2019
DOI: 10.1587/transinf.2018ofl0007
|View full text |Cite
|
Sign up to set email alerts
|

A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices

Abstract: Along with the proliferation of IoT (Internet of Things) devices, cyberattacks towards them are on the rise. In this paper, aiming at efficient precaution and mitigation of emerging IoT cyberthreats, we present a multimodal study on applying machine learning methods to characterize malicious programs which target multiple IoT platforms. Experiments show that opcode sequences obtained from static analysis and API sequences obtained by dynamic analysis provide sufficient discriminant information such that IoT ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Combining the Internet of Things (IoT) concept with industrial process management have reshaped the modern industry with great automation and tremendous revenue creation. Yet, it has become a potential target of varied cyber hackers and attacks due to the prevalent and open Internet of Medical Things (IoMT) [2,3]. Cyber-attacks on modern smart industries are of great concern as the losses caused by sophisticated cyber-attacks are extremely huge.…”
Section: Introductionmentioning
confidence: 99%
“…Combining the Internet of Things (IoT) concept with industrial process management have reshaped the modern industry with great automation and tremendous revenue creation. Yet, it has become a potential target of varied cyber hackers and attacks due to the prevalent and open Internet of Medical Things (IoMT) [2,3]. Cyber-attacks on modern smart industries are of great concern as the losses caused by sophisticated cyber-attacks are extremely huge.…”
Section: Introductionmentioning
confidence: 99%
“…Azmoodeh et al 15 used a machine learning approach to categorize ransomware from nonmalicious applications through the energy consumption patterns of different processes. Ban et al 16 proposed a machine learning method to characterize malware targeting multiple IoT platforms through OpCode sequences and application programming interface (API) sequences. Meidan et al 17 proposed a deep autoencoders algorithm according to the network‐based anomaly detection method.…”
Section: Introductionmentioning
confidence: 99%