Coinhive's monero drive-by crypto-jacking
This paper provides study of behaviour on a drive-by crypto-jacking, specifically Coinhive’s Monero. Crypto-jacking is a form of cyber threat where a host machine’s processing power hijacked thru infected website to solve cryptographic puzzles as an unwitting participant. The sample study share host...
| Main Authors: | Azizah, Abdul Aziz, Syahrulanuar, Ngah, Yau, Ti Dun, Tan, Fui Bee |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IOP Publishing
2020
|
| Subjects: | |
| Online Access: | https://umpir.ump.edu.my/id/eprint/29779/ |
Similar Items
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Centralized crypto exchanges (CEX) website
by: Gan, Hing Long
Published: (2023)
by: Gan, Hing Long
Published: (2023)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
Sigmoid function implementation using the unequal segmentation of differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah, et al.
Published: (2017)
by: Syahrulanuar, Ngah, et al.
Published: (2017)
Review of the Sigmoid Function Implementation into Digital Hardware
by: Syahrulanuar, Ngah, et al.
Published: (2015)
by: Syahrulanuar, Ngah, et al.
Published: (2015)
Local Position Estimation Using an Artificial Neural Network Based Model with a Hardware Implementation
by: Abdullah, Embong, et al.
Published: (2012)
by: Abdullah, Embong, et al.
Published: (2012)
Indoor positioning using artificial neural network with field programmable gate array implementation
by: Syahrulanuar, Ngah, et al.
Published: (2018)
by: Syahrulanuar, Ngah, et al.
Published: (2018)
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007)
by: Lai, Yit Pin
Published: (2007)
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Final Year Project Allocation System Techniques: A Systematic Literature Review
by: Nik Intan Syahiddatul Ilani, Jailani, et al.
Published: (2022)
by: Nik Intan Syahiddatul Ilani, Jailani, et al.
Published: (2022)
What drives Malaysian
m-commerce adoption?
An empirical analysis
by: Wei, Toh Tsu, et al.
Published: (2009)
by: Wei, Toh Tsu, et al.
Published: (2009)
Database System Model of Tender Management System in Kadastra
by: Noraziah, Ahmad, et al.
Published: (2007)
by: Noraziah, Ahmad, et al.
Published: (2007)
Driving school learning (DSL)
by: Muna Shafawati, Yusoff
Published: (2015)
by: Muna Shafawati, Yusoff
Published: (2015)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
Optimized feature construction methods for data summarization methods for data summarization of relational data
by: Florence Sia, Fui Sze
Published: (2014)
by: Florence Sia, Fui Sze
Published: (2014)
Collaborative learning with Web 2.0 tools: analysing Malaysian students’ perceptions and peer interaction
by: Leow, Fui-Theng, et al.
Published: (2015)
by: Leow, Fui-Theng, et al.
Published: (2015)
Sistem Tempahan Makmal Komputer : Pendekatan Secara Workflow
by: Zainun, Ngah
Published: (2001)
by: Zainun, Ngah
Published: (2001)
Crypto-to-Crypto Transactions: A Modern Quandary in Realisation Taxation
by: Allen, Christina, et al.
Published: (2025)
by: Allen, Christina, et al.
Published: (2025)
IoT Light Weight (LWT) crypto functions
by: Jaleel, Nubila, et al.
Published: (2019)
by: Jaleel, Nubila, et al.
Published: (2019)
The design and development of driving game as an evaluation instrument for driving license test
by: Abdul Hadi, Abdul Razak, et al.
Published: (2013)
by: Abdul Hadi, Abdul Razak, et al.
Published: (2013)
Spatial information-based multimodal integration technique
by: Lee, Bee Wah
Published: (2006)
by: Lee, Bee Wah
Published: (2006)
Spatial query retrieval model by single measure similarity (SMSS)
by: Lau, Bee Theng
Published: (2006)
by: Lau, Bee Theng
Published: (2006)
Tool for collaborative temporal-based software
version management
by: Abdul Rahman, Mohd Nordin, et al.
Published: (2004)
by: Abdul Rahman, Mohd Nordin, et al.
Published: (2004)
Analysis of expert’s opinion on requirements patterns for software product families framework using GQM method
by: Imam Ya'U, Badamasi, et al.
Published: (2020)
by: Imam Ya'U, Badamasi, et al.
Published: (2020)
Software requirements patterns and meta model: a strategy for enhancing Requirements Reuse (RR)
by: Imam Yau'u, Badamasi, et al.
Published: (2016)
by: Imam Yau'u, Badamasi, et al.
Published: (2016)
Meta-modeling constructs for requirements reuse (RR): software requirements patterns, variability, and traceability
by: Imam Yau'u, Badamasi, et al.
Published: (2018)
by: Imam Yau'u, Badamasi, et al.
Published: (2018)
Animated 'L' driving guide (panduan memandu beranimasi) / Siti Nur Aslinda Mohamad Ayob
by: Siti Nur Aslinda, Mohamad Ayob
Published: (2006)
by: Siti Nur Aslinda, Mohamad Ayob
Published: (2006)
Interactive 3D Driving Test Simulation (13DDTS) / Syahizad Zuriatie Mohamad Zuki
by: Syahizad Zuriatie , Mohamad Zuki
Published: (2004)
by: Syahizad Zuriatie , Mohamad Zuki
Published: (2004)
Graph-based conflict rectification using stroke gesture approach in timetabling system (CORECTS)
by: Yong, Tien Fui, et al.
Published: (2010)
by: Yong, Tien Fui, et al.
Published: (2010)
Using SAW, WPM, TOPSIS, AHP for selection of academic administrator roles in public university in Malaysia
by: Yau’Mee Hayati, Mohamed Yusof, et al.
Published: (2020)
by: Yau’Mee Hayati, Mohamed Yusof, et al.
Published: (2020)
Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
by: Abu Jafar, Md Muzahid, et al.
Published: (2022)
by: Abu Jafar, Md Muzahid, et al.
Published: (2022)
A Highly Accurate PDF-To-Text Conversion System for Academic Papers Using Natural Language Processing Approach
by: Yong, Tien Fui, et al.
Published: (2018)
by: Yong, Tien Fui, et al.
Published: (2018)
Roles selection: a computational approach using ELECTRE and CFFR based on multi criteria tacit knowledge acquisition
by: Yau’mee Hayati, Hj Mohamed Yusof, et al.
Published: (2021)
by: Yau’mee Hayati, Hj Mohamed Yusof, et al.
Published: (2021)
Performance evaluation of new colour histogram-based interest point detectors
by: Rassem, Taha H., et al.
Published: (2015)
by: Rassem, Taha H., et al.
Published: (2015)
Method for evaluating the effectiveness of a C programming teaching tool
by: Suliman, Azizah, et al.
Published: (2013)
by: Suliman, Azizah, et al.
Published: (2013)
Field programmable gate array based sigmoid function implementation using differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah
Published: (2021)
by: Syahrulanuar, Ngah
Published: (2021)
Penilaian program praktikum terhadap peningkatan kualiti guru pra perkhidmatan: Analisis berdasarkan latent growth curve modelling
by: Sarkowi, Azizah, et al.
Published: (2015)
by: Sarkowi, Azizah, et al.
Published: (2015)
Modeling final driving test system for JPJ using mobile technology
by: Mohd Muhaiyuddin, Nadia Diyana, et al.
Published: (2006)
by: Mohd Muhaiyuddin, Nadia Diyana, et al.
Published: (2006)
Similar Items
-
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018) -
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018) -
Centralized crypto exchanges (CEX) website
by: Gan, Hing Long
Published: (2023) -
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022) -
Sigmoid function implementation using the unequal segmentation of differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah, et al.
Published: (2017)