Affiliation:
1. Research Institute of Informatics (I3A), Universidad de Castilla-La Mancha, Albacete 02071, Spain
Abstract
The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples is a crucial task in order to gain information on how to protect these devices, but it is impossible to manually do this due to the immense number of existing samples. Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges even more the quantity of malicious software. In this article, a modular solution to automatically analyze IoT malware samples from these architectures is proposed. In addition, the proposal is subjected to evaluation, analyzing a testbed of 1500 malware samples, proving that it is an effective approach to rapidly examining malicious software compiled for any architecture.
Funder
Ministerio de Economía y Competitividad
Subject
Computer Networks and Communications,Information Systems
Reference32 articles.
1. IoT: a malware story-securelist;D. Demeter,2019
2. Industry 4.0: state of the art and future trends;E. L Xua;International Journal of Production Research,3 2018
3. A survey based on smart homes system using internet-of-things;P. P. Gaikwad
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Stories from a Customized Honeypot for the IoT;網際網路技術學刊;2024-01
2. IoT malware: An attribute-based taxonomy, detection mechanisms and challenges;Peer-to-Peer Networking and Applications;2023-05
3. Analysis and Categorization of Emotet IoT Botnet Malware;2023 International Conference on Artificial Intelligence and Smart Communication (AISC);2023-01-27
4. Static Analysis of Malware;SpringerBriefs in Computer Science;2022
5. Reverse-Engineering Malware;Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security;2022