The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples is a crucial task in order to gain information on how to protect these devices, but it is impossible to manually do this due to the immense number of existing samples. Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges even more the quantity of malicious software. In this article, a modular solution to automatically analyze IoT malware samples from these architectures is proposed. In addition, the proposal is subjected to evaluation, analyzing a testbed of 1500 malware samples, proving that it is an effective approach to rapidly examining malicious software compiled for any architecture.
CITATION STYLE
Carrillo-Mondejar, J., Castelo Gomez, J. M., Núñez-Gómez, C., Roldán Gómez, J., & Martínez, J. L. (2020). Automatic Analysis Architecture of IoT Malware Samples. Security and Communication Networks, 2020. https://doi.org/10.1155/2020/8810708
Mendeley helps you to discover research relevant for your work.