Cryptic Bytes: WebAssembly Obfuscation for Evading Cryptojacking Detection.
Håkon HarnesDonn MorrisonPublished in: CoRR (2024)
Keyphrases
- false positives
- detection accuracy
- object detection
- detection algorithm
- detection method
- false alarms
- change detection
- malware detection
- data sets
- detection scheme
- automatic detection
- event detection
- information systems
- intrusion detection
- anomaly detection
- reverse engineering
- expert systems
- target detection
- control flow
- artificial intelligence
- vehicle detection
- machine learning