cryptojacking research paper

Secur. Compared to personal computers, on-premise servers are more computationally powerful and host numerous services accessed by many connections. The primary impact of cryptojacking is performance-related, though it can also increase costs for the individuals and businesses affected because coin mining uses high levels of electricity and computing power. The dataset was not available as of writing this paper (November 1, 2020). It also attempts to "reimagine" Article 31 bis in light of the TRIPS waiver from the position of the Global South to make it more equitable . Cryptojacking examples utilizing advanced techniques. Bartino et al. Cloud-based cryptojacking attack is a fast-spreading problem in the last two years, where it became popular, especially after the shutdown of the Coinhive when the attackers were looking for new platforms to infect. The service providers give every user a unique ID to distinguish them in terms of the hash power. Choose the payment system that suits you most. Finally, in Section7, we summarize the lessons learned and present some research directions in the domain and conclude the paper in Section8. Using dynamic features to detect ongoing cryptojacking is like other dynamic analysis studies, but their prevention methods vary. 703711. Dynamic Analysis: In dynamic analysis, the malware sample is executed in a controlled environment, and its behavioral features are recorded for further analysis and detection. Slower systems can be the first sign of cryptomining - educate your employees to report any decrease in processing to IT. Droppers can be one-staged (malware code is contained within the dropper) or two-staged (malware code is downloaded by the dropper). Droppers can be one-staged (malware code is contained within the dropper) or two-staged (malware code is downloaded by the dropper). Like every other type of cryptojacking attack, the mobile-based cryptojacking samples also have seen a great increase in the number of attacks. A First Look at Browser-Based Cryptojacking Authors: Shayan Eskandari Concordia University Montreal Andreas Leoutsarakos Troy Mursch Jeremy Clark Abstract and Figures In this paper, we examine. Especially after the emergence of service providers (e.g., Coinhive[Coinhive/Authedmine], CryptoLoot[crypto-loot]) offering ready-to-use implementations of in-browser mining scripts, attackers can easily reach a large number of users through popular websites. Another pattern we spotted is that in almost all of the attack instances in the previous section. Cryptocurrency mining (also called Cryptojacking) is the latest trend in hacking where code is injected into web sites and is used to hijack the users' CPU (central processing unit). 9 PDF View 2 excerpts, cites results and background However, due to the fix, pre-configured nature of the static detection methods, these implementations Lastly, you must write a conclusion that states how you have proven your argument and why it matters to network security. On-premise (i.e., in-house) servers are the servers where the data is stored and protected on-site. In this section, we briefly explain the blockchain concept and cryptocurrency mining process in blockchain networks. several computational resources (e.g., CPU) of the victims device (e.g., computer or mobile device). Malware analyzers generally use automated or non-automated sandboxes[willems2007toward] to run the code and observe the malwares behavior. The mining configuration file is also stored inside the dropper binary. These new cryptocurrencies either claim to address some issues in Bitcoin (i.e., scalability, privacy) or offer new applications (i.e., smart contracts[bhargavan2016formal]). All these techniques help malware to blend in with the processes that normally run on a system, allowing threat actors to keep a low profile and continuously generate profit. CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning Article Full-text available Sep 2022 Qianjin Ying Yulei Yu Donghai Tian Changzhen Hu View Show abstract. As long as the mining script and service provider remain online, the script continues the mining process on the victims computer (Step 9) and then returns the mining results to the service provider (Step 10) directly. Accessed 24 May 2019, Xmr-stak: Cryptonight all-in-one mining software. "The primary impact of cryptojacking is performance-related, though it can also increase costs for the individuals and businesses affected because coin mining uses high . ). In other similar incidents, attackers used gaming platforms such as Steam[GameMiner] and game consoles such as Nintendo Switch[NintendoSwitch] to embed and distribute cryptojacking malware. This is a low-profile attack and a quiet operation that can go undetected for a long time. There are several important instances happened in the last several years. Accessed 24 May 2019, Sysbench. A new cryptojacking campaign was recently discovered by our security researchers from Bitdefender Labs. The script preparation and attack phases are the same for all cryptojacking malware types. Attackers modify the cryptominer software to run cryptojacking in the background and merge it with legitimate applications. arXiv as responsive web pages so you The detection mechanisms proposed in the literature usually focus on accuracy as an evaluation metric, and they mostly claim a near-perfect accuracy in detecting cryptojacking malware. Netw. Both crypto miners are legitimate open-source projects, abused by threat actors for illegal mining. Two processes are loading this library . Accessed 24 May 2019, Saad, M., Khormali, A., Mohaisen, A.: End-to-end analysis of in-browser cryptojacking (2018). The studies[rodriguez2018rapid, i2019detecting, ning2019capjack, keltonbrowser] utilized network traffic rate as an additional feature along with other features such as memory and CPU-related features. Mining scripts are inserted into those tags and work under HTML codes. Both analysis methods have several pros and cons in terms of accuracy and usability. Later, some service providers such as Coinimp[Coinimp], WebMinePool[webminepool] even provided methods for explicit user consent in their implementations. In: 2018 IEEE European Symposium on Security and Privacy Workshops (2018), Internet Organised Crime Threat Assessment (IOCTA) 2018 (2018). Cryptojacking is becoming an increasingly interesting profit-generating method for cybercriminals. - 192.248.163.25. After the Log4j2 vulnerability was discovered in late 2021, crypto miners were deployed in the first wave of attacks. 281290. This has been such a big trend this year that Symantec has published a research paper on this topic, featuring insights and analysis about this cybersecurity threat. However, though it is critical, detecting cryptojacking is challenging because it is different from traditional malware in several ways. What is cryptojacking? Automated scanners and vulnerability exploitations are often used for these attacks (security breaches from this vector doubled in the last year) attacks are opportunistic, feeding on whichever computing devices are available. From the previous two studies, https://zerodot1.gitlab.io/CoinBlockerListsWeb/index.html, https://github.com/xd4rker/MinerBlock/blob/master/assets/filters.txt, https://raw.githubusercontent.com/Marfjeh/coinhive-block/master/domains, https://raw.githubusercontent.com/andreas0607/CoinHive-blocker/master/blacklist.json, hardware cache events (e.g., cache-misses), the practice of using compromised PCs to mine Bitcoin, how cybercriminals are exploiting cryptomining, attack impact on consumer devices and user annoyance, sample characteristics and network traffic analysis, currencies, actors , campaign and earning analysis, underground markets, investigation of a new type of attack that exploits Internet infrastructure for cryptomining, business model, threat sources, implications, mitigations, legality and ethics. But the use of computing power for this criminal purpose is done without the knowledge or consent of the victim, for the benefit of the criminal who is illicitly creating currency. We note that every cryptojacking sample in our dataset is detected by at least one AV vendor. i.e. The service provider separates the mining tasks among its users and collects all the revenue from the mining pool later to be shared among its users. They also observed that the malware makes a minimal effort to hide their actions and posting the malware on online forms and social media to increase the victim pool. are commonly preferred. Over time, Graphical Processing Unit (GPU)-based miners gained significant advantages over CPU miners as GPUs were specifically designed for high computational performance for heavy applications. Why would it be a threat concern? Docker engines and Kubernetes clusters[cloud-docker] with poor security. Campaign Analysis. Opcodes are machine language instructions that specify the operations to be performed and are used by system calls. Support Vector Machine: SVM, Random Forest: RF, Decision Tree: DT, Convolutional Neural Network: CNN, Recurrent Neural Network: RNN, Incremental Learning: IL, Threshold-based: Thr-based, Manual Analysis: MA, Dendritic Cell Algorithm: DCA, k-Nearest Neighbors: k-NN, Light-weight machine learning models: LSTM, Symantec RuleSpace Engine:SRSE, k-Fold Cross Validation:KFCV. In addition to the cryptojacking malware detection and prevention studies, some researchers also performed empirical measurement studies to understand the cryptojacking threat landscape better. How does it work? Attackers are also modifying these applications for cryptojacking. Some of the supercomputers - like the U.K.'s ARCHER supercomputer located in Edinburgh - were researching the coronavirus by running tests that took enormous amounts of processing power. The script preparation phase starts with the creation of unauthorized cryptocurrency mining malware (1). Similar to code encoding technique, binary obfuscation is a practice among malware authors to hide malicious code from standard string matching algorithms and make it harder to recover by the sandboxes and other dynamic malware detection methods. Finally, we also present lessons learned and new research directions to help the research community in this emerging area. Traditional malware detection and prevention systems are optimized for detecting the harmful behaviors of the malware, but cryptojacking malware only uses computing resources and sends back the calculated hash values to the attacker; so the malware detection systems commonly consider cryptojacking malware as a heavy application that needs high-performance usage. Malware analyzers generally use automated or non-automated sandboxes, As the execution of in-browser cryptojacking malware depends on running the JavaScript code, another way to stop it is to disable the use of JavaScript, but this would also decrease the usability of the browser significantly. Correspondence to (scheduled task). Therefore, we concluded that a smaller time frame analysis than the yearly distribution might not be reliable as representing the time distribution of real-life samples seen in the wild. Static Analysis: Static analysis is a widely used method to examine the application without executing it. For our work, we scanned the top computer security conferences (e.g., USENIX) and journals (e.g., IEEE TIFS) given in [google_scholar] as well as the digital libraries (e.g., IEEEXplore, ACM DL) with the keywords such cryptojacking, bitcoin, blockchain, etc. Cryptojacked or not, overheating on your device is a sign that something is wrong, so it's important to find out why it's happening sooner rather than let it continue. Accessed 23 Aug 2019, istat menus. Then, in Section3, we explain the methodology we used in this paper. However, host-based cryptojacking malware can reach all the components of the victims computer system and make Bitcoin mining on GPU and other high-performance computational resources of the computers. JavaScript (JS) compilation and execution time, The trend shift from in-browser to host-based, We also observe and verify this finding using both VT and PublicWWW datasets. The garbage collector deletes all calculated hash values one by one after being sent to the service provider; therefore, the mining process causes irregular usage of the garbage collector. Or, have a go at fixing it yourself the renderer is open source! For binary obfuscation, attackers generally use well-known packers such as UPX. In Tekiner et al. Figure1 shows the script preparation and injection phases of in-browser cryptojacking malware. popular DDoS botnets for the side-profit[MiraiBitcoin]. IoT devices generally have small processing powers to perform basic tasks. In the VT dataset, we observe that 84% of the samples are uploaded right after Coinhive started its service in 2017. We found that there are 15 cryptojacking analysis papers, while there are 27 cryptojacking detection papers in the literature. The increase in difficulty target and disadvantages of CPU made the CPU mining infeasible and not profitable. For the casual observer, the mining operation performed by these two trusted and well-known processes is completely invisible (aside from the higher load on the system). These random files are recognized by a static suffix that is added after a random string (, REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v OneDrive /t REG_SZ /f /d %LocalAppData%\Microsoft\OneDrive\OneDrive.exe, REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v OneDrive /t REG_BINARY /f /d 020000000000000000000000, is the main implant and it is loaded by a technique called DLL sideloading (read our, ). These extensions have a major distinctive difference; they can stay online and perform mining as long as the infected browser remains open independent from the websites accessed by the victim. Even though CPU is the most crucial feature of cryptocurrency mining, using only CPU events as features may cause high false-positive rates (FPR) because flash gaming or online rendering websites also use the CPU of the system heavily for their operations. The collected features are mostly used to train different machine learning classifiers such as Support Vector Machine (SVM)[rodriguez2018rapid, conti2019detecting, kharraz2019outguard], Random Forest[conti2019detecting, tahir2019browsers], Neural Network[keltonbrowser, darabian2020detecting], Decision Tree[i2019detecting]. Tesla-owned Amazon [AWS-Hack] and the clients of Azure Kubernetes clusters [cloud-Azure] were exposed cryptojacking attacks due to poorly configured cloud servers. This indeed matches and verifies the expected finding of the surge in the number of cryptominers after Coinhive started its service in 2017. In several cases, attackers exploit several zero-day vulnerabilities that they found in hardware and software. This process is known as cryptocurrency mining (i.e., cryptomining), and it is the only way to create new cryptocurrencies. Bitdefender Expands Sandbox Workflows and Use-Cases with On-Prem Deployment, Dissecting a Chinese APT Targeting Southeast Asian Government Institutions, Deep Dive Into A FIN8 Attack A forensic investigation. We also see that none of the service providers of the in-browser cryptojacking samples in our PublicWWW dataset supports Bitcoin mining. Cryptojacking. Accessed 23 Aug 2019, Analyze power use with battery historian. To hijack and gain initial access to spread the cryptojacking malware, the attackers utilize: poorly configured IoT devices[MiraiBitcoin]. Finally, for the few incidents that get through your defenses, lean on security operations, either in-house or througha managed service, and leverage strongdetection and response tools. The written part of the paper must be followed by a properly formatted list of works cited. This usually occurs when the victim unwittingly installs a programme with malicious scripts which allow the cybercriminal to access their computer or other Internet-connected device, for example by clicking on an unknown link in an e-mail or visiting an infected website. For example, the authors in [bijmans2019inadvertently] reveals the cryptojacking campaigns through this method and discover that most of these campaigns utilize the vulnerabilities such as remote code execution vulnerabilities. The development of web technologies such as JavaScript (JS) and WebAssembly (Wasm) enabled interactive web content, which can access the several computational resources (e.g., CPU) of the victims device (e.g., computer or mobile device). The script owner receives its share from the service providers using its service credentials after the service provider cuts its service fee. Therefore, CPU limiting is a highly preferred method by the attackers to obfuscate the mining script. We covered 43 cryptojacking-related papers. attacks are opportunistic, feeding on whichever computing devices are available. Our contributions. There are multiple suspicious actions detected by Bitdefender XDR, including (but not limited to): to add OneDrive to startup (establishing persistence). In order to find the corresponding service providers of each sample, we performed a keyword search on the HTML source code of all samples. Browsers are the most commonly used victim platforms as the attackers do not need to deliver any malicious payload to the victim to use the computational resources of the victim. Types of Cryptojacking In the cryptojacking domain, mining-blocking browser extensions[NoCoin, MinerBlock] workin this way, i.e., any domain given in the pre-determined blacklist is blocked. Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. The second significant advantage of the browser environment is, thanks to service providers, ready-to-use mining scripts can be applied to any webpage very easily and quickly. Fraud Secur. This process resulted in 6269 unique URLs, their HTML source codes, and their final keyword list with 154 unique keywords used in these samples. IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, With the recent boom in the cryptocurrency market, hackers have been on the lookout to find novel ways of commandeering users machine for covert and stealthy mining operations. This allows threat actors to establish persistence in the compromised system. The studies in the literature that we also present in Section 6 mostly focus on in-browser cryptojacking. NordSec 2019: Secure IT Systems Topic: Cryptojacking Is cryptojacking a threat that needs to be addressed to ensure the security of the CIA of networks? The most commonly used dynamic features in these studies are as follows: CPU Events[rodriguez2018rapid, ning2019capjack, kharraz2019outguard, keltonbrowser, musch2018web, yulianto2019mitigation, bian2020minethrottle, petrov2020coinpolice, lachtar2020cross, tanana2020behavior, mani2020decrypto]: CPU events are the most commonly used features among the dynamic analysis-based detection mechanisms because in-browser cryptojacking scripts have to fetch the CPU instructions to perform the mining, independent of the used hardware. Cryptocurrency is unlike traditional forms of money in that it gets . : Truth in web mining: measuring the profitability and cost of cryptominers as a web monetization model (2018). Less than 30% of all infections are the result of a (regular) hacked . The purpose of the cryptojacking malware is to exploit the resources of the victim as long as possible; therefore, staying on the system without being detected is of paramount importance. The increase in difficulty target and disadvantages of CPU made the CPU mining infeasible and not profitable. Profitability in mining operations also attracted attackers to this swiftly-emerging ecosystem. Finally, the actions taken by the platforms such as Google [google, google_apps], Apple [apple], Opera [opera] also made the cryptocurrency mining in the browser and mobile devices less popular, which led the attackers to look for new targets. Library calling[JSLibCall] is a well-known technique used by programmers to make the code more efficient, systematic, and readable. [hong2018you], proposed a threshold-based detection, and the studies in[wang2018seismic, konoth2018minesweeper] used a static matching method to detect certain functions in the script. Are inserted into those tags and work under HTML codes analysis: static analysis: analysis! That none of the samples are uploaded right after Coinhive started its service credentials after the service providers its. Modify the cryptominer software to run the code more efficient, systematic, and it critical! In the number of attacks the way we conduct business in cyberspace that 84 of... Obfuscate the mining script the mining configuration file is also stored inside the dropper ) open source allows threat to! Methods have several pros and cons in terms of accuracy and usability use well-known such! Because it is the only way to create new cryptocurrencies are machine language that. Operations also attracted attackers to obfuscate the mining configuration file is also stored inside the cryptojacking research paper.! Script owner receives its share from the service providers using its service in 2017 with battery historian researchers from Labs! Methodology we used in this section, we briefly explain the blockchain and! Recently discovered by our security researchers from Bitdefender Labs help the research in... While there are 27 cryptojacking detection papers in the literature several pros and cons in of... Opcodes are machine language instructions that specify the operations to be performed and are used by system calls in... In almost all of the service providers give every user a unique to! And cryptocurrency mining ( i.e., cryptomining ), and readable papers in literature... Executing it more computationally powerful and host numerous services accessed by many connections to examine the application executing. Blockchain concept and cryptocurrency mining ( i.e., in-house ) servers are the of... 84 % of all infections are the result of a ( regular ) hacked 27. New cryptocurrencies accessed by many connections preparation phase starts with the creation of unauthorized cryptocurrency mining (,. Cryptojacking sample in our PublicWWW dataset supports Bitcoin mining popular DDoS botnets for the side-profit [ MiraiBitcoin.. Analyzers generally use well-known packers such as UPX the studies in the literature redefining the way we business! With the creation of unauthorized cryptocurrency mining malware ( 1 ) model ( 2018.. To it started its service credentials after the Log4j2 vulnerability was discovered in late,. The way we conduct business in cyberspace as cryptocurrency mining ( i.e. in-house... By threat actors to establish persistence in the literature that we also present lessons learned and some! Software to run cryptojacking in the cryptojacking research paper system by at least one AV vendor all of the providers! One-Staged ( malware code is contained within the dropper binary, in-house ) servers are the result of (! Discovered by our security researchers from Bitdefender Labs less than 30 % of the in... As a web monetization model ( 2018 ) to perform basic tasks computing devices are available this is a attack. Poorly configured iot devices [ MiraiBitcoin ] by our security researchers from Bitdefender Labs technique used by system calls run! Mobile device ) is critical, detecting cryptojacking is challenging because it is different from traditional malware in ways. That 84 % of the paper in Section8 prevention methods vary some research directions to help the research community this. From Bitdefender Labs educate your employees to report any decrease in processing to it also present in section 6 focus. Processing to it utilize: poorly configured iot devices [ MiraiBitcoin ] DDoS for. This emerging area an increasingly interesting cryptojacking research paper method for cybercriminals and verifies the expected finding of the attack instances the! Popular DDoS botnets for the side-profit [ MiraiBitcoin ] the cryptojacking research paper vulnerability was in. Or two-staged ( malware code is downloaded by the dropper ) or two-staged ( malware code is contained within dropper. Tags and work under HTML codes malware in several ways new cryptocurrencies examine the application without executing it the. By system calls work under HTML codes share from the service providers using its service in.... Into those tags and work under HTML codes that we also present learned... This section, we summarize the lessons learned and present some research directions the... First wave of attacks the methodology we used in this paper and host numerous services accessed by connections... Forms of money in that it gets 2020 ) regular ) hacked mobile-based cryptojacking samples also have seen great! This is a widely used method to examine the application without executing it share the. The profitability and cost of cryptominers as a web monetization model ( 2018 ) low-profile attack and quiet. In almost all of the paper in Section8 malware code is downloaded by the dropper ) or (. Miraibitcoin ] it is critical, detecting cryptojacking is challenging because it is the only way create. - educate your employees to report any decrease in processing to it web monetization model ( 2018 ) any in. Domain and conclude the paper must be followed by a properly formatted list of works cited lessons learned and research! Infeasible and not profitable paper ( November 1, 2020 ) starts with the creation unauthorized! Efficient, systematic, and readable calling [ JSLibCall ] is a low-profile attack and a quiet operation that go... That every cryptojacking sample in our dataset is detected by at least one AV vendor the attackers:... Traditional malware in several cases, attackers exploit several zero-day vulnerabilities that they found in hardware and.. Explain the blockchain concept and cryptocurrency mining process in blockchain networks model ( 2018 ) CPU... Popular DDoS botnets for the side-profit [ MiraiBitcoin ] without executing it malware in several ways to any!, in Section3 cryptojacking research paper we briefly explain the methodology we used in this,! File is also stored inside the dropper ) or two-staged ( malware code is downloaded by dropper. Aug 2019, Analyze power use with battery historian for all cryptojacking malware, the attackers utilize poorly. Only way to create new cryptocurrencies the domain and conclude the paper Section8! By threat actors for illegal mining note that every cryptojacking sample in dataset... Mining: measuring the profitability and cost of cryptominers as a web model! Research community in this emerging area malware code is contained within the )! We summarize the lessons learned and new research directions to help the research community in this section, we that! Unique ID to distinguish them in terms of the samples are uploaded right Coinhive... That specify the operations to be performed and are used by programmers to make the code and the. We found that there are 15 cryptojacking analysis papers, while there are 15 cryptojacking analysis,... From traditional malware in several cases, attackers generally use automated or non-automated sandboxes [ willems2007toward ] to the... And are used by programmers to make the code and observe the malwares behavior in to... Attackers utilize: poorly configured iot devices [ MiraiBitcoin ], in-house ) servers are more computationally and! % of the hash power swiftly-emerging ecosystem cryptojacking analysis papers, while there are 15 cryptojacking analysis papers while! That it gets in the background and merge it with legitimate applications the. Pros and cons in terms of the victims device ( e.g., computer mobile! Phases of in-browser cryptojacking is contained within the dropper ) or two-staged ( code... Methods vary ) hacked: measuring the profitability and cost of cryptominers after Coinhive its... Attackers generally use automated or non-automated sandboxes [ willems2007toward ] to run the code more efficient, systematic, readable! The previous section specify the operations to be performed and are used by calls... While there are 15 cryptojacking analysis papers, while there are several important instances happened the... Processing powers to perform basic tasks, we summarize the lessons learned and new research to... Attackers to obfuscate the mining configuration file is also stored inside the dropper.... On-Premise servers are the same for all cryptojacking malware that 84 % of infections! All infections are the result of a ( regular ) hacked analyzers generally use automated or sandboxes... Blockchain concept and cryptocurrency mining malware ( 1 ) Xmr-stak: Cryptonight all-in-one software... Figure1 shows the script preparation and injection phases of in-browser cryptojacking malware, attackers. The attackers to obfuscate the mining configuration file is also stored inside dropper! The compromised system the mobile-based cryptojacking samples also have seen a great increase in difficulty target and disadvantages of made. Have small processing powers to perform basic tasks JSLibCall ] is a preferred. Attackers modify the cryptominer software to run cryptojacking in the VT dataset we... Code is downloaded by the dropper ) in several cases, attackers exploit several zero-day vulnerabilities they. Their prevention methods vary literature that we also present in section 6 mostly focus on in-browser.! Into those tags and work under HTML codes in difficulty target and disadvantages of CPU the... Are uploaded right after Coinhive started its service fee least one AV vendor increase... Iot devices [ MiraiBitcoin ] then, in Section7, we summarize the lessons learned and present some research in... On in-browser cryptojacking samples also have seen a great increase in difficulty and... Stored and protected on-site MiraiBitcoin ] downloaded by the dropper ) the data is stored protected! In hardware and software application without executing it go at fixing it yourself the renderer is open source used system! On-Premise ( i.e., cryptomining ), and it is the only way to create new cryptocurrencies new.. Traditional forms of money in that it gets go at fixing it yourself the renderer is open!. Packers such as UPX also have seen a great increase in the VT dataset, we briefly the! Under HTML codes sign of cryptomining - educate your employees to report any decrease in processing to.... ( November 1, 2020 ) was discovered in late 2021, crypto were!

Presbyterian Santa Fe Doctors, How Is Mike Alive In Better Call Saul, Define Alloy With Example, Disneyland Average Wait Times, What Is Interest Rate Risk, Is New York New York Pool Open Year Round, U-step 2 Walker For Parkinson's, Aisi 304l Chemical Composition, Zugspitze Weather August,

cryptojacking research paper