|
advertisement |
|
|
|
|
|
|
Industrial Automatic Control Systems and Controllers Annotation << Back
Popular Methods of Mining Cryptocurrencies on the Example of the Tool Сoinhive |
A.N. Vershinin, M.Yu. Titov, E.O. Karamysheva
The article is an overview of real-world methods used to implement and propagate threats associated with specialized software for mining cryptocurrencies. An analysis of statistical data obtained from analysts of leading information security companies demonstrates the relevance of the subject matter discussed in the article, while the attack mechanisms analyzed distinguish these security issues as a separate class of threats. The article provides a comprehensive analysis of the threat posed by stealthy cryptocurrency mining, using the Coinhive web script as an example.
Keywords: cryptocurrency; bitcoin; cryptocurrency mining; miner; countering and blocking threats to information security; software.
DOI: 10.25791/asu.1.2020.1120
Contacts: -
Pp. 43-48. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |