当前位置: X-MOL 学术IEEE Comput. Archit. Lett. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Cross-stack Approach Towards Defending Against Cryptojacking
IEEE Computer Architecture Letters ( IF 2.3 ) Pub Date : 2020-07-01 , DOI: 10.1109/lca.2020.3017457
Nada Lachtar , Abdulrahman Abu Elkhail , Anys Bacha , Hafiz Malik

Cryptocurrenices are revolutionizing the way we conduct every day business. Unfortunately, cybercriminals have harnessed this technology for making profit through cryptojacking, the act of maliciously appropriating computational resources for mining cryptocurrencies. In this letter, we explore a general solution for detecting cryptojacking attacks irrespective of the application type. We propose an end-to-end detection solution that leverages lightweight microarchitectural changes designed to track instructions that are commonly used in hash algorithms. An evaluation of our implementation shows negligible performance overhead while testing across a mix of workloads from the SPEC 2006 benchmarks.

中文翻译:

防御加密劫持的跨堆栈方法

加密货币正在彻底改变我们开展日常业务的方式。不幸的是,网络犯罪分子利用这项技术通过加密劫持获利,这是一种恶意占用计算资源来挖掘加密货币的行为。在这封信中,我们探索了一种检测加密劫持攻击的通用解决方案,而不管应用程序类型如何。我们提出了一种端到端检测解决方案,该解决方案利用旨在跟踪哈希算法中常用的指令的轻量级微架构更改。我们的实施评估显示,在对来自 SPEC 2006 基准测试的混合工作负载进行测试时,性能开销可以忽略不计。
更新日期:2020-07-01
down
wechat
bug