Abstract
The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of large-scale IoT botnets has dramatically increased the volume and sophistication of Linux malware observed in the wild. The security community has put a lot of effort to document these threats but analysts mostly rely on manual work, which makes it difficult to scale and hard to regularly maintain. Moreover, the vast amount of code reuse that characterizes IoT malware calls for an automated approach to detect similarities and identify the phylogenetic tree of each family. In this paper we present the largest measurement of IoT malware to date. We systematically reconstruct - through the use of binary code similarity - the lineage of IoT malware families, and track their relationships, evolution, and variants. We apply our technique on a dataset of more than 93k samples submitted to VirusTotal over a period of 3.5 years. We discuss the findings of our analysis and present several case studies to highlight the tangled relationships of IoT malware.
Author supplied keywords
Cite
CITATION STYLE
Cozzi, E., Vervier, P. A., Dell’amico, M., Shen, Y., Bilge, L., & Balzarotti, D. (2020). The Tangled Genealogy of IoT Malware. In ACM International Conference Proceeding Series (pp. 1–16). Association for Computing Machinery. https://doi.org/10.1145/3427228.3427256
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.