TY - JOUR
T1 - CJSpector
T2 - A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning
AU - Ying, Qianjin
AU - Yu, Yulei
AU - Tian, Donghai
AU - Jia, Xiaoqi
AU - Ma, Rui
AU - Hu, Changzhen
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive licence to Springer Nature B.V.
PY - 2022/9
Y1 - 2022/9
N2 - With the increasing value of digital cryptocurrency in recent years, the digital cryptocurrency mining industry is becoming prosperous. However, this industry has also gained attention from adversaries who exploit users’ computers to mine cryptocurrency covertly. To detect cryptojacking attacks, many static and dynamic methods are proposed. However, the existing solutions still have some limitations in terms of effectiveness, performance, and transparency. To address these issues, we present CJSpector, a novel hardware-based approach for cryptojacking detection. This method first leverages the Intel Processor Trace mechanism to collect the run-time control flow information of a web browser. Next, CJSpector makes use of two optimization approaches based on the library functionality and information gain to preprocess the control flow information. Finally, it leverages Recurrent Neural Network (RNN) for cryptojacking detection. The evaluation shows that our method can detect in-browser covert cryptocurrency mining effectively and transparently with a small performance cost.
AB - With the increasing value of digital cryptocurrency in recent years, the digital cryptocurrency mining industry is becoming prosperous. However, this industry has also gained attention from adversaries who exploit users’ computers to mine cryptocurrency covertly. To detect cryptojacking attacks, many static and dynamic methods are proposed. However, the existing solutions still have some limitations in terms of effectiveness, performance, and transparency. To address these issues, we present CJSpector, a novel hardware-based approach for cryptojacking detection. This method first leverages the Intel Processor Trace mechanism to collect the run-time control flow information of a web browser. Next, CJSpector makes use of two optimization approaches based on the library functionality and information gain to preprocess the control flow information. Finally, it leverages Recurrent Neural Network (RNN) for cryptojacking detection. The evaluation shows that our method can detect in-browser covert cryptocurrency mining effectively and transparently with a small performance cost.
KW - Control flow
KW - Cryptojacking detection
KW - Intel processor trace
KW - RNN
UR - http://www.scopus.com/inward/record.url?scp=85138699880&partnerID=8YFLogxK
U2 - 10.1007/s10723-022-09621-2
DO - 10.1007/s10723-022-09621-2
M3 - Article
AN - SCOPUS:85138699880
SN - 1570-7873
VL - 20
JO - Journal of Grid Computing
JF - Journal of Grid Computing
IS - 3
M1 - 31
ER -