A system emulation for malware detection in routers

2Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, there are many discussions on the fourth industrial revolution with a combination of real physical and virtual systems (Cyber Physical Systems), Internet of Things (IoT) and Internet of Services (IoS). Along with this revolution is the rapid development of malicious code on IoT devices, leading to not only the risk of personal privacy information leaking but also the risk of network security in general. In this paper, we propose C500-toolkit, a novel tool for malware detection in Commercial-off-the-shelf routers, based on dynamic analysis approach. The main contribution of C500-toolkit is to provide an environment for fully emulating router firmware image including both operating system and web-interface. To show the advantage of C500-toolkit, experiments of this tool with embedded malwares Linux/TheMoon and Linux/Mirai are presented.

Cite

CITATION STYLE

APA

Phu, T. N., Dung, N. Q., Hoang, L. V., Tho, N. D., & Binh, N. N. (2019). A system emulation for malware detection in routers. International Journal of Innovative Technology and Exploring Engineering, 8(11), 32–40. https://doi.org/10.35940/ijitee.J9909.0981119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free