Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications
- URL: http://arxiv.org/abs/2311.15360v1
- Date: Sun, 26 Nov 2023 17:23:35 GMT
- Title: Understanding the Utilization of Cryptocurrency in the Metaverse and Security Implications
- Authors: Ayodeji Adeniran, Mohammed Alkinoon, David Mohaisen,
- Abstract summary: We present our results on analyzing and understanding the behavior and security of various metaverse platforms incorporating cryptocurrencies.
We obtained the top metaverse coins with a capitalization of at least 25 million US dollars and the top metaverse domains for the coins.
Our analysis highlights indicators of (in)security, in the correlation sense, with the files and other attributes that are potentially responsible for the malicious activities.
- Score: 11.217261201018815
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: We present our results on analyzing and understanding the behavior and security of various metaverse platforms incorporating cryptocurrencies. We obtained the top metaverse coins with a capitalization of at least 25 million US dollars and the top metaverse domains for the coins, and augmented our data with name registration information (via whois), including the hosting DNS IP addresses, registrant location, registrar URL, DNS service provider, expiry date and check each metaverse website for information on fiat currency for cryptocurrency. The result from virustotal.com includes the communication files, passive DNS, referrer files, and malicious detections for each metaverse domain. Among other insights, we discovered various incidents of malicious detection associated with metaverse websites. Our analysis highlights indicators of (in)security, in the correlation sense, with the files and other attributes that are potentially responsible for the malicious activities.
Related papers
- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective [11.217261201018815]
This paper conducts a comprehensive examination of the infrastructure supporting cryptojacking operations.
A dataset of 887 websites, previously identified as cryptojacking sites, was compiled and analyzed to categorize the attacks and malicious activities observed.
Various malware and illicit activities linked to these sites were identified, indicating the presence of unauthorized cryptocurrency mining via compromised sites.
arXiv Detail & Related papers (2024-08-06T20:04:47Z) - Understanding crypter-as-a-service in a popular underground marketplace [51.328567400947435]
Crypters are pieces of software whose main goal is to transform a target binary so it can avoid detection from Anti Viruses (AVs) applications.
The crypter-as-a-service model has gained popularity, in response to the increased sophistication of detection mechanisms.
This paper provides the first study on an online underground market dedicated to crypter-as-a-service.
arXiv Detail & Related papers (2024-05-20T08:35:39Z) - Utilizing deep learning models for the identification of enhancers and
super-enhancers based on genomic and epigenomic features [0.0]
This paper provides an extensive examination of a sizable dataset of English tweets focusing on nine widely recognized cryptocurrencies.
Our primary objective was to conduct a psycholinguistic and emotion analysis of social media content associated with these cryptocurrencies.
The study involved comparing linguistic characteristics across the diverse digital coins, shedding light on the distinctive linguistic patterns that emerge within each coin's community.
arXiv Detail & Related papers (2024-01-15T04:58:50Z) - The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web [39.96427593096699]
We identify 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue.
Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions.
arXiv Detail & Related papers (2024-01-09T16:35:25Z) - Analyzing In-browser Cryptojacking [16.599890339599586]
We analyze the static, dynamic, and economic aspects of in-browser cryptojacking.
We apply machine learning techniques to distinguish cryptojacking scripts from benign and malicious JavaScript samples.
We also build an analytical model to empirically evaluate the feasibility of cryptojacking as an alternative to online advertisement.
arXiv Detail & Related papers (2023-04-26T02:46:42Z) - Who is Gambling? Finding Cryptocurrency Gamblers Using Multi-modal
Retrieval Methods [46.17004007514548]
We propose a tool termed ETHGamDet to discover gambling behaviors and identify the contracts and addresses involved in gambling.
The tool is able to automatically detect the smart contracts and addresses involved in gambling by scrutinizing the smart contract code and address transaction records.
We present a novel LightGBM model with memory components, which possesses the ability to learn from its own misclassifications.
arXiv Detail & Related papers (2022-11-27T10:07:13Z) - Big Data Meets Metaverse: A Survey [58.83882109159864]
The Metaverse is an emerging technology in the future.
It has a combination of big data, AI (artificial intelligence), VR (Virtual Reality), AR (Augmented Reality), MR (mixed reality)
arXiv Detail & Related papers (2022-10-28T17:22:20Z) - Metaverse Native Communication: A Blockchain and Spectrum Prospective [17.468536739441507]
This paper proposes a vision of blockchain, encrypted address and address-based access model for all users, devices, services, etc.
The allocation architecture of a designated spectrum for the metaverse is proposed to remove the barrier to access to the metaverse/blockchain.
arXiv Detail & Related papers (2022-03-16T02:25:39Z) - A Full Dive into Realizing the Edge-enabled Metaverse: Visions, Enabling
Technologies,and Challenges [93.06849621984684]
"The successor to the mobile Internet", the Metaverse has grown in popularity.
lite versions of the Metaverse exist today, but they are far from realizing the full vision of an immersive, embodied, and interoperable Metaverse.
Without addressing the issues of implementation from the communication and networking, the Metaverse is difficult to succeed the Internet.
We discuss the computation challenges and cloud-edge-end computation framework-driven solutions to realize the Metaverse on resource-constrained edge devices.
arXiv Detail & Related papers (2022-03-10T16:48:51Z) - Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations [50.521292491613224]
We perform an in-depth analysis of pump and dump schemes organized by communities over the Internet.
We observe how these communities are organized and how they carry out the fraud.
We introduce an approach to detect the fraud in real time that outperforms the current state of the art.
arXiv Detail & Related papers (2020-05-04T21:36:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.