2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA) 2020
DOI: 10.1109/icmla51294.2020.00173
|View full text |Cite
|
Sign up to set email alerts
|

Towards Obfuscated Malware Detection for Low Powered IoT Devices

Abstract: With the increased deployment of IoT and edge devices into commercial and user networks, these devices have become a new threat vector for malware authors. It is imperative to protect these devices as they become more prevalent in commercial and personal networks. However, due to their limited computational power and storage space, especially in the case of battery-powered devices, it is infeasible to deploy state-of-the-art malware detectors onto these systems. In this work, we propose using and extracting fe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…It should be noted that since different CPU architectures have different instruction sets, the opcodes are also different. Therefore, detecting malware samples across architectures requires considering the opcodes in each CPU architecture, leading to a computationally intensive process [ 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 ].…”
Section: Related Workmentioning
confidence: 99%
“…It should be noted that since different CPU architectures have different instruction sets, the opcodes are also different. Therefore, detecting malware samples across architectures requires considering the opcodes in each CPU architecture, leading to a computationally intensive process [ 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 ].…”
Section: Related Workmentioning
confidence: 99%
“…Many statistical and machine learning techniques, including clustering, decision trees, and support vector machines, have been used. Despite being efficient at locating unique patterns, they may have large false-positive rates [9].…”
Section: Review Of Literaturementioning
confidence: 99%