I. Introduction
Malware comes in many forms, including Trojans, viruses, ransomware, cryptojacking, cryptocurrency miners, adware, botnets, and rootkits [1]. Cryptojacking is different in nature than other malware. Their main purpose is not to harm the attacked machine but rather to use the machine's resources to complete designated tasks to earn cryptocurrency. Browser-based cryptomining was first introduced in 2013. It was an alternative revenue scheme instead of ads. Website operators agree to share their CPU for mining cryptocurrencies instead of advertisements. Cybercriminals heavily used this technique for their own goals during the cryptocurrency boom in 2017 [2].