2020
DOI: 10.1016/j.icte.2020.04.005
|View full text |Cite
|
Sign up to set email alerts
|

A survey of IoT malware and detection methods based on static features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
54
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 162 publications
(55 citation statements)
references
References 11 publications
0
54
0
1
Order By: Relevance
“…Ngo et al [22] claimed that the static analysis method has more ability than dynamic methods in analyzing malware structure without the need to consider processor architecture. Figure 4 provides a sample basic information that can be obtained using Linux 'file' command.…”
Section: E Malware Threat Hunting Approachesmentioning
confidence: 99%
See 3 more Smart Citations
“…Ngo et al [22] claimed that the static analysis method has more ability than dynamic methods in analyzing malware structure without the need to consider processor architecture. Figure 4 provides a sample basic information that can be obtained using Linux 'file' command.…”
Section: E Malware Threat Hunting Approachesmentioning
confidence: 99%
“…Content may change prior to final publication. the dataset they released publicly had been used by various studies such as [18], [22], [40], [36], [30], [78]. Some studies focus on a specific IoT malware family for dissection and analysis [28], such as Antonakakis et al [96], where they performed analysis on the advent of the Mirai botnet over seven months period, the evolution of variants of Mirai, and the DDoS affected victim devices.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…As a result, assorted existing researches put focus on more efficient approaches based on static analysis, e.g., reverse engineering the binary programs of IoT malware [9]. In related work [10,11,12], experiment results with high detection rates are obtained by exploring the operation codes (opcodes) and control flow graphs (CFG) of the IoT malware.…”
Section: Introductionmentioning
confidence: 99%