SlideShare a Scribd company logo
1 of 18
Download to read offline
Extension for Chrome for detecting
bitcoin mining on the web-page
Vadim Davydov, Anne-Nicole Muñoz Kasilag and
Byeong Kuk Woo
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
(Slide credits: Vadim Davydov)
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Overview
1. Introduction

2. Inspiration and main goals of the project

3. Algorithm and characteristic features 

4. Demonstration

5. Conclusion

6. References



2
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Overview
1. Introduction

2. Inspiration and main goals of the project

3. Algorithm and characteristic features

4. Demonstration

5. Conclusion

6. References



3
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Introduction
Introduction
4
Bitcoin — cryptocurrency
Cryptocurrency — digital asset that uses strong
cryptography to secure financial transactions
Traditional money is used in banks
Bitcoins are mined by Bitcoin miners
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Overview
1. Introduction

2. Inspiration and main goals of the project

3. Algorithm and characteristic features

4. Demonstration

5. Conclusion

6. References



5
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Inspiration and main goals of the project
Inspiration and main goals of the project (1/3)
6
Problem
Main last-year news:

1) Scripts for mining can work inside Word documents

2) Tesla Cloud services were used for crypto mining

3) The vulnerability in Telegram was used for mining

4) Service, which warned about cookie using, distributed a script for mining

… and much more[1]
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Inspiration and main goals of the project
Inspiration and main goals of the project (2/3)
7
October 2017 — Malwarebytes company
wrote an analytical report[2]

As of October 2017, the company's protective
products blocked more than 248 million
requests to domains where various mining
scripts are located

On average, this is 8 million requests per
day

Willem de Groot published a report[3]
where he claims that he found mining
scripts on 2496 internet shops
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Inspiration and main goals of the project
Inspiration and main goals of the project (3/3)
8
According to the statistics, the most number
of people use Chrome as a main browser for
surfing the net

The main goal of the project: to create a
Chrome Extension which will warn people
about possible mining on the web-site
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Overview
1. Introduction

2. Inspiration and main goals of the project

3. Algorithm and characteristic features

4. Demonstration

5. Conclusion

6. References



9
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Algorithm and characteristic features
Algorithm and characteristic features
10
Characteristic point that your computer is used as a miner: CPU
1) Extension uses CPU as a main feature of defining if on the
website a mining script is used

2) Extension allows the user to check the CPU on the active tabs
and warn him when the CPU is higher than normal

3) Using the extension, user could close suspicious processes
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Overview
1. Introduction

2. Inspiration and main goals of the project

3. Algorithm and characteristic features

4. Demonstration

5. Conclusion

6. References



11
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Demonstration
Demonstration
12
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Overview
1. Introduction

2. Inspiration and main goals of the project

3. Algorithm and characteristic features

4. Demonstration

5. Conclusion

6. References



13
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Conclusion
Conclusion
14
Goals achieved:

— the extension for checking enormous CPU activity in
Google Chrome was created which is intended to detect
mining on the website

— this extension could prevent using user’s CPU for mining
cryptocurrency
Future work:
— to create an algorithm which could “understand” if the
user uses the resources by himself or it is done by mining
script

— it is planned to develop the extension using several other
parameters for detection
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
Overview
1. Introduction

2. Inspiration and main goals of the project

3. Algorithm and characteristic features

4. Demonstration

5. Conclusion

6. References



15
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
References
References
16
[1] Online-journal xakep.ru [Electronic resource], https://xakep.ru/
2018/02/21/word-mininig/

[2] Analytical report by Malwarebytes [Electronic resource], https://
go.malwarebytes.com/rs/805-USG-300/images/Drive-
by_Mining_FINAL.pdf

[3] Gwillem’s Lab [Electronic resource], https://gwillem.gitlab.io/
2017/11/07/cryptojacking-found-on-2496-stores/

[4] Usage of web-browsers [Electronic resource], https://
en.wikipedia.org/wiki/Usage_share_of_web_browsers

All pictures and figures have a license for using and modifying.
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018
People
People
17
Vadim Davydov
ITMO University, St-Petersburg, Russia

Department of cyber-physical systems
Anne-Nicole Muñoz Kasilag
University of Kent, Canterbury, UK

Department of computing
Byeong Kuk Woo
Keimyung University, Daegu, Korea

Department of mobile game programming
EPITECH Summer School
Extension for Chrome for detecting mining on the
web-page July 20, 2018 18
Q&A

More Related Content

Similar to Final presentation for one-week project

DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...DevSecCon
 
Computer Vision, Machine Learning and Mobile Robotics
Computer Vision, Machine Learning and Mobile RoboticsComputer Vision, Machine Learning and Mobile Robotics
Computer Vision, Machine Learning and Mobile RoboticsOWOLABI Yussuf Kehinde
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Capgemini
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Capgemini
 
Automated Testing for Web-based Systems on Embedded Devices
Automated Testing for Web-based Systems on Embedded DevicesAutomated Testing for Web-based Systems on Embedded Devices
Automated Testing for Web-based Systems on Embedded DevicesIgalia
 
ALT-F1.BE : The Accelerator (Google Cloud Platform)
ALT-F1.BE : The Accelerator (Google Cloud Platform)ALT-F1.BE : The Accelerator (Google Cloud Platform)
ALT-F1.BE : The Accelerator (Google Cloud Platform)Abdelkrim Boujraf
 
Deploying A Proof Of Stake App On IBM Cloud Using Tendermint
Deploying A Proof Of Stake App On IBM Cloud Using TendermintDeploying A Proof Of Stake App On IBM Cloud Using Tendermint
Deploying A Proof Of Stake App On IBM Cloud Using TendermintKunal Malhotra
 
Let's Make Pentesting Fun Again! Report writing in 5 minutes.
Let's Make Pentesting Fun Again! Report writing in 5 minutes.Let's Make Pentesting Fun Again! Report writing in 5 minutes.
Let's Make Pentesting Fun Again! Report writing in 5 minutes.DefCamp
 
A real use case of Provenance tracking using Blockchain
A real use case of Provenance tracking using BlockchainA real use case of Provenance tracking using Blockchain
A real use case of Provenance tracking using BlockchainFabio Gatti
 
Open Design: Business + Money @ FabLab Cali
Open Design: Business + Money @ FabLab CaliOpen Design: Business + Money @ FabLab Cali
Open Design: Business + Money @ FabLab CaliMassimo Menichinelli
 
Primers or Reminders? The Effects of Existing Review Comments on Code Review
Primers or Reminders? The Effects of Existing Review Comments on Code ReviewPrimers or Reminders? The Effects of Existing Review Comments on Code Review
Primers or Reminders? The Effects of Existing Review Comments on Code ReviewDelft University of Technology
 
Why the embedded world needs open source communities
Why the embedded world needs open source communitiesWhy the embedded world needs open source communities
Why the embedded world needs open source communitiesPhilippe Krief
 
STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE
STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUESTUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE
STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUEIAEME Publication
 
Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06Paul Calvano
 
Workshop About Software Engineering Skills 2019
Workshop About Software Engineering Skills 2019Workshop About Software Engineering Skills 2019
Workshop About Software Engineering Skills 2019PhuocNT (Fresher.VN)
 
Android Development with Kotlin, Part 3 - Code and App Management
Android Development with Kotlin, Part 3 - Code and App ManagementAndroid Development with Kotlin, Part 3 - Code and App Management
Android Development with Kotlin, Part 3 - Code and App ManagementAndreas Jakl
 
Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Fernando Montenegro
 

Similar to Final presentation for one-week project (20)

DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
DevSecCon London 2018: Enabling shift-left for 12k banking developers from sc...
 
Computer Vision, Machine Learning and Mobile Robotics
Computer Vision, Machine Learning and Mobile RoboticsComputer Vision, Machine Learning and Mobile Robotics
Computer Vision, Machine Learning and Mobile Robotics
 
Introduction to Kubernetes
Introduction to KubernetesIntroduction to Kubernetes
Introduction to Kubernetes
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
 
Automated Testing for Web-based Systems on Embedded Devices
Automated Testing for Web-based Systems on Embedded DevicesAutomated Testing for Web-based Systems on Embedded Devices
Automated Testing for Web-based Systems on Embedded Devices
 
ALT-F1.BE : The Accelerator (Google Cloud Platform)
ALT-F1.BE : The Accelerator (Google Cloud Platform)ALT-F1.BE : The Accelerator (Google Cloud Platform)
ALT-F1.BE : The Accelerator (Google Cloud Platform)
 
Deploying A Proof Of Stake App On IBM Cloud Using Tendermint
Deploying A Proof Of Stake App On IBM Cloud Using TendermintDeploying A Proof Of Stake App On IBM Cloud Using Tendermint
Deploying A Proof Of Stake App On IBM Cloud Using Tendermint
 
Let's Make Pentesting Fun Again! Report writing in 5 minutes.
Let's Make Pentesting Fun Again! Report writing in 5 minutes.Let's Make Pentesting Fun Again! Report writing in 5 minutes.
Let's Make Pentesting Fun Again! Report writing in 5 minutes.
 
A real use case of Provenance tracking using Blockchain
A real use case of Provenance tracking using BlockchainA real use case of Provenance tracking using Blockchain
A real use case of Provenance tracking using Blockchain
 
Open Design: Business + Money @ FabLab Cali
Open Design: Business + Money @ FabLab CaliOpen Design: Business + Money @ FabLab Cali
Open Design: Business + Money @ FabLab Cali
 
1802_Crossminer_OCF2018
1802_Crossminer_OCF20181802_Crossminer_OCF2018
1802_Crossminer_OCF2018
 
Primers or Reminders? The Effects of Existing Review Comments on Code Review
Primers or Reminders? The Effects of Existing Review Comments on Code ReviewPrimers or Reminders? The Effects of Existing Review Comments on Code Review
Primers or Reminders? The Effects of Existing Review Comments on Code Review
 
Why the embedded world needs open source communities
Why the embedded world needs open source communitiesWhy the embedded world needs open source communities
Why the embedded world needs open source communities
 
STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE
STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUESTUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE
STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE
 
Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06
 
Resume
ResumeResume
Resume
 
Workshop About Software Engineering Skills 2019
Workshop About Software Engineering Skills 2019Workshop About Software Engineering Skills 2019
Workshop About Software Engineering Skills 2019
 
Android Development with Kotlin, Part 3 - Code and App Management
Android Development with Kotlin, Part 3 - Code and App ManagementAndroid Development with Kotlin, Part 3 - Code and App Management
Android Development with Kotlin, Part 3 - Code and App Management
 
Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?
 

Recently uploaded

SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxProfASKolap
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样A
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Christo Ananth
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/FootingEr. Suman Jyoti
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 

Recently uploaded (20)

SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 

Final presentation for one-week project

  • 1. Extension for Chrome for detecting bitcoin mining on the web-page Vadim Davydov, Anne-Nicole Muñoz Kasilag and Byeong Kuk Woo EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 (Slide credits: Vadim Davydov)
  • 2. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Overview 1. Introduction
 2. Inspiration and main goals of the project
 3. Algorithm and characteristic features 
 4. Demonstration
 5. Conclusion
 6. References
 
 2
  • 3. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Overview 1. Introduction
 2. Inspiration and main goals of the project
 3. Algorithm and characteristic features
 4. Demonstration
 5. Conclusion
 6. References
 
 3
  • 4. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Introduction Introduction 4 Bitcoin — cryptocurrency Cryptocurrency — digital asset that uses strong cryptography to secure financial transactions Traditional money is used in banks Bitcoins are mined by Bitcoin miners
  • 5. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Overview 1. Introduction
 2. Inspiration and main goals of the project
 3. Algorithm and characteristic features
 4. Demonstration
 5. Conclusion
 6. References
 
 5
  • 6. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Inspiration and main goals of the project Inspiration and main goals of the project (1/3) 6 Problem Main last-year news:
 1) Scripts for mining can work inside Word documents
 2) Tesla Cloud services were used for crypto mining
 3) The vulnerability in Telegram was used for mining
 4) Service, which warned about cookie using, distributed a script for mining … and much more[1]
  • 7. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Inspiration and main goals of the project Inspiration and main goals of the project (2/3) 7 October 2017 — Malwarebytes company wrote an analytical report[2] As of October 2017, the company's protective products blocked more than 248 million requests to domains where various mining scripts are located On average, this is 8 million requests per day Willem de Groot published a report[3] where he claims that he found mining scripts on 2496 internet shops
  • 8. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Inspiration and main goals of the project Inspiration and main goals of the project (3/3) 8 According to the statistics, the most number of people use Chrome as a main browser for surfing the net The main goal of the project: to create a Chrome Extension which will warn people about possible mining on the web-site
  • 9. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Overview 1. Introduction
 2. Inspiration and main goals of the project
 3. Algorithm and characteristic features
 4. Demonstration
 5. Conclusion
 6. References
 
 9
  • 10. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Algorithm and characteristic features Algorithm and characteristic features 10 Characteristic point that your computer is used as a miner: CPU 1) Extension uses CPU as a main feature of defining if on the website a mining script is used
 2) Extension allows the user to check the CPU on the active tabs and warn him when the CPU is higher than normal
 3) Using the extension, user could close suspicious processes
  • 11. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Overview 1. Introduction
 2. Inspiration and main goals of the project
 3. Algorithm and characteristic features
 4. Demonstration
 5. Conclusion
 6. References
 
 11
  • 12. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Demonstration Demonstration 12
  • 13. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Overview 1. Introduction
 2. Inspiration and main goals of the project
 3. Algorithm and characteristic features
 4. Demonstration
 5. Conclusion
 6. References
 
 13
  • 14. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Conclusion Conclusion 14 Goals achieved:
 — the extension for checking enormous CPU activity in Google Chrome was created which is intended to detect mining on the website
 — this extension could prevent using user’s CPU for mining cryptocurrency Future work: — to create an algorithm which could “understand” if the user uses the resources by himself or it is done by mining script — it is planned to develop the extension using several other parameters for detection
  • 15. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 Overview 1. Introduction
 2. Inspiration and main goals of the project
 3. Algorithm and characteristic features
 4. Demonstration
 5. Conclusion
 6. References
 
 15
  • 16. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 References References 16 [1] Online-journal xakep.ru [Electronic resource], https://xakep.ru/ 2018/02/21/word-mininig/
 [2] Analytical report by Malwarebytes [Electronic resource], https:// go.malwarebytes.com/rs/805-USG-300/images/Drive- by_Mining_FINAL.pdf [3] Gwillem’s Lab [Electronic resource], https://gwillem.gitlab.io/ 2017/11/07/cryptojacking-found-on-2496-stores/ [4] Usage of web-browsers [Electronic resource], https:// en.wikipedia.org/wiki/Usage_share_of_web_browsers All pictures and figures have a license for using and modifying.
  • 17. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 People People 17 Vadim Davydov ITMO University, St-Petersburg, Russia Department of cyber-physical systems Anne-Nicole Muñoz Kasilag University of Kent, Canterbury, UK Department of computing Byeong Kuk Woo Keimyung University, Daegu, Korea Department of mobile game programming
  • 18. EPITECH Summer School Extension for Chrome for detecting mining on the web-page July 20, 2018 18 Q&A