{"id":"https://openalex.org/W2947057807","doi":"https://doi.org/10.1109/cybersecpods.2019.8885003","title":"MANiC: Multi-step Assessment for Crypto-miners","display_name":"MANiC: Multi-step Assessment for Crypto-miners","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2947057807","doi":"https://doi.org/10.1109/cybersecpods.2019.8885003","mag":"2947057807"},"language":"en","primary_location":{"id":"doi:10.1109/cybersecpods.2019.8885003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersecpods.2019.8885003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/204385744/MANiC_Multi_step_Assessment_for_Crypto_Miners.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072987802","display_name":"Jonah Burgess","orcid":"https://orcid.org/0000-0003-4378-483X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jonah Burgess","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen's University, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080315320","display_name":"Domhnall Carlin","orcid":"https://orcid.org/0000-0002-8424-2757"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Domhnall Carlin","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen's University, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017537630","display_name":"Philip O\u2019Kane","orcid":"https://orcid.org/0000-0002-7792-336X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Philip O'Kane","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen's University, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen's University, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072987802"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":1.0548,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83012919,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8140718936920166},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.8090676069259644},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.6919543147087097},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5850844979286194},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5214380621910095},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5136439204216003},{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.4611523449420929},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45569485425949097},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.31551826000213623},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.215681791305542},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.21040073037147522},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.11173251271247864}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8140718936920166},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.8090676069259644},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.6919543147087097},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5850844979286194},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5214380621910095},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5136439204216003},{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.4611523449420929},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45569485425949097},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.31551826000213623},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.215681791305542},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.21040073037147522},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.11173251271247864},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cybersecpods.2019.8885003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersecpods.2019.8885003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/595ab4b3-fc5c-491d-ba0b-a9a1820f4eb6","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/595ab4b3-fc5c-491d-ba0b-a9a1820f4eb6","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/204385744/MANiC_Multi_step_Assessment_for_Crypto_Miners.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Burgess, J, O'Kane, P, Carlin, D & Sezer, S 2019, MANiC: Multi-step Assessment for Crypto-miners. in International Conference on Cyber Security and Protection of Digital Services 03/06/2019 \u2192 04/06/2019 Oxford, United Kingdom. Institute of Electrical and Electronics Engineers Inc., International Conference on Cyber Security and Protection of Digital Services, Oxford, United Kingdom, 03/06/2019. https://doi.org/10.1109/CyberSecPODS.2019.8885003","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/595ab4b3-fc5c-491d-ba0b-a9a1820f4eb6","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/595ab4b3-fc5c-491d-ba0b-a9a1820f4eb6","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/204385744/MANiC_Multi_step_Assessment_for_Crypto_Miners.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Burgess, J, O'Kane, P, Carlin, D & Sezer, S 2019, MANiC: Multi-step Assessment for Crypto-miners. in International Conference on Cyber Security and Protection of Digital Services 03/06/2019 \u2192 04/06/2019 Oxford, United Kingdom. Institute of Electrical and Electronics Engineers Inc., International Conference on Cyber Security and Protection of Digital Services, Oxford, United Kingdom, 03/06/2019. https://doi.org/10.1109/CyberSecPODS.2019.8885003","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2947057807.pdf","grobid_xml":"https://content.openalex.org/works/W2947057807.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1985247771","https://openalex.org/W2273223219","https://openalex.org/W2614305404","https://openalex.org/W2743459917","https://openalex.org/W2792345084","https://openalex.org/W2884073331","https://openalex.org/W2885525054","https://openalex.org/W2887682444","https://openalex.org/W2890228473","https://openalex.org/W2897385569","https://openalex.org/W2945978829","https://openalex.org/W2963603877","https://openalex.org/W4248175462","https://openalex.org/W4298070608"],"related_works":["https://openalex.org/W2907490423","https://openalex.org/W2150889667","https://openalex.org/W4247806713","https://openalex.org/W3190536237","https://openalex.org/W4233984944","https://openalex.org/W4378700020","https://openalex.org/W195300121","https://openalex.org/W2208447305","https://openalex.org/W2017602249","https://openalex.org/W2022927028"],"abstract_inverted_index":{"Modern":[0],"Browsers":[1,12],"have":[2],"become":[3],"sophisticated":[4],"applications,":[5],"providing":[6],"a":[7,14,57,65,93,195],"portal":[8],"to":[9,42,95,132,143,167,178,185,193],"the":[10,49,68,76,109,118,124,145],"web.":[11],"host":[13],"complex":[15],"mix":[16],"of":[17,51,59,67,73,78,112,120,126,190],"interpreters":[18],"such":[19],"as":[20,34,44,64],"HTML":[21],"and":[22,71,75,123,161,192],"JavaScript,":[23],"allowing":[24],"not":[25],"only":[26],"useful":[27],"functionality":[28],"but":[29],"also":[30],"malicious":[31,153],"activities,":[32],"known":[33],"browser-hijacking.":[35],"These":[36],"attacks":[37],"can":[38,175],"be":[39,130,176],"particularly":[40],"difficult":[41],"detect,":[43],"they":[45],"usually":[46],"operate":[47],"within":[48],"scope":[50],"normal":[52],"browser":[53],"behaviour.":[54],"CryptoJacking":[55,97,169],"is":[56],"form":[58],"browser-hijacking":[60],"that":[61,81,103,128,173],"has":[62],"emerged":[63],"result":[66],"increased":[69],"popularity":[70],"profitability":[72],"cryptocurrencies,":[74],"introduction":[77],"new":[79,183,187],"cryptocurrencies":[80],"promote":[82],"CPU-based":[83],"mining.":[84],"This":[85,116],"paper":[86],"proposes":[87],"MANiC":[88,140,174],"(Multi-step":[89],"AssessmeNt":[90],"for":[91],"Crypto-miners),":[92],"system":[94],"detect":[96,133],"websites.":[98],"It":[99],"uses":[100],"regular":[101],"expressions":[102],"are":[104],"compiled":[105],"in":[106],"accordance":[107],"with":[108,137],"API":[110],"structure":[111],"different":[113,159],"miner":[114],"families.":[115],"allows":[117],"detection":[119],"crypto-mining":[121],"scripts":[122],"extraction":[125],"parameters":[127],"could":[129],"used":[131,142,177],"suspicious":[134],"behaviour":[135],"associated":[136],"CryptoJacking.":[138],"When":[139],"was":[141],"analyse":[144],"Alexa":[146],"top":[147],"1m":[148],"websites,":[149],"it":[150],"detected":[151],"887":[152],"URLs":[154],"containing":[155],"miners":[156],"from":[157],"11":[158],"families":[160],"demonstrated":[162],"favourable":[163],"results":[164],"when":[165],"compared":[166],"related":[168],"research.":[170,200],"We":[171],"demonstrate":[172],"provide":[179],"insights":[180],"into":[181],"this":[182],"threat,":[184],"identify":[186],"potential":[188],"features":[189],"interest":[191],"establish":[194],"ground-truth":[196],"dataset,":[197],"assisting":[198],"future":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
