Automatic Analysis Architecture of IoT Malware Samples
The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/8810708 |
id |
doaj-118e9eea9d3742bb923ba911a4890dc9 |
---|---|
record_format |
Article |
spelling |
doaj-118e9eea9d3742bb923ba911a4890dc92020-11-25T04:01:05ZengHindawi-WileySecurity and Communication Networks1939-01222020-01-01202010.1155/2020/88107088810708Automatic Analysis Architecture of IoT Malware SamplesJavier Carrillo-Mondejar0Juan Manuel Castelo Gomez1Carlos Núñez-Gómez2Jose Roldán Gómez3José Luis Martínez4Research Institute of Informatics (I3A)Research Institute of Informatics (I3A)Research Institute of Informatics (I3A)Research Institute of Informatics (I3A)Research Institute of Informatics (I3A)The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples is a crucial task in order to gain information on how to protect these devices, but it is impossible to manually do this due to the immense number of existing samples. Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges even more the quantity of malicious software. In this article, a modular solution to automatically analyze IoT malware samples from these architectures is proposed. In addition, the proposal is subjected to evaluation, analyzing a testbed of 1500 malware samples, proving that it is an effective approach to rapidly examining malicious software compiled for any architecture.http://dx.doi.org/10.1155/2020/8810708 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Javier Carrillo-Mondejar Juan Manuel Castelo Gomez Carlos Núñez-Gómez Jose Roldán Gómez José Luis Martínez |
spellingShingle |
Javier Carrillo-Mondejar Juan Manuel Castelo Gomez Carlos Núñez-Gómez Jose Roldán Gómez José Luis Martínez Automatic Analysis Architecture of IoT Malware Samples Security and Communication Networks |
author_facet |
Javier Carrillo-Mondejar Juan Manuel Castelo Gomez Carlos Núñez-Gómez Jose Roldán Gómez José Luis Martínez |
author_sort |
Javier Carrillo-Mondejar |
title |
Automatic Analysis Architecture of IoT Malware Samples |
title_short |
Automatic Analysis Architecture of IoT Malware Samples |
title_full |
Automatic Analysis Architecture of IoT Malware Samples |
title_fullStr |
Automatic Analysis Architecture of IoT Malware Samples |
title_full_unstemmed |
Automatic Analysis Architecture of IoT Malware Samples |
title_sort |
automatic analysis architecture of iot malware samples |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0122 |
publishDate |
2020-01-01 |
description |
The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples is a crucial task in order to gain information on how to protect these devices, but it is impossible to manually do this due to the immense number of existing samples. Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges even more the quantity of malicious software. In this article, a modular solution to automatically analyze IoT malware samples from these architectures is proposed. In addition, the proposal is subjected to evaluation, analyzing a testbed of 1500 malware samples, proving that it is an effective approach to rapidly examining malicious software compiled for any architecture. |
url |
http://dx.doi.org/10.1155/2020/8810708 |
work_keys_str_mv |
AT javiercarrillomondejar automaticanalysisarchitectureofiotmalwaresamples AT juanmanuelcastelogomez automaticanalysisarchitectureofiotmalwaresamples AT carlosnunezgomez automaticanalysisarchitectureofiotmalwaresamples AT joseroldangomez automaticanalysisarchitectureofiotmalwaresamples AT joseluismartinez automaticanalysisarchitectureofiotmalwaresamples |
_version_ |
1715066338971484160 |