|国家预印本平台
首页|Dynamic Graph-based Fingerprinting of In-browser Cryptomining

Dynamic Graph-based Fingerprinting of In-browser Cryptomining

Dynamic Graph-based Fingerprinting of In-browser Cryptomining

来源:Arxiv_logoArxiv
英文摘要

The decentralized and unregulated nature of cryptocurrencies, combined with their monetary value, has made them a vehicle for various illicit activities. One such activity is cryptojacking, an attack that uses stolen computing resources to mine cryptocurrencies without consent for profit. In-browser cryptojacking malware exploits high-performance web technologies like WebAssembly to mine cryptocurrencies directly within the browser without file downloads. Although existing methods for cryptomining detection report high accuracy and low overhead, they are often susceptible to various forms of obfuscation, and due to the limited variety of cryptomining scripts in the wild, standard code obfuscation methods present a natural and appealing solution to avoid detection. To address these limitations, we propose using instruction-level data-flow graphs to detect cryptomining behavior. Data-flow graphs offer detailed structural insights into a program's computations, making them suitable for characterizing proof-of-work algorithms, but they can be difficult to analyze due to their large size and susceptibility to noise and fragmentation under obfuscation. We present two techniques to simplify and compare data-flow graphs: (1) a graph simplification algorithm to reduce the computational burden of processing large and granular data-flow graphs while preserving local substructures; and (2) a subgraph similarity measure, the n-fragment inclusion score, based on fragment inclusion that is robust against noise and obfuscation. Using data-flow graphs as computation fingerprints, our detection framework PoT (Proof-of-Theft) was able to achieve high detection accuracy against standard obfuscations, outperforming existing detection methods. Moreover, PoT uses generic data-flow properties that can be applied to other platforms more susceptible to cryptojacking such as servers and data centers.

Tanapoom Sermchaiwong、Jiasi Shen

计算技术、计算机技术

Tanapoom Sermchaiwong,Jiasi Shen.Dynamic Graph-based Fingerprinting of In-browser Cryptomining[EB/OL].(2025-05-05)[2025-05-23].https://arxiv.org/abs/2505.02493.点此复制

评论