{"id":"https://openalex.org/W2890152369","doi":"https://doi.org/10.1109/pst.2018.8514167","title":"Detecting Cryptomining Using Dynamic Analysis","display_name":"Detecting Cryptomining Using Dynamic Analysis","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2890152369","doi":"https://doi.org/10.1109/pst.2018.8514167","mag":"2890152369"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2018.8514167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2018.8514167","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/156819595/cryptomining_experimental_PST_FinalSubmission.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080315320","display_name":"Domhnall Carlin","orcid":"https://orcid.org/0000-0002-8424-2757"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Domhnall Carlin","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen\u2019s University, Belfast, Northern Ireland","Centre for Secure Information Technologies, Queen's University, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen\u2019s University, Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072602023","display_name":"Philip OrKane","orcid":null},"institutions":[{"id":"https://openalex.org/I4210154901","display_name":"Kingston University","ror":"https://ror.org/0517ce304","country_code":"US","type":"education","lineage":["https://openalex.org/I4210154901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Philip OrKane","raw_affiliation_strings":["Queen's University Faculty of Health Sciences, Kingston, ON, CA"],"affiliations":[{"raw_affiliation_string":"Queen's University Faculty of Health Sciences, Kingston, ON, CA","institution_ids":["https://openalex.org/I4210154901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen\u2019s University, Belfast, Northern Ireland","Centre for Secure Information Technologies, Queen's University, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen\u2019s University, Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072987802","display_name":"Jonah Burgess","orcid":"https://orcid.org/0000-0003-4378-483X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jonah Burgess","raw_affiliation_strings":["Centre for Secure Information Technologies, Queen\u2019s University, Belfast, Northern Ireland","Centre for Secure Information Technologies, Queen's University, Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen\u2019s University, Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies, Queen's University, Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080315320"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":4.8081,"has_fulltext":true,"cited_by_count":58,"citation_normalized_percentile":{"value":0.95954735,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.9559656381607056},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.8888938426971436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7887276411056519},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7547877430915833},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7473804950714111},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6024535894393921},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5860012173652649},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.47301724553108215},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24859905242919922}],"concepts":[{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.9559656381607056},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.8888938426971436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7887276411056519},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7547877430915833},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7473804950714111},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6024535894393921},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5860012173652649},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.47301724553108215},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24859905242919922},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst.2018.8514167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2018.8514167","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/5c91afde-0b12-42f1-b0d6-32918f209e13","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/5c91afde-0b12-42f1-b0d6-32918f209e13","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/156819595/cryptomining_experimental_PST_FinalSubmission.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Carlin, D, O'Kane, P, Sezer, S & Burgess, J 2018, Detecting Cryptomining Using Dynamic Analysis. in Proceedings of the 2018 International conference on privacy, security, and trust (PST 2018). Privacy, Security and Trust 2018, Belfast, United Kingdom, 28/08/2018.","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/5c91afde-0b12-42f1-b0d6-32918f209e13","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/5c91afde-0b12-42f1-b0d6-32918f209e13","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/156819595/cryptomining_experimental_PST_FinalSubmission.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Carlin, D, O'Kane, P, Sezer, S & Burgess, J 2018, Detecting Cryptomining Using Dynamic Analysis. in Proceedings of the 2018 International conference on privacy, security, and trust (PST 2018). Privacy, Security and Trust 2018, Belfast, United Kingdom, 28/08/2018.","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2890152369.pdf","grobid_xml":"https://content.openalex.org/works/W2890152369.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W192227941","https://openalex.org/W1973211701","https://openalex.org/W2005662348","https://openalex.org/W2027721581","https://openalex.org/W2104471998","https://openalex.org/W2153393809","https://openalex.org/W2165669526","https://openalex.org/W2171035369","https://openalex.org/W2317869823","https://openalex.org/W2600055486","https://openalex.org/W2911964244"],"related_works":["https://openalex.org/W36091977","https://openalex.org/W4382794599","https://openalex.org/W2800331776","https://openalex.org/W2903602818","https://openalex.org/W2034129977","https://openalex.org/W2003791967","https://openalex.org/W3099773647","https://openalex.org/W1745773915","https://openalex.org/W2765820957","https://openalex.org/W4387382577"],"abstract_inverted_index":{"With":[0,116],"the":[1,24,40,59,96,109,122,129,136,144],"rise":[2],"in":[3,23,112],"worth":[4],"and":[5,18,50,106,192,210],"popularity":[6],"of":[7,26,30,69,126,131,172],"cryptocurrencies,":[8],"a":[9,55,66,214],"new":[10],"opportunity":[11,205],"for":[12],"criminal":[13],"gain":[14],"is":[15,143,199],"being":[16],"exploited":[17],"with":[19,47,170],"little":[20],"currently":[21],"offered":[22],"way":[25],"defence.":[27],"The":[28],"cost":[29],"mining":[31],"(i.e.,":[32],"earning":[33],"cryptocurrency":[34,60],"through":[35,95],"CPU-intensive":[36],"calculations":[37],"that":[38,157],"underpin":[39],"blockchain":[41],"technology)":[42],"can":[43,102,163,181],"be":[44,164],"prohibitively":[45],"expensive,":[46],"hardware":[48],"costs":[49,64],"electrical":[51],"overheads":[52],"previously":[53],"offering":[54],"loss":[56],"compared":[57],"to":[58,128,174,177,206],"gained.":[61],"Off-loading":[62],"these":[63],"along":[65],"distributed":[67],"network":[68],"machines":[70],"via":[71],"malware":[72],"offers":[73,203],"an":[74,204],"instantly":[75],"profitable":[76],"scenario,":[77],"though":[78],"standard":[79],"Anti-virus":[80],"(AV)":[81],"products":[82],"offer":[83],"some":[84],"defences":[85],"against":[86],"file-based":[87],"threats.":[88],"However,":[89],"newer":[90],"fileless":[91],"malicious":[92],"attacks,":[93,213],"occurring":[94],"browser":[97],"on":[98,121,151],"seemingly":[99],"legitimate":[100],"websites,":[101],"easily":[103],"evade":[104],"detection":[105],"surreptitiously":[107],"engage":[108],"victim":[110],"machine":[111],"computationally-expensive":[113],"cryptomining":[114,159,184,190],"(cryptojacking).":[115],"no":[117],"current":[118],"academic":[119],"literature":[120],"dynamic":[123,167],"opcode":[124,149,168],"analysis":[125,150],"cryptomining,":[127],"best":[130],"our":[132,161,179,201],"knowledge,":[133],"we":[134],"present":[135],"first":[137,145],"such":[138,146,212],"experimental":[139],"study.":[140],"Indeed,":[141],"this":[142],"work":[147],"presenting":[148],"non-executable":[152],"files.":[153],"Our":[154],"results":[155],"show":[156],"browser-based":[158],"within":[160],"dataset":[162],"detected":[165],"by":[166],"analysis,":[169],"accuracies":[171],"up":[173],"100%.":[175],"Further":[176],"this,":[178],"model":[180],"distinguish":[182],"between":[183],"sites,":[185,188],"weaponized":[186],"benign":[187,195],"de-weaponized":[189],"sites":[191],"real":[193],"world":[194],"sites.":[196],"As":[197],"it":[198],"process-based,":[200],"technique":[202],"rapidly":[207],"detect,":[208],"prevent":[209],"mitigate":[211],"novel":[215],"contribution":[216],"which":[217],"should":[218],"encourage":[219],"further":[220],"future":[221],"work.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":8}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
