{"id":"https://openalex.org/W4366544872","doi":"https://doi.org/10.1145/3577923.3583655","title":"Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs","display_name":"Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs","publication_year":2023,"publication_date":"2023-04-20","ids":{"openalex":"https://openalex.org/W4366544872","doi":"https://doi.org/10.1145/3577923.3583655"},"language":"en","primary_location":{"id":"doi:10.1145/3577923.3583655","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3577923.3583655","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080443652","display_name":"Claudius Pott","orcid":"https://orcid.org/0000-0002-1266-378X"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Claudius Pott","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060182940","display_name":"Berk G\u00fclmezo\u011flu","orcid":"https://orcid.org/0000-0001-6268-6325"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Berk Gulmezoglu","raw_affiliation_strings":["Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075079896","display_name":"Thomas Eisenbarth","orcid":"https://orcid.org/0000-0003-1116-6973"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Eisenbarth","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080443652"],"corresponding_institution_ids":["https://openalex.org/I9341345"],"apc_list":null,"apc_paid":null,"fwci":1.7829,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.85356479,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"177","last_page":"188"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8345829844474792},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5739048719406128},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5181947350502014},{"id":"https://openalex.org/keywords/central-processing-unit","display_name":"Central processing unit","score":0.4793025553226471},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47803932428359985},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4217539429664612},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3937455713748932},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3129984140396118}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8345829844474792},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5739048719406128},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5181947350502014},{"id":"https://openalex.org/C49154492","wikidata":"https://www.wikidata.org/wiki/Q5300","display_name":"Central processing unit","level":2,"score":0.4793025553226471},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47803932428359985},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4217539429664612},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3937455713748932},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3129984140396118}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3577923.3583655","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3577923.3583655","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[{"id":"https://openalex.org/G1628936678","display_name":null,"funder_award_id":"EMSIK","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G8187591743","display_name":null,"funder_award_id":"PeT-HMR","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"},{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2071289869","https://openalex.org/W2295366739","https://openalex.org/W2315350509","https://openalex.org/W2763172007","https://openalex.org/W2781484049","https://openalex.org/W2783112941","https://openalex.org/W2885525054","https://openalex.org/W2890228473","https://openalex.org/W2955425106","https://openalex.org/W2967058495","https://openalex.org/W2980839873","https://openalex.org/W3066421834","https://openalex.org/W3090850795","https://openalex.org/W3104717442","https://openalex.org/W3213511415"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W2975527072"],"abstract_inverted_index":{"With":[0],"the":[1,8,10,43,52,74,78,96,104,110,113,142,158,164,187,199,205,215,221,233,245,256],"rising":[2],"number":[3,11],"of":[4,12,33,54,77,86,134,166,264],"devices":[5,16],"connected":[6],"to":[7,39,66,81,101,123,151,202,240],"internet,":[9],"cyber-attacks":[13],"on":[14,51,141,209],"these":[15,210],"increases":[17],"in":[18,59,157,229],"parallel.":[19],"There":[20],"are":[21,49],"several":[22],"strategies":[23],"that":[24,63,72,125,171,186],"an":[25,61,88,98,132,194],"attacker":[26,62,99,195],"can":[27,107,128,172],"pursue,":[28],"like":[29],"stealing":[30],"intellectual":[31],"property":[32],"a":[34,67,149,167,181,241,250],"victim":[35,79,111],"or":[36],"encrypting":[37],"data":[38],"demand":[40],"ransom":[41],"for":[42,204,232,261],"decryption.":[44],"In":[45,116,180,238],"this":[46,117],"work,":[47],"we":[48,119,147,184,212],"focusing":[50],"detection":[53,160,190,217,243],"so":[55],"called":[56],"cryptojacking":[57,126,235],"attacks,":[58],"which":[60,153,259],"gained":[64],"access":[65],"system,":[68,258],"then":[69,213],"introduces":[70],"programs":[71],"use":[73],"processing":[75],"power":[76,114],"device":[80],"mine":[82],"cryptocurrencies.":[83],"The":[84],"presence":[85],"such":[87],"attack":[89,236],"is":[90],"not":[91],"obvious":[92],"right":[93],"away":[94],"and":[95],"longer":[97,105],"manages":[100],"remain":[102],"undetected,":[103],"they":[106],"profit":[108],"having":[109],"foot":[112],"bill.":[115],"study,":[118],"combine":[120],"previous":[121,216],"approaches":[122,218],"demonstrate":[124],"attacks":[127],"be":[129,173],"detected":[130],"with":[131,225],"accuracy":[133,231],"96%":[135],"by":[136,176,219],"leveraging":[137],"hardware":[138],"performance":[139,154,169,223,252],"counters":[140,224],"Windows":[143],"operating":[144],"system.":[145],"Further,":[146],"present":[148],"method":[150],"determine":[152],"events":[155,170],"result":[156],"best":[159],"rates,":[161],"thus":[162],"allowing":[163],"selection":[165],"few":[168],"monitored":[174],"simultaneously":[175],"modern":[177],"consumer":[178],"CPUs.":[179],"next":[182],"step,":[183],"show":[185],"CPU":[188,200,222],"counters-based":[189],"mechanism":[191],"fails":[192],"when":[193],"switches":[196],"from":[197],"using":[198],"resources":[201],"GPUs":[203],"mining":[206],"tasks.":[207],"Based":[208],"findings":[211],"improve":[214],"extending":[220],"GPU-specific":[226],"metrics":[227],"resulting":[228],"99.86%":[230],"GPU-based":[234],"class.":[237],"addition":[239],"high":[242],"rate":[244],"presented":[246],"approach":[247],"only":[248],"causes":[249],"negligible":[251],"loss":[253],"while":[254],"monitoring":[255,263],"whole":[257],"allows":[260],"continuous":[262],"live":[265],"systems.":[266]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
