论文标题

COINPOLICE:通过神经网络检测隐藏的加密助理攻击

CoinPolice:Detecting Hidden Cryptojacking Attacks with Neural Networks

论文作者

Petrov, Ivan, Invernizzi, Luca, Bursztein, Elie

论文摘要

交通货币化是经营大多数营利性在线业务的关键组成部分。它的最新化身之一是加密货币挖掘,网站指示访客的浏览器参与建造加密货币分类帐(例如比特币,Monero),以换取以相同货币的较小奖励。本质上,该实践将用户的电费(或电池电量)换成加密货币。在用户同意下,此交换可以是合法的资金来源 - 例如,联合国儿童基金会在专门针对此目的的网站上收集了超过27K慈善捐赠,thehopepage.org。遗憾的是,这种做法也很容易借给滥用:以这种形式,称为加密劫持,在用户浏览器中秘密攻击我的攻击,并由网站所有者或将采矿脚本种植在易受伤害页面中的网站所有者或黑客收集。加密劫持者一直在改善其逃避技术,并将其纳入其工具包域中,内容混淆,Websemembly的使用和节流。尽管大多数最先进的防御能力涉及这些逃避技术的多个,但没有一个抗所有人。在本文中,我们提供了一种新颖的检测方法,即共同辅助方法,该方法与上述所有逃避技术都有坚固耐用。 Coinpolice翻转限制了加密劫机者,人为地改变了浏览器的CPU力量,以观察限制的存在。基于深度神经网络分类器,CoinPolice可以检测97.87%的假阳性率(0.74%)的隐藏矿工。我们将Coinpolice的性能与当前的最新状态进行了比较,并在检测出积极的矿工时表明我们的方法优于它。最后,我们部署了Coinpolice来进行迄今为止最大的加密调查,以确定6700个以这种方式货币化的网站。

Traffic monetization is a crucial component of running most for-profit online businesses. One of its latest incarnations is cryptocurrency mining, where a website instructs the visitor's browser to participate in building a cryptocurrency ledger (e.g., Bitcoin, Monero) in exchange for a small reward in the same currency. In its essence, this practice trades the user's electric bill (or battery level) for cryptocurrency. With user consent, this exchange can be a legitimate funding source - for example, UNICEF has collected over 27k charity donations on a website dedicated to this purpose, thehopepage.org. Regrettably, this practice also easily lends itself to abuse: in this form, called cryptojacking, attacks surreptitiously mine in the users browser, and profits are collected either by website owners or by hackers that planted the mining script into a vulnerable page. Cryptojackers have been bettering their evasion techniques, incorporating in their toolkits domain fluxing, content obfuscation, the use of WebAssembly, and throttling. Whereas most state-of-the-art defenses address multiple of these evasion techniques, none is resistant against all. In this paper, we offer a novel detection method, CoinPolice, that is robust against all of the aforementioned evasion techniques. CoinPolice flips throttling against cryptojackers, artificially varying the browser's CPU power to observe the presence of throttling. Based on a deep neural network classifier, CoinPolice can detect 97.87% of hidden miners with a low false positive rate (0.74%). We compare CoinPolice performance with the current state of the art and show our approach outperforms it when detecting aggressively throttled miners. Finally, we deploy Coinpolice to perform the largest-scale cryptoming investigation to date, identifying 6700 sites that monetize traffic in this fashion.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源