1. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach
2. Efficient Signature Generation for Classifying Cross-Architecture IoT Malware
3. Omar Alrawi, Charles Lever, Kevin Valakuzhy, Kevin Snow, Fabian Monrose, and Manos Antonakakis. 2021. The Circle of life: A $large-scale$ study of the $IoT$ malware lifecycle. In 30th USENIX Security Symposium (USENIX Security 21). 3505–3522.
4. Kishore Angrishi. 2017. Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets. arXiv preprint arXiv:1702.03681.
5. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, and Michalis Kallitsis. 2017. Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17). 1093–1110.