"e_1_3_2_1_22_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Bijmans Hugo L.J.","year":"2019","unstructured":"Hugo L.J. Bijmans, Tim M. Booij, and Christian Doerr. 2019. Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1627--1644. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/bijmans"},{"key":"e_1_3_2_1_23_1","unstructured":"Alex Biryukov Daniel Dinu and Dmitry Khovratovich. 2017. Argon2: the memory-hard function for password hashing and other applications. https:\/\/www.cryptolux.org\/images\/0\/0d7Argon2.pdf."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382217"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669162"},{"key":"e_1_3_2_1_26_1","volume-title":"Coinhive cryptojacking service to shut down","author":"Cimpanu Catalin","year":"2019","unstructured":"Catalin Cimpanu. [n.d.]. Coinhive cryptojacking service to shut down in March 2019. Error! Hyperlink reference not valid.down-in-march-2019\/"},{"key":"e_1_3_2_1_27_1","unstructured":"CryptoLoot. 2019. Update: uPlexa Re-Added Monero to be Delisted. https:\/\/crypto-loot.org\/news."},{"key":"e_1_3_2_1_28_1","unstructured":"CryptoMineDev. [n.d.]. minerBlock. https:\/\/github.com\/xd4rker\/MinerBlock."},{"key":"e_1_3_2_1_29_1","unstructured":"CryptoSlate. 2019. European Central Bank: Bitcoin isn't a threat cryptocurrency not a new asset class. https:\/\/cryptoslate.com\/european-central-bank-bitcoin-isnt-a-threat-cryptocurrency-not-a-new-asset-class\/."},{"key":"e_1_3_2_1_30_1","unstructured":"The Lethean developers. 2019. Lethean Cryptocurrency. https:\/\/lethean.io\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Morris Dworkin. 2017. Block Cipher Techniques. https:\/\/csrc.nist.gov\/projects\/block-cipher-techniques"},{"key":"e_1_3_2_1_32_1","volume-title":"Dray Jr","author":"Dworkin Morris J.","year":"2001","unstructured":"Morris J. Dworkin, Elaine B. Barker, James R. Nechvatal, James Foti, Lawrence E. Bassham, E. Roback, and James F. Dray Jr. 2001. Announcing the ADVANCED ENCRYPTION STANDARD (AES)."},{"key":"e_1_3_2_1_33_1","unstructured":"JEFF EDWARDS. 2018. How To Detect And Stop Cryptomining On Your Network. https:\/\/blog.ipswitch.com\/how-to-detect-and-stop-cryptojacking-on-your-network."},{"key":"e_1_3_2_1_34_1","volume-title":"A first look at browser-based Cryptojacking. CoRR abs\/1803.02887","author":"Eskandari Shayan","year":"2018","unstructured":"Shayan Eskandari, Andreas Leoutsarakos, Troy Mursch, and Jeremy Clark. 2018. A first look at browser-based Cryptojacking. CoRR abs\/1803.02887 (2018). arXiv:1803.02887 http:\/\/arxiv.org\/abs\/1803.02887"},{"key":"e_1_3_2_1_35_1","unstructured":"Niels Ferguson Stefan Lucks Bruce Schneier Doug Whiting Mihir Bellare Tadayoshi Kohno Jon Callas and Jesse Walker. 2009. The Skein Hask Function Family."},{"key":"e_1_3_2_1_36_1","volume-title":"Gr\u00f8stl - a SHA-3 candidate. (09","author":"Gauravaram Praveen","year":"2008","unstructured":"Praveen Gauravaram, Lars Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schlaffer, and S\u00f8ren Thomsen. 2008. Gr\u00f8stl - a SHA-3 candidate. (09 2008)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102546.1102561"},{"key":"e_1_3_2_1_38_1","volume-title":"Recent Advances in Intrusion Detection","author":"Gr\u00f6bert Felix","unstructured":"Felix Gr\u00f6bert, Carsten Willems, and Thorsten Holz. 2011. Automated Identification of Cryptographic Primitives in Binary Programs. In Recent Advances in Intrusion Detection, Robin Sommer, Davide Balzarotti, and Gregor Maier (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 41--60."},{"key":"e_1_3_2_1_39_1","unstructured":"Ariya Hidayat. [n.d.]. ECMAScript parsing infrastructure for multipurpose analysis. http:\/\/esprima.org\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"e_1_3_2_1_41_1","unstructured":"Keraf. [n.d.]. No Coin - Block miners on the web! https:\/\/github.com\/keraf\/NoCoin."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313665"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597807"},{"key":"e_1_3_2_1_45_1","unstructured":"Malwarebytes. [n.d.]. Cryptojacking. https:\/\/www.malwarebytes.com\/cryptojacking\/report."},{"key":"e_1_3_2_1_46_1","unstructured":"Kornelia Mielczarczyk. 2017. Opera 50 Beta RC with Cryptocurrency Mining Protection. https:\/\/blogs.opera.com\/desktop\/2017\/12\/opera-50-beta-rc-cryptocurrency-mining-protection\/."},{"key":"e_1_3_2_1_47_1","unstructured":"Troy Mursch. 2017. CRYPTOJACKING MALWARE COINHIVE FOUND ON 30 000+ WEBSITES. https:\/\/badpackets.net\/cryptojacldng-malware-coinhive-found-on-30000-websites\/."},{"key":"e_1_3_2_1_48_1","unstructured":"Marius Musch Christian Wressnegger Martin Johns and Konrad Rieck. [n.d]. New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. ([n.d.])."},{"key":"e_1_3_2_1_49_1","volume-title":"Web-based Cryptojacking in the Wild. CoRR abs\/1808.09474","author":"Musch Marius","year":"2018","unstructured":"Marius Musch, Christian Wressnegger, Martin Johns, and Konrad Rieck. 2018. Web-based Cryptojacking in the Wild. CoRR abs\/1808.09474 (2018). arXiv:1808.09474 http:\/\/arxiv.org\/abs\/1808.09474"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-006-6955-z"},{"key":"e_1_3_2_1_51_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03 2009)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-013-0128-9"},{"key":"e_1_3_2_1_53_1","volume-title":"Cryptojacking up 8500% in Q4","author":"Nohe Patrick","year":"2017","unstructured":"Patrick Nohe. 2018. Cryptojacking up 8500% in Q4 2017. https:\/\/www.thesslstore.com\/blog\/cryptojacking-8500-q4-2017-symantec\/."},{"key":"e_1_3_2_1_54_1","volume-title":"Truth in web mining: Measuring the profitability and cost of cryptominers as a web monetization model. arXiv preprint arXiv:1806.01994","author":"Papadopoulos Panagiotis","year":"2018","unstructured":"Panagiotis Papadopoulos, Panagiotis Ilia, and Evangelos P Markatos. 2018. Truth in web mining: Measuring the profitability and cost of cryptominers as a web monetization model. arXiv preprint arXiv:1806.01994 (2018)."},{"key":"e_1_3_2_1_55_1","first-page":"322","article-title":"Revisiting Dedicated and Block Cipher based Hash Functions","volume":"2012","author":"Pattanayak Anupam","year":"2012","unstructured":"Anupam Pattanayak. 2012. Revisiting Dedicated and Block Cipher based Hash Functions. IACR Cryptology ePrint Archive 2012 (2012), 322.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_56_1","unstructured":"BitcoinWiki project. 2018. CryptoNight-Heavy. https:\/\/en.bitcoinwiki.org\/wiki\/CryptoNight-Heavy."},{"key":"e_1_3_2_1_57_1","unstructured":"Sumokoin Project. 2019. Sumokoin - Digital Cash For Highly-Confidential Transactions. https:\/\/www.sumokoin.org\/."},{"key":"e_1_3_2_1_58_1","unstructured":"The Monero Project. 2019. Monero: the Secure Private Untraceable Cryptocurrency. https:\/\/getmonero.org."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274735"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278539"},{"key":"e_1_3_2_1_61_1","volume-title":"End-to-End Analysis of In-Browser Cryptojacking. CoRR abs\/1809.02152","author":"Saad Muhammad","year":"2018","unstructured":"Muhammad Saad, Aminollah Khormali, and Aziz Mohaisen. 2018. End-to-End Analysis of In-Browser Cryptojacking. CoRR abs\/1809.02152 (2018). arXiv:1809.02152 http:\/\/arxiv.org\/abs\/1809.02152"},{"key":"e_1_3_2_1_62_1","volume-title":"Juarez","author":"Jameson Max","year":"2013","unstructured":"Seigen, Max Jameson, Tuomo Nieminen, Neocortex, and Antonio M. Juarez. 2013. CryptoNight Hash Function. (2013). https:\/\/cryptonote.org\/cns\/cns008.txt"},{"key":"e_1_3_2_1_63_1","unstructured":"Symantec. 2018. 2018 Internet Security Threat Report. https:\/\/www.symantec.com\/security-center\/threat-report."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_13"},{"key":"e_1_3_2_1_65_1","unstructured":"The JSE Team. 2019. JSECoin - JavaScript Embedded Cryptocurrency. https:\/\/jsecoin.com\/."},{"key":"e_1_3_2_1_66_1","unstructured":"Trend-Micro. 2018. 2018 Midyear Security Roundup: Unseen Threats Imminent Losses. https:\/\/documents.trendmicro.com\/assets\/rpt\/rpt-2018-Midyear-Security-Roundup-unseen-threats-imminent-losses.pdf."},{"key":"e_1_3_2_1_67_1","unstructured":"uPlexa. 2019. uPlexa. https:\/\/github.com\/uPlexa\/uplexa."},{"key":"e_1_3_2_1_68_1","unstructured":"uPlexa. 2019. uPlexa: Incentivizing the mass compute power of IoT devices to form a means of anonymous blockchain payments. https:\/\/uplexa.com\/."},{"key":"e_1_3_2_1_69_1","unstructured":"uPlexa Team. 2018. uPlexa Whitepaper. https:\/\/uplexa.com\/content\/uPlexa-Whitepaper-EN.pdf."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","unstructured":"Said Varlioglu Bilal Gonen M. Ozer and Mehmet Bastug. 2020. Is Cryptojacking Dead After Coinhive Shutdown? 385--389. 10.1109\/ICICT50521.2020.00068","DOI":"10.1109\/ICICT50521.2020.00068"},{"key":"e_1_3_2_1_71_1","unstructured":"W3C. [n.d.]. WebAssembly. https:\/\/webassembly.org\/."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_7"},{"key":"e_1_3_2_1_73_1","unstructured":"WebDollar. 2019. WebDollar - Currency of the Internet. https:\/\/webdollar.io\/."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.56"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_6"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416580","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416580"}},"subtitle":["semantics-aware analysis for ever-evolving cryptojacking detection"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":75,"alternative-id":["10.1145\/3324884.3416580","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416580","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}