{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T11:52:49Z","timestamp":1769946769953,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380085","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"3112-3118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["MineThrottle: Defending against Wasm In-Browser Cryptojacking"],"prefix":"10.1145","author":[{"given":"Weikang","family":"Bian","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Wei","family":"Meng","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Mingxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Dr. Mine. https:\/\/github.com\/1lastBr3ath\/drmine.  2018. Dr. Mine. https:\/\/github.com\/1lastBr3ath\/drmine."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. The Illicit Cryptocurrency Mining Threat. https:\/\/www.cyberthreatalliance.org\/wp-content\/uploads\/2018\/09\/CTA-Illicit-CryptoMining-Whitepaper.pdf.  2018. The Illicit Cryptocurrency Mining Threat. https:\/\/www.cyberthreatalliance.org\/wp-content\/uploads\/2018\/09\/CTA-Illicit-CryptoMining-Whitepaper.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. asm.js. http:\/\/asmjs.org\/.  2019. asm.js. http:\/\/asmjs.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. Bitcoin. https:\/\/bitcoin.org\/.  2019. Bitcoin. https:\/\/bitcoin.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. CoinBlocker Lists. https:\/\/zerodot1.gitlab.io\/CoinBlockerListsWeb.  2019. CoinBlocker Lists. https:\/\/zerodot1.gitlab.io\/CoinBlockerListsWeb."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. MinerBlock. https:\/\/github.com\/xd4rker\/MinerBlock.  2019. MinerBlock. https:\/\/github.com\/xd4rker\/MinerBlock."},{"key":"e_1_3_2_1_7_1","unstructured":"2019. Monero. https:\/\/www.getmonero.org.  2019. Monero. https:\/\/www.getmonero.org."},{"key":"e_1_3_2_1_8_1","unstructured":"2019. WebAssembly. https:\/\/webassembly.org\/.  2019. WebAssembly. https:\/\/webassembly.org\/."},{"key":"e_1_3_2_1_9_1","unstructured":"R.\u00a0Neumann an A.\u00a0Toro.April 2018. In-browser mining: Coinhive and WebAssembly.https:\/\/blogs.forcepoint.com\/security-labs\/browser-mining-coinhive-and-webassembly.  R.\u00a0Neumann an A.\u00a0Toro.April 2018. In-browser mining: Coinhive and WebAssembly.https:\/\/blogs.forcepoint.com\/security-labs\/browser-mining-coinhive-and-webassembly."},{"key":"e_1_3_2_1_10_1","unstructured":"J. DeMocker. November 2017. WebAssembly support now shipping in all major browsers. https:\/\/blog.mozilla.org\/blog\/2017\/11\/13\/webassembly-in-browsers\/. In Mozilla Blog.  J. DeMocker. November 2017. WebAssembly support now shipping in all major browsers. https:\/\/blog.mozilla.org\/blog\/2017\/11\/13\/webassembly-in-browsers\/. In Mozilla Blog."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00014"},{"key":"e_1_3_2_1_12_1","volume-title":"March","author":"Seigen","year":"2013"},{"key":"e_1_3_2_1_13_1","unstructured":"William Fu Raymond Lin and Daniel Inge. 2018. TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly. arXiv preprint arXiv:1802.01050(2018).  William Fu Raymond Lin and Daniel Inge. 2018. TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly. arXiv preprint arXiv:1802.01050(2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_1_15_1","unstructured":"Alex Hern. September 2017. Ads don\u2019t work so websites are using your electricity to pay the bills\u2019. https:\/\/www.theguardian.com\/technology\/2017\/sep\/27\/pirate-bay-showtime-ads-websites-electricity-pay-bills-cryptocurrency-bitcoin.  Alex Hern. September 2017. Ads don\u2019t work so websites are using your electricity to pay the bills\u2019. https:\/\/www.theguardian.com\/technology\/2017\/sep\/27\/pirate-bay-showtime-ads-websites-electricity-pay-bills-cryptocurrency-bitcoin."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"e_1_3_2_1_18_1","volume-title":"Github: Block lists to prevent JavaScript miners. https:\/\/github.com\/hoshsadiq\/adblock-nocoin-list.","author":"Hosh","year":"2019"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313665"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"e_1_3_2_1_21_1","unstructured":"Hon Lau. 2017. Browser-based cryptocurrency mining makes unexpected return from the dead. Sympantec Threat Intelligence(2017).  Hon Lau. 2017. Browser-based cryptocurrency mining makes unexpected return from the dead. Sympantec Threat Intelligence(2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304068"},{"key":"e_1_3_2_1_23_1","volume-title":"Christian\u00a0Wressnegger and Konrad Rieck","author":"Marius\u00a0Musch Martin\u00a0Johns","year":"2018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_2"},{"key":"e_1_3_2_1_25_1","unstructured":"James R.September 2013. Processor Tracing. https:\/\/software.intel.com\/en-us\/blogs\/2013\/09\/18\/processor-tracing.  James R.September 2013. Processor Tracing. https:\/\/software.intel.com\/en-us\/blogs\/2013\/09\/18\/processor-tracing."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278539"},{"key":"e_1_3_2_1_27_1","unstructured":"Aron Szanto Timothy Tamm and Artidoro Pagnoni. 2018. Taint Tracking for WebAssembly. arXiv preprint arXiv:1807.08349(2018).  Aron Szanto Timothy Tamm and Artidoro Pagnoni. 2018. Taint Tracking for WebAssembly. arXiv preprint arXiv:1807.08349(2018)."},{"key":"e_1_3_2_1_28_1","unstructured":"TrendMicro. January 2018. Malvertising Campaign Abuses Google\u2019s DoubleClick to Deliver Cryptocurrency Miners. https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/malvertising-campaign-abuses-googles-doubleclick-to-deliver-cryptocurrency-miners\/.  TrendMicro. January 2018. Malvertising Campaign Abuses Google\u2019s DoubleClick to Deliver Cryptocurrency Miners. https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/malvertising-campaign-abuses-googles-doubleclick-to-deliver-cryptocurrency-miners\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_7"},{"key":"e_1_3_2_1_30_1","unstructured":"Mark Ward. October 2017. Websites hacked to mint crypto-cash. http:\/\/www.bbc.com\/news\/technology-41518351.  Mark Ward. October 2017. Websites hacked to mint crypto-cash. http:\/\/www.bbc.com\/news\/technology-41518351."}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:17Z","timestamp":1750199597000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":29,"alternative-id":["10.1145\/3366423.3380085","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380085","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}