The Tangled Genealogy of IoT Malware

74Citations
Citations of this article
58Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of large-scale IoT botnets has dramatically increased the volume and sophistication of Linux malware observed in the wild. The security community has put a lot of effort to document these threats but analysts mostly rely on manual work, which makes it difficult to scale and hard to regularly maintain. Moreover, the vast amount of code reuse that characterizes IoT malware calls for an automated approach to detect similarities and identify the phylogenetic tree of each family. In this paper we present the largest measurement of IoT malware to date. We systematically reconstruct - through the use of binary code similarity - the lineage of IoT malware families, and track their relationships, evolution, and variants. We apply our technique on a dataset of more than 93k samples submitted to VirusTotal over a period of 3.5 years. We discuss the findings of our analysis and present several case studies to highlight the tangled relationships of IoT malware.

Cite

CITATION STYLE

APA

Cozzi, E., Vervier, P. A., Dell’amico, M., Shen, Y., Bilge, L., & Balzarotti, D. (2020). The Tangled Genealogy of IoT Malware. In ACM International Conference Proceeding Series (pp. 1–16). Association for Computing Machinery. https://doi.org/10.1145/3427228.3427256

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free