{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T13:04:58Z","timestamp":1769951098643,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["PeT-HMR"],"award-info":[{"award-number":["PeT-HMR"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["EMSIK"],"award-info":[{"award-number":["EMSIK"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,24]]},"DOI":"10.1145\/3577923.3583655","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T10:57:59Z","timestamp":1681988279000},"page":"177-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1266-378X","authenticated-orcid":false,"given":"Claudius","family":"Pott","sequence":"first","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6268-6325","authenticated-orcid":false,"given":"Berk","family":"Gulmezoglu","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, IA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1116-6973","authenticated-orcid":false,"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[{"name":"University of L\u00fcbeck, L\u00fcbeck, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2014.6993402"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924549"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3150376.3150378"},{"key":"e_1_3_2_1_4_1","unstructured":"Vitalik Buterin. 2016. Hard Fork Completed. https:\/\/blog.ethereum.org\/2016\/07\/20\/hard-fork-completed"},{"key":"e_1_3_2_1_5_1","volume-title":"Zoomed In: A Look into a Coinminer Bundled with Zoom Installer. https:\/\/www.trendmicro.com\/en_us\/research\/20\/d\/zoomed-in-a-look-into-a-coinminer-bundled-with-zoom-installer.html","author":"Centeno Raphael","year":"2020","unstructured":"Raphael Centeno and Llalum Victoria. 2020. Zoomed In: A Look into a Coinminer Bundled with Zoom Installer. https:\/\/www.trendmicro.com\/en_us\/research\/20\/d\/zoomed-in-a-look-into-a-coinminer-bundled-with-zoom-installer.html"},{"key":"e_1_3_2_1_6_1","unstructured":"NVIDIA Corporation. 2022. NVIDIA Management Library (NVML). https:\/\/developer.nvidia.com\/nvidia-management-library-nvml"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09510--6"},{"key":"e_1_3_2_1_8_1","volume-title":"MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption. arXiv preprint arXiv:2206.00101","author":"Dipta Debopriya Roy","year":"2022","unstructured":"Debopriya Roy Dipta and Berk Gulmezoglu. 2022. MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption. arXiv preprint arXiv:2206.00101 (2022)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2017.8242063"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--65411--5_17"},{"key":"e_1_3_2_1_11_1","unstructured":"Josh Grunzweig. 2018. Large Scale Monero Cryptocurrency Mining Operation using XMRig. https:\/\/unit42.paloaltonetworks.com\/unit42-large-scale-monero-cryptocurrency-mining-operation-using-xmrig\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning. arXiv preprint arXiv:1907.03651","author":"Gulmezoglu Berk","year":"2019","unstructured":"Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth, and Berk Sunar. 2019. Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning. arXiv preprint arXiv:1907.03651 (2019)."},{"key":"e_1_3_2_1_13_1","unstructured":"Advanced Micro Devices Inc. 2022. AMD Radeon GPU Profiler. https:\/\/gpuopen.com\/rgp\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Intel. 2022. Intel\u00ae VTune? Profiler User Guide. https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/documentation\/vtune-help\/top\/reference\/gpu-metrics-reference\/gpu-utilization.html"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2016.115"},{"key":"e_1_3_2_1_16_1","unstructured":"Limor Kessem. 2018. XMRig: Father Zeus of Cryptocurrency Mining Malware? https:\/\/securityintelligence.com\/xmrig-father-zeus-of-cryptocurrency-mining-malware\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2020.3017457"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSOS49614.2020.00032"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339261"},{"key":"e_1_3_2_1_21_1","unstructured":"opcm. 2022. Performance Counter Monitor (PCM). https:\/\/github.com\/opcm"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355576"},{"key":"e_1_3_2_1_23_1","unstructured":"Jordan Pearson. 2017. A 'Fortnite' Cheat Maker Duped Players Into Downloading a Bitcoin Miner. https:\/\/www.vice.com\/en\/article\/8x598p\/a-fortnite-cheat-maker-duped-players-into-downloading-a-bitcoin-miner-epic-games-sued"},{"key":"e_1_3_2_1_24_1","unstructured":"Laura Putnina. 2021. CPU vs GPU Mining at Home: Which is Better? https:\/\/www.cryptimi.com\/guides\/cpu-vs-gpu"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278539"},{"key":"e_1_3_2_1_26_1","unstructured":"SonicWall. 2021. SONICWALL CYBER THREAT REPORT. https:\/\/www.sonicwall.com\/medialibrary\/en\/white-paper\/mid-year-2021-cyber-threat-report.pdf"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_13"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00019"},{"key":"e_1_3_2_1_29_1","unstructured":"Barbara Thompson. 2022. 20 BEST Cryptocurrency to Mine with GPU [Most Profitable Coin] . https:\/\/www.guru99.com\/best-cryptocurrencies-mine-gpu-profitable-easy.html"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488831"},{"key":"e_1_3_2_1_31_1","unstructured":"XMRig. 2022. XMRig. https:\/\/github.com\/xmrig"},{"key":"e_1_3_2_1_32_1","volume-title":"Research Anthology on Artificial Intelligence Applications in Security. IGI Global","author":"Zankl Andreas","year":"2021","unstructured":"Andreas Zankl, Hermann Seuschek, Gorka Irazoqui, and Berk Gulmezoglu. 2021. Side-channel attacks in the Internet of Things: threats and challenges. In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2058--2090. io"}],"event":{"name":"CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy","location":"Charlotte NC USA","acronym":"CODASPY '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577923.3583655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:41Z","timestamp":1750183721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":32,"alternative-id":["10.1145\/3577923.3583655","10.1145\/3577923"],"URL":"https:\/\/doi.org\/10.1145\/3577923.3583655","relation":{},"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"2023-04-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}