all InfoSec news
Cryptic Bytes: WebAssembly Obfuscation for Evading Cryptojacking Detection
March 25, 2024, 4:11 a.m. | H{\aa}kon Harnes, Donn Morrison
cs.CR updates on arXiv.org arxiv.org
Abstract: WebAssembly has gained significant traction as a high-performance, secure, and portable compilation target for the Web and beyond. However, its growing adoption has also introduced new security challenges. One such threat is cryptojacking, where websites mine cryptocurrencies on visitors' devices without their knowledge or consent, often through the use of WebAssembly. While detection methods have been proposed, research on circumventing them remains limited. In this paper, we present the most comprehensive evaluation of code obfuscation …
adoption arxiv beyond challenges consent cryptocurrencies cryptojacking cs.cr detection devices high knowledge mine obfuscation performance portable security security challenges target the web threat web webassembly websites
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC