论文标题
对用户接触(非法)加密货币挖掘的回顾性分析
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web
论文作者
论文摘要
2017年底,在网络上报道了恶意JavaScript的突然扩散:基于浏览器的矿业利用了网站访问者的CPU时间来挖掘加密货币Monero。几项研究测量了此类法规的部署和制定的防御措施。但是,以前的工作并未确定有多少用户真正接触到已确定的采矿地点,以及考虑到常见的用户浏览行为,是否存在真正的风险。在本文中,我们提出了一个追溯分析,以缩小这一研究差距。我们从几个有利位置的大规模纵向数据汇总了在非法加密的黄金时段中收集的,以衡量对Web用户的影响。我们利用来自大学网络和大型欧洲ISP的被动交通监控的数据,并在以前的主动扫描中确定了可疑的采矿地点。我们用来自浏览器扩展程序的数据证实了我们的结果,并通过跟踪站点访问的大型用户群来证实结果。我们还监视开放的HTTP代理和TOR网络,以进行恶意注入代码。我们发现,大多数Web用户的风险总是非常低,比部署扫描所建议的要低得多。任何曝光期都非常简短。但是,我们还确定了在移动设备上的先前未知和被剥削的攻击向量。
In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code and developed defenses. However, previous work did not establish how many users were really exposed to the identified mining sites and whether there was a real risk given common user browsing behavior. In this paper, we present a retroactive analysis to close this research gap. We pool large-scale, longitudinal data from several vantage points, gathered during the prime time of illicit cryptomining, to measure the impact on web users. We leverage data from passive traffic monitoring of university networks and a large European ISP, with suspected mining sites identified in previous active scans. We corroborate our results with data from a browser extension with a large user base that tracks site visits. We also monitor open HTTP proxies and the Tor network for malicious injection of code. We find that the risk for most Web users was always very low, much lower than what deployment scans suggested. Any exposure period was also very brief. However, we also identify a previously unknown and exploited attack vector on mobile devices.