{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:18:00Z","timestamp":1730297880050,"version":"3.28.0"},"reference-count":69,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833803","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"2397-2412","source":"Crossref","is-referenced-by-count":11,"title":["Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms"],"prefix":"10.1109","author":[{"given":"Zhi","family":"Li","sequence":"first","affiliation":[{"name":"Huazhong Univ. of Sci. & Tech,School of Cyber Science and Engineering,China"}]},{"given":"Weijie","family":"Liu","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington,USA"}]},{"given":"Hongbo","family":"Chen","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington,USA"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington,USA"}]},{"given":"Xiaojing","family":"Liao","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington,USA"}]},{"given":"Luyi","family":"Xing","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington,USA"}]},{"given":"Mingming","family":"Zha","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington,USA"}]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Huazhong Univ. of Sci. & Tech,School of Computer Science and Technology,China"}]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"Huazhong Univ. of Sci. & Tech,School of Cyber Science and Engineering,China"}]}],"member":"263","reference":[{"journal-title":"Continuous Integration (CI\/CD) - GitLab","year":"0","key":"ref13"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3359981"},{"journal-title":"Coinimp stop monero service in browser","year":"0","key":"ref12"},{"journal-title":"Forking for asic resistance A monero case study","year":"0","author":"kurokawa","key":"ref56"},{"journal-title":"Cryptocurrency market capitalizations","year":"0","key":"ref15"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355576"},{"journal-title":"Cranepay (crp)","year":"0","key":"ref14"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3366626.3368125"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313665"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23044"},{"journal-title":"Cohen’s Kappa","year":"0","key":"ref11"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"journal-title":"CircleCI API","year":"0","key":"ref10"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/math8081343"},{"journal-title":"Email address transactions","year":"0","key":"ref17"},{"journal-title":"Electroneum pool","year":"0","key":"ref16"},{"journal-title":"GitHub API v3 — GitHub Developer Guide","year":"0","key":"ref19"},{"journal-title":"Fantomcoin (fcn)","year":"0","key":"ref18"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243840"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2019.00011"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00044"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2018.8484745"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2879605"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00014"},{"key":"ref42","first-page":"344","article-title":"Detecting covert cryptomining using HPC","author":"conti","year":"2020","journal-title":"In Proceedings of the 2020 International Conference on Cryptology and Network Security"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1995.1021"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09510-6"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"2102","DOI":"10.1007\/s10664-019-09695-9","article-title":"An empirical study of the long duration of continuous integration builds","volume":"24","author":"ghaleb","year":"2019","journal-title":"Empirical Software Engineering"},{"journal-title":"Captcha test services","year":"0","key":"ref8"},{"journal-title":"Buddy The DevOps Automation Platform","year":"0","key":"ref7"},{"journal-title":"Circlecircleintersection","year":"0","key":"ref9"},{"journal-title":"BigQuery Cloud Data Warehouse — Google Cloud","year":"0","key":"ref4"},{"journal-title":"BASH","year":"0","key":"ref3"},{"journal-title":"Bitrise - Mobile Continuous Integration and Delivery","year":"0","key":"ref6"},{"journal-title":"BitInfoCharts","year":"0","key":"ref5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_8"},{"journal-title":"yarn package","year":"0","key":"ref35"},{"journal-title":"Wercker","year":"0","key":"ref34"},{"journal-title":"gVisor","year":"2019","key":"ref37"},{"journal-title":"Python performance benchmark suite","year":"2017","key":"ref36"},{"journal-title":"Threat alert Massive cryptomining campaign abusing github docker hub travis ci & circle ci","year":"0","key":"ref31"},{"journal-title":"SPEC","year":"0","key":"ref30"},{"journal-title":"Us government bans professor for mining bitcoin with a supercomputer","year":"0","key":"ref33"},{"journal-title":"Travis CI","year":"0","key":"ref32"},{"journal-title":"Atlassian thwarts bitcoin mining attack on kubernetes environment","year":"0","key":"ref2"},{"journal-title":"Alexa","year":"0","key":"ref1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.62"},{"journal-title":"gVisor Security Basics","year":"2019","key":"ref38"},{"journal-title":"Mini Guide","year":"0","key":"ref24"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2008.4636099"},{"journal-title":"Locality of reference","year":"0","key":"ref23"},{"key":"ref67","first-page":"122","article-title":"Seismic: Secure in-lined script monitors for interrupting cryptojacks","author":"wang","year":"2018","journal-title":"In Proceedings of the 2018 European Symposium on Research in Computer Security"},{"journal-title":"npm package","year":"0","key":"ref26"},{"journal-title":"Monero Mining Pool","year":"0","key":"ref25"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236033"},{"journal-title":"Github unlimited free private accounts","year":"0","key":"ref20"},{"key":"ref64","first-page":"287","article-title":"Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises","author":"tahir","year":"2017","journal-title":"In Proceedings of the 2017 International Symposium on Research in Attacks Intrusions and Defenses"},{"journal-title":"Cryptonight hash function","year":"0","author":"seigen","key":"ref63"},{"journal-title":"Illicit repositories dataset and cijitter codes","year":"0","key":"ref22"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT50521.2020.00068"},{"journal-title":"How to Get Rich on Bitcoin By a System Administrator Who’s Secretly Growing Them On His School’s Computers","year":"0","key":"ref21"},{"journal-title":"VirusTotal-Free Online Virus Malware and URL Scanner","year":"0","author":"total","key":"ref65"},{"journal-title":"Pearson Correlation Coefficient","year":"0","key":"ref28"},{"journal-title":"PARSEC","year":"0","key":"ref27"},{"journal-title":"RANDOM","year":"0","key":"ref29"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.4337\/9781784717766.00019"},{"journal-title":"Monero (cryptocurrency)","year":"0","author":"saberhagen","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278539"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833803.pdf?arnumber=9833803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:29:56Z","timestamp":1699486196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833803","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}