• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Tuesday, October 7, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News Science

Protection against digital gold diggers. Software blocks crypto mining

Bioengineer by Bioengineer
March 14, 2019
in Science
Reading Time: 3 mins read
0
IMAGE
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

Software ‘CoinEater’ of St. Pölten UAS blocks crypto mining, the unwanted access to computer performance

IMAGE

Credit: St. Pölten UAS / Sebastian Schrittwieser

Cryptojacking describes the creation of cryptocurrencies by visitors of a website without their approval. Since mining is a very computing-intensive process, this can lead to reduced battery life on mobile devices. Due to this, the St. Pölten UAS has developed the free software “CoinEater” which recognises online crypto mining and blocks its execution.

“Usually high-performance hardware is used to generate cryptocurrencies. Cryptojacking distributes mining between many, less powerful devices and poses a new form of threat on the Internet”, explains Sebastian Schrittwieser, Head of the Institute for IT Security Research at the St. Pölten UAS, who helped develop the software.

This means that the attackers do not generate cryptocurrencies on their own computers and with their own electricity but on somebody else’s. The computer runs at full speed, the battery drains quickly and the profit goes to the attackers.

Ongoing Search for New Threats

A scanner developed at the Institute for IT Security Research automatically searches the Internet for cryptojacking at regular intervals. The results are then integrated into the CoinEater software. To do this, researchers went through over one million of the most popular websites and uncovered that more than 3,000 sites digging for cryptocurrencies without their users’ knowledge. The researchers’ programme also provides a technical analysis of the methods used by these websites.

“The use of such techniques is legitimate if website users agree to them, for instance, in order to hide advertisements”, says Schrittwieser. Cryptojacking, on the other hand, is a misuse of the users’ devices.

“Even though Coinhive, the largest provider of online mining software today, is going to discontinue its services soon, the problem will not be completely eradicated and mining could become more worthwhile once again later on”, explains Schrittwieser. The developed scanner can also detect other providers of crypto mining.

Protection against Pop Ups

The scanner also recognises another new phenomenon on the Internet: the pop-up scam. When visiting websites, users are confronted with pop-up windows containing ads or short messages which link them to fee-based offers or malware and which have to be tediously clicked away.

The software CoinEater was developed by researchers of the St. Pölten UAS in the course of the research project PriSAd (Privacy and Security in Online Advertisement) and funded by the Austrian Research Promotion Agency (FFG). IT security company Nimbusec was a partner of the project.

The software is updated constantly. It scans about 100,000 pages every day and runs a software update for the one million pages once every ten days.

Download of the add-on for protection from crypto mining
https://www.coineater.io

###

Research Project PriSAd

The research project PriSAd (Privacy and Security in Online Advertisement) was funded by the Austrian Research Promotion Agency (FFG). IT security company Nimbusec was a partner of the project.
https://research.fhstp.ac.at/projekte/privacy-and-security-in-online-advertisement

Relevant Scientific Publication:

Rauchberger J., Schrittwieser S., Dam T., Luh R., Buhov D., Po?tzelsberger G., Kim H.

The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns

Proceedings of the 13th International Conference on Availability, Reliability and Security 2018

DOI: 10.1145/3230833.3230869

https://www.researchgate.net/publication/327002749_The_Other_Side_of_the_Coin_A_Framework_for_Detecting_and_Analyzing_Web-based_Cryptocurrency_Mining_Campaigns

PDF: https://dl.acm.org/citation.cfm?id=3230869

About the St. Pölten University of Applied Sciences

https://www.fhstp.ac.at/en

General press photos are available for download at https://www.fhstp.ac.at/de/presse/pressefotos-logos.

Facebook and Twitter: http://www.facebook.com/fhstp, https://twitter.com/FH_StPoelten.

Media Contact
Mark Hammer
[email protected]

Tags: Computer ScienceInternetSoftware EngineeringSystem Security/HackersTechnology/Engineering/Computer Science
Share13Tweet8Share2ShareShareShare2

Related Posts

Five or more hours of smartphone usage per day may increase obesity

July 25, 2019
IMAGE

NASA’s terra satellite finds tropical storm 07W’s strength on the side

July 25, 2019

NASA finds one burst of energy in weakening Depression Dalila

July 25, 2019

Researcher’s innovative flood mapping helps water and emergency management officials

July 25, 2019
Please login to join discussion

POPULAR NEWS

  • New Study Reveals the Science Behind Exercise and Weight Loss

    New Study Reveals the Science Behind Exercise and Weight Loss

    95 shares
    Share 38 Tweet 24
  • New Study Indicates Children’s Risk of Long COVID Could Double Following a Second Infection – The Lancet Infectious Diseases

    93 shares
    Share 37 Tweet 23
  • Ohio State Study Reveals Protein Quality Control Breakdown as Key Factor in Cancer Immunotherapy Failure

    74 shares
    Share 30 Tweet 19
  • New Insights Suggest ALS May Be an Autoimmune Disease

    72 shares
    Share 29 Tweet 18

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Study Reveals Solar Energy as the Most Affordable Power Source Globally

Lobeline Boosts Stress Granules, Cell Death in Glioblastoma

Boosting Methane: Co-Digestion with Activated Carbon Insights

Subscribe to Blog via Email

Success! An email was just sent to confirm your subscription. Please find the email now and click 'Confirm' to start subscribing.

Join 63 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.