Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427256
|View full text |Cite
|
Sign up to set email alerts
|

The Tangled Genealogy of IoT Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 57 publications
(35 citation statements)
references
References 23 publications
0
35
0
Order By: Relevance
“…Extensible, supports analysis of very large firmware images, ability to decompile object code back to source code hexdump -Utility for inspecting files via hex, decimal, octal and ASCII views. Allows data recovery and reverse engineering hexedit -Helps to view/edit files in hex or ASCII IDAPro [28], [18], [34], [35], [36], [30] Prominently used interactive disassembler and debugger tool magic -file command's magic pattern file nucleus [28] A structural control flow graph analysis based compiler agnostic function detection tool for binaries proposed by Andriesse et al [37]. obj(ect)dump [38], [39], [40] Information dump about object files including intended target instruction set architecture (ISA) and structural information.…”
Section: Elfdump -mentioning
confidence: 99%
See 4 more Smart Citations
“…Extensible, supports analysis of very large firmware images, ability to decompile object code back to source code hexdump -Utility for inspecting files via hex, decimal, octal and ASCII views. Allows data recovery and reverse engineering hexedit -Helps to view/edit files in hex or ASCII IDAPro [28], [18], [34], [35], [36], [30] Prominently used interactive disassembler and debugger tool magic -file command's magic pattern file nucleus [28] A structural control flow graph analysis based compiler agnostic function detection tool for binaries proposed by Andriesse et al [37]. obj(ect)dump [38], [39], [40] Information dump about object files including intended target instruction set architecture (ISA) and structural information.…”
Section: Elfdump -mentioning
confidence: 99%
“…As shown in Figure 4, symbol, debugging, and relocation information could be stripped from an ELF binary to make them lightweight. However, studies have shown that IoT malwares are mostly statically linked [35] and not stripped to reduce the dependency on the diverse IoT execution environments and avoid runtime failures. It also makes them hard to analyze under static analysis.…”
Section: E Malware Threat Hunting Approachesmentioning
confidence: 99%
See 3 more Smart Citations