Automatic Analysis Architecture of IoT Malware Samples

The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples...

Full description

Bibliographic Details
Main Authors: Javier Carrillo-Mondejar, Juan Manuel Castelo Gomez, Carlos Núñez-Gómez, Jose Roldán Gómez, José Luis Martínez
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/8810708
id doaj-118e9eea9d3742bb923ba911a4890dc9
record_format Article
spelling doaj-118e9eea9d3742bb923ba911a4890dc92020-11-25T04:01:05ZengHindawi-WileySecurity and Communication Networks1939-01222020-01-01202010.1155/2020/88107088810708Automatic Analysis Architecture of IoT Malware SamplesJavier Carrillo-Mondejar0Juan Manuel Castelo Gomez1Carlos Núñez-Gómez2Jose Roldán Gómez3José Luis Martínez4Research Institute of Informatics (I3A)Research Institute of Informatics (I3A)Research Institute of Informatics (I3A)Research Institute of Informatics (I3A)Research Institute of Informatics (I3A)The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples is a crucial task in order to gain information on how to protect these devices, but it is impossible to manually do this due to the immense number of existing samples. Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges even more the quantity of malicious software. In this article, a modular solution to automatically analyze IoT malware samples from these architectures is proposed. In addition, the proposal is subjected to evaluation, analyzing a testbed of 1500 malware samples, proving that it is an effective approach to rapidly examining malicious software compiled for any architecture.http://dx.doi.org/10.1155/2020/8810708
collection DOAJ
language English
format Article
sources DOAJ
author Javier Carrillo-Mondejar
Juan Manuel Castelo Gomez
Carlos Núñez-Gómez
Jose Roldán Gómez
José Luis Martínez
spellingShingle Javier Carrillo-Mondejar
Juan Manuel Castelo Gomez
Carlos Núñez-Gómez
Jose Roldán Gómez
José Luis Martínez
Automatic Analysis Architecture of IoT Malware Samples
Security and Communication Networks
author_facet Javier Carrillo-Mondejar
Juan Manuel Castelo Gomez
Carlos Núñez-Gómez
Jose Roldán Gómez
José Luis Martínez
author_sort Javier Carrillo-Mondejar
title Automatic Analysis Architecture of IoT Malware Samples
title_short Automatic Analysis Architecture of IoT Malware Samples
title_full Automatic Analysis Architecture of IoT Malware Samples
title_fullStr Automatic Analysis Architecture of IoT Malware Samples
title_full_unstemmed Automatic Analysis Architecture of IoT Malware Samples
title_sort automatic analysis architecture of iot malware samples
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0122
publishDate 2020-01-01
description The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples is a crucial task in order to gain information on how to protect these devices, but it is impossible to manually do this due to the immense number of existing samples. Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges even more the quantity of malicious software. In this article, a modular solution to automatically analyze IoT malware samples from these architectures is proposed. In addition, the proposal is subjected to evaluation, analyzing a testbed of 1500 malware samples, proving that it is an effective approach to rapidly examining malicious software compiled for any architecture.
url http://dx.doi.org/10.1155/2020/8810708
work_keys_str_mv AT javiercarrillomondejar automaticanalysisarchitectureofiotmalwaresamples
AT juanmanuelcastelogomez automaticanalysisarchitectureofiotmalwaresamples
AT carlosnunezgomez automaticanalysisarchitectureofiotmalwaresamples
AT joseroldangomez automaticanalysisarchitectureofiotmalwaresamples
AT joseluismartinez automaticanalysisarchitectureofiotmalwaresamples
_version_ 1715066338971484160