{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:27:53Z","timestamp":1769941673756,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["VAMOS (FKZ 16KIS0534) and FIDI (FKZ 16KIS0786K)"],"award-info":[{"award-number":["VAMOS (FKZ 16KIS0534) and FIDI (FKZ 16KIS0786K)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339261","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Thieves in the Browser"],"prefix":"10.1145","author":[{"given":"Marius","family":"Musch","sequence":"first","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Christian","family":"Wressnegger","sequence":"additional","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Martin","family":"Johns","sequence":"additional","affiliation":[{"name":"TU Braunschweig"}]},{"given":"Konrad","family":"Rieck","sequence":"additional","affiliation":[{"name":"TU Braunschweig"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Oct.","author":"Research AdGuard","year":"2017","unstructured":"AdGuard Research . Cryptocurrency mining affects over 500 million people. And they have no idea it is happening. Website https:\/\/adguard.com\/en\/blog\/cryptomining-fever\/ , Oct. 2017 . AdGuard Research. Cryptocurrency mining affects over 500 million people. And they have no idea it is happening. Website https:\/\/adguard.com\/en\/blog\/cryptomining-fever\/, Oct. 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26096-9_29"},{"key":"e_1_3_2_1_3_1","first-page":"894","volume":"412","author":"Barab\u00e1si A.-L.","year":"2001","unstructured":"A.-L. Barab\u00e1si , V. W. Freeh , H. Jeong , and J. B. Brockman . Parasitic computing. Nature , 412 : 894 -- 897 , 2001 . A.-L. Barab\u00e1si, V. W. Freeh, H. Jeong, and J. B. Brockman. Parasitic computing. Nature, 412:894--897, 2001.","journal-title":"Parasitic computing. Nature"},{"key":"e_1_3_2_1_4_1","volume-title":"Aug.","author":"Computer Bleeping","year":"2018","unstructured":"Bleeping Computer . Massive Coinhive Cryptojacking Campaign Touches Over 200,000 MikroTik Routers. Website https:\/\/www.bleepingcomputer.com\/news\/security\/massive-coinhive-cryptojacking-campaign-touches-over-200-000-mikrotik-routers\/ , Aug. 2018 . Bleeping Computer. Massive Coinhive Cryptojacking Campaign Touches Over 200,000 MikroTik Routers. Website https:\/\/www.bleepingcomputer.com\/news\/security\/massive-coinhive-cryptojacking-campaign-touches-over-200-000-mikrotik-routers\/, Aug. 2018."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_6_1","volume-title":"May","author":"CryptoNote Bytecoin","year":"2018","unstructured":"Bytecoin. Bytecoin (BCN) -- Anonymous cryptocurrency based on CryptoNote . Website https:\/\/bytecoin.org , May 2018 . Bytecoin. Bytecoin (BCN) -- Anonymous cryptocurrency based on CryptoNote. Website https:\/\/bytecoin.org, May 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"May","year":"2018","unstructured":"ChromeDevTools. Chrome DevTools Protocol Viewer. Website https:\/\/chromedevtools.github.io\/devtools-protocol\/ , May 2018 . ChromeDevTools. Chrome DevTools Protocol Viewer. Website https:\/\/chromedevtools.github.io\/devtools-protocol\/, May 2018."},{"key":"e_1_3_2_1_8_1","volume-title":"May","year":"2018","unstructured":"CoinMarketCap. CoinMarketCap -- Market Capitalization of Cryptocurrencies. Website https:\/\/coinmarketcap.com\/currencies\/ , May 2018 . CoinMarketCap. CoinMarketCap -- Market Capitalization of Cryptocurrencies. Website https:\/\/coinmarketcap.com\/currencies\/, May 2018."},{"key":"e_1_3_2_1_9_1","volume-title":"Apr.","author":"Council of European Union.","year":"2016","unstructured":"Council of European Union. Council regulation (EU) no 679\/2016. Website https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32016R0679 , Apr. 2016 . Council of European Union. Council regulation (EU) no 679\/2016. Website https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32016R0679, Apr. 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"Nov.","author":"de Groot W.","year":"2017","unstructured":"W. de Groot . Cryptojacking found on 2496 online stores. Website https:\/\/gwillem.gitlab.io\/2017\/11\/07\/cryptojacking-found-on-2496-stores\/ , Nov. 2017 . W. de Groot. Cryptojacking found on 2496 online stores. Website https:\/\/gwillem.gitlab.io\/2017\/11\/07\/cryptojacking-found-on-2496-stores\/, Nov. 2017."},{"key":"e_1_3_2_1_11_1","volume-title":"Electroneum -- The mobile based cryptocurrency. Website https:\/\/electroneum.com","author":"Ltd Electroneum","year":"2018","unstructured":"Electroneum Ltd . Electroneum -- The mobile based cryptocurrency. Website https:\/\/electroneum.com , 2018 . Electroneum Ltd. Electroneum -- The mobile based cryptocurrency. Website https:\/\/electroneum.com, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00014"},{"key":"e_1_3_2_1_13_1","volume-title":"The skein hash function family. Version 1.1","author":"Ferguson N.","year":"2008","unstructured":"N. Ferguson , S. Lucks , B. Schneier , D. Whiting , M. Bellare , T. Kohno , J. Callas , and J. Walker . The skein hash function family. Version 1.1 , 2008 . N. Ferguson, S. Lucks, B. Schneier, D. Whiting, M. Bellare, T. Kohno, J. Callas, and J. Walker. The skein hash function family. Version 1.1, 2008."},{"key":"e_1_3_2_1_14_1","volume-title":"Dec.","author":"Fette I.","year":"2011","unstructured":"I. Fette and A. Melnikov . The websocket protocol. RFC 6455 (Proposed Standard) , Dec. 2011 . URL http:\/\/www.ietf.org\/rfc\/rfc6455.txt. Updated by RFC 7936. I. Fette and A. Melnikov. The websocket protocol. RFC 6455 (Proposed Standard), Dec. 2011. URL http:\/\/www.ietf.org\/rfc\/rfc6455.txt. Updated by RFC 7936."},{"key":"e_1_3_2_1_15_1","volume-title":"Website https:\/\/arstechnica.com\/information-technology\/2018\/01\/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners\/","author":"Goodin D.","year":"2018","unstructured":"D. Goodin . Now even YouTube serves ads with CPU-draining cryptocurrency miners. Ars Technica , Website https:\/\/arstechnica.com\/information-technology\/2018\/01\/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners\/ , Jan. 2018 . D. Goodin. Now even YouTube serves ads with CPU-draining cryptocurrency miners. Ars Technica, Website https:\/\/arstechnica.com\/information-technology\/2018\/01\/now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners\/, Jan. 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_1_17_1","volume-title":"Sept.","author":"Hickson I.","year":"2015","unstructured":"I. Hickson . Web workers. W3C Working Draft , Sept. 2015 . URL https:\/\/www.w3.org\/TR\/2015\/WD-workers-20150924\/. I. Hickson. Web workers. W3C Working Draft, Sept. 2015. URL https:\/\/www.w3.org\/TR\/2015\/WD-workers-20150924\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23044"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.48"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"e_1_3_2_1_22_1","volume-title":"Mar.","author":"Krebs B.","year":"2018","unstructured":"B. Krebs . Who and What Is Coinhive? Website https:\/\/krebsonsecurity.com\/2018\/03\/who-and-what-is-coinhive , Mar. 2018 . B. Krebs. Who and What Is Coinhive? Website https:\/\/krebsonsecurity.com\/2018\/03\/who-and-what-is-coinhive, Mar. 2018."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0025"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of USENIX Security Symposium","author":"Moshchuk A.","year":"2007","unstructured":"A. Moshchuk , T. Bragin , D. Deville , S. D. Gribble , and H. M. Levy . Spyproxy: Execution-based detection of malicious web content . In Proc. of USENIX Security Symposium , 2007 . A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy. Spyproxy: Execution-based detection of malicious web content. In Proc. of USENIX Security Symposium, 2007."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_2"},{"key":"e_1_3_2_1_27_1","volume-title":"May","author":"Nakamoto S.","year":"2009","unstructured":"S. Nakamoto . Bitcoin: A peer-to-peer electronic cash system , May 2009 . URL http:\/\/www.bitcoin.org\/bitcoin.pdf. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, May 2009. URL http:\/\/www.bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"Proc. of USENIX Security Symposium","author":"Provos N.","year":"2008","unstructured":"N. Provos , P. Mavrommatis , M. A. Rajab , and F. Monrose . All your iframes point to us . In Proc. of USENIX Security Symposium , pages 1 -- 15 , 2008 . N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iframes point to us. In Proc. of USENIX Security Symposium, pages 1--15, 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176951"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274735"},{"key":"e_1_3_2_1_31_1","volume-title":"Feb.","author":"Rossberg A.","year":"2018","unstructured":"A. Rossberg . Webassembly core specification. W3C First Public Working Draft , Feb. 2018 . URL https:\/\/www.w3.org\/TR\/2018\/WD-wasm-core-1-20180215. A. Rossberg. Webassembly core specification. W3C First Public Working Draft, Feb. 2018. URL https:\/\/www.w3.org\/TR\/2018\/WD-wasm-core-1-20180215."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/576628"},{"key":"e_1_3_2_1_33_1","volume-title":"Feb.","author":"Helme Scott","year":"2018","unstructured":"Scott Helme . Protect your site from Cryptojacking with CSP + SRI. Website https:\/\/scotthelme.co.uk\/protect-site-from-cryptojacking-csp-sri\/ , Feb. 2018 . Scott Helme. Protect your site from Cryptojacking with CSP + SRI. Website https:\/\/scotthelme.co.uk\/protect-site-from-cryptojacking-csp-sri\/, Feb. 2018."},{"key":"e_1_3_2_1_34_1","volume-title":"Cryptonight hash function. CryptoNote Standard","author":"Jameson M.","year":"2008","unstructured":"\"Seigen\", M. Jameson , T. Nieminen , \"Neocortex\", and A. M. Juarez . Cryptonight hash function. CryptoNote Standard 008, Mar. 2008 . URL https:\/\/cryptonote.org\/cns\/cns008.txt. \"Seigen\", M. Jameson, T. Nieminen, \"Neocortex\", and A. M. Juarez. Cryptonight hash function. CryptoNote Standard 008, Mar. 2008. URL https:\/\/cryptonote.org\/cns\/cns008.txt."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_13"},{"key":"e_1_3_2_1_36_1","volume-title":"May","author":"Project The Monero","year":"2018","unstructured":"The Monero Project . Monero: Home . Website https:\/\/getmonero.org\/ , May 2018 . The Monero Project. Monero: Home. Website https:\/\/getmonero.org\/, May 2018."},{"key":"e_1_3_2_1_37_1","volume-title":"Dwarf debugging information format. Revision 2.0.0","author":"International UNIX","year":"1993","unstructured":"UNIX International . Dwarf debugging information format. Revision 2.0.0 , 1993 . UNIX International. Dwarf debugging information format. Revision 2.0.0, 1993."},{"key":"e_1_3_2_1_38_1","volume-title":"CryptoNote","author":"van Saberhagen N.","year":"2013","unstructured":"N. van Saberhagen . Cryptonote v2.0. Technical report , CryptoNote , Oct. 2013 . N. van Saberhagen. Cryptonote v2.0. Technical report, CryptoNote, Oct. 2013."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_7"},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of Network and Distributed System Security Symposium (NDSS)","author":"Wang Y.-M.","year":"2006","unstructured":"Y.-M. Wang , D. Beck , X. Jiang , R. Roussev , C. Verbowski , S. Chen , and S. King . Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities . In Proc. of Network and Distributed System Security Symposium (NDSS) , 2006 . Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. of Network and Distributed System Security Symposium (NDSS), 2006."},{"key":"e_1_3_2_1_41_1","volume-title":"Sept.","year":"2017","unstructured":"Wired. Your Browser Could Be Mining Cryptocurrency for a Stranger. Website https:\/\/www.wired.com\/story\/cryptojacking-cryptocurrency-mining-browser\/ , Sept. 2017 . Wired. Your Browser Could Be Mining Cryptocurrency for a Stranger. Website https:\/\/www.wired.com\/story\/cryptojacking-cryptocurrency-mining-browser\/, Sept. 2017."}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom","acronym":"ARES '19"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339261","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339261"}},"subtitle":["Web-based Cryptojacking in the Wild"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":41,"alternative-id":["10.1145\/3339252.3339261","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339261","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}