Abstract
Traditional malicious attacks have evolved beyond file-based methods, with malicious files now existing as processes and services in order to evade detection. This article examines the rise of cryptojacking- the use of another's machine for profit through cryptocurrency mining, and how we're all at risk.
Original language | English |
---|---|
Pages (from-to) | 16-22 |
Number of pages | 7 |
Journal | IEEE Security & Privacy Magazine |
Volume | 18 |
Issue number | 2 |
Early online date | 02 Jul 2019 |
DOIs | |
Publication status | Published - Apr 2020 |
Keywords
- Security
- cyber attacks
- Cyber defence
- Malware
ASJC Scopus subject areas
- Computer Science(all)
- Computer Networks and Communications
- Software
Fingerprint
Dive into the research topics of 'You Could Be Mine(d): The Rise of Cryptojacking'. Together they form a unique fingerprint.Student theses
-
Dynamic analyses of malware
Author: Carlin, D., Dec 2018Supervisor: Sezer, S. (Supervisor) & O'Kane, P. (Supervisor)
Student thesis: Doctoral Thesis › Doctor of Philosophy
File -
Investigation of browser and web-based threats
Author: Burgess, J., Jul 2023Supervisor: McLaughlin, K. (Supervisor) & Sezer, S. (Supervisor)
Student thesis: Doctoral Thesis › Doctor of Philosophy
File