Abstract
Nowadays, there are many discussions on the fourth industrial revolution with a combination of real physical and virtual systems (Cyber Physical Systems), Internet of Things (IoT) and Internet of Services (IoS). Along with this revolution is the rapid development of malicious code on IoT devices, leading to not only the risk of personal privacy information leaking but also the risk of network security in general. In this paper, we propose C500-toolkit, a novel tool for malware detection in Commercial-off-the-shelf routers, based on dynamic analysis approach. The main contribution of C500-toolkit is to provide an environment for fully emulating router firmware image including both operating system and web-interface. To show the advantage of C500-toolkit, experiments of this tool with embedded malwares Linux/TheMoon and Linux/Mirai are presented.
Author supplied keywords
Cite
CITATION STYLE
Phu, T. N., Dung, N. Q., Hoang, L. V., Tho, N. D., & Binh, N. N. (2019). A system emulation for malware detection in routers. International Journal of Innovative Technology and Exploring Engineering, 8(11), 32–40. https://doi.org/10.35940/ijitee.J9909.0981119
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.