Verification of Cryptocurrency Mining Using Ethereum
With advancement in computer technology, financial technology has also evolved. Blockchain technology has evolved over the past decade; however, this has also resulted in some malicious attacks. To earn mining rewards of a blockchain, a new type of attack, called cryptojacking, has emerged in the on...
Main Authors: | Dong-Her Shih, Ting-Wei Wu, Tzu-Hsin Hsu, Po-Yuan Shih, David C. Yen |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9127452/ |
Similar Items
-
Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review
by: Emad Badawi, et al.
Published: (2020-01-01) -
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware
by: Muhammad Haris Khan Abbasi, et al.
Published: (2023-02-01) -
SoK: Analysis Techniques for WebAssembly
by: Håkon Harnes, et al.
Published: (2024-02-01) -
MinerGuard: A Solution to Detect Browser-Based Cryptocurrency Mining through Machine Learning
by: Min-Hao Wu, et al.
Published: (2022-09-01) -
ContractGuard: defend Ethereum smart contract with embedded intrusion detection
by: ZHAO Gansen, XIE Zhijian, HE Jiahao, LIN Chengchuang, et al.
Published: (2020-04-01)