Dragos Draghicescu, Alexandru Caranica, Alexandru Vulpe, O. Fratu
{"title":"密码挖掘应用指纹识别方法","authors":"Dragos Draghicescu, Alexandru Caranica, Alexandru Vulpe, O. Fratu","doi":"10.1109/iccomm.2018.8484745","DOIUrl":null,"url":null,"abstract":"Computing power has increased exponentially in the last decades, and more and more consumer devices are now permanently connected to the internet, to form the so called “Internet of Things” (IoT), Following this trend, security threats and vulnerabilities have increased drastically over a short period of time, as more and more devices are inter-connected and not properly secured. Lately, the growing popularity of Bitcoin and other cryptocurrencies are generating a lot of hype and concern, among security specialists, as unwanted mining applications on an end-user device can potentially pose both security risks and increased operating costs. There are multiple ways of detecting unwanted applications at the user-level, by means of URL blocking and application fingerprinting, and this paper will cover a detection method proposed by our group.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Crypto-Mining Application Fingerprinting Method\",\"authors\":\"Dragos Draghicescu, Alexandru Caranica, Alexandru Vulpe, O. Fratu\",\"doi\":\"10.1109/iccomm.2018.8484745\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computing power has increased exponentially in the last decades, and more and more consumer devices are now permanently connected to the internet, to form the so called “Internet of Things” (IoT), Following this trend, security threats and vulnerabilities have increased drastically over a short period of time, as more and more devices are inter-connected and not properly secured. Lately, the growing popularity of Bitcoin and other cryptocurrencies are generating a lot of hype and concern, among security specialists, as unwanted mining applications on an end-user device can potentially pose both security risks and increased operating costs. There are multiple ways of detecting unwanted applications at the user-level, by means of URL blocking and application fingerprinting, and this paper will cover a detection method proposed by our group.\",\"PeriodicalId\":158890,\"journal\":{\"name\":\"2018 International Conference on Communications (COMM)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Communications (COMM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iccomm.2018.8484745\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Communications (COMM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccomm.2018.8484745","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Computing power has increased exponentially in the last decades, and more and more consumer devices are now permanently connected to the internet, to form the so called “Internet of Things” (IoT), Following this trend, security threats and vulnerabilities have increased drastically over a short period of time, as more and more devices are inter-connected and not properly secured. Lately, the growing popularity of Bitcoin and other cryptocurrencies are generating a lot of hype and concern, among security specialists, as unwanted mining applications on an end-user device can potentially pose both security risks and increased operating costs. There are multiple ways of detecting unwanted applications at the user-level, by means of URL blocking and application fingerprinting, and this paper will cover a detection method proposed by our group.