2018 IEEE Symposium on Security and Privacy (SP) 2018
DOI: 10.1109/sp.2018.00054
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Linux Malware

Abstract: For the past two decades, the security community has been fighting malicious programs for Windows-based operating systems. However, the recent surge in adoption of embedded devices and the IoT revolution are rapidly changing the malware landscape. Embedded devices are profoundly different than traditional personal computers. In fact, while personal computers run predominantly on x86-flavored architectures, embedded systems rely on a variety of different architectures. In turn, this aspect causes a large number… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
97
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 141 publications
(101 citation statements)
references
References 12 publications
4
97
0
Order By: Relevance
“…This is consistent with the study of Cozzi et al[11] that showed that in the 10 548 Linux malware they studied, only 0.24 % of them tried to detect if they were in a virtualized environment.…”
supporting
confidence: 91%
“…This is consistent with the study of Cozzi et al[11] that showed that in the 10 548 Linux malware they studied, only 0.24 % of them tried to detect if they were in a virtualized environment.…”
supporting
confidence: 91%
“…In contrast, an analysis that can disclose most true (indirect) call edges and have a low chance of missing some may be more useful in practice. Malware behavior analysis [Cozzi et al 2018] aims to understand hidden payloads of malware samples by reporting the system calls performed by the samples and the corresponding concrete arguments of these system calls (e.g., file delete system call with directory argument ł/homež). Missing a few dependences (by chance) may not critically impact the generated behavior report whereas having a large number of bogus dependences would lead to substantial false positives, significantly enlarging the human inspection efforts.…”
Section: Introductionmentioning
confidence: 99%
“…We have compiled our malware source codes into ARM (Version 5, Little Endian) and MIPS (R3000, Little Endian) binaries and used these binaries in our test suite. Other commonly used architectures for IoT malware include x86-64, PowerPC and Motorola 68000 [9], and we plan to evaluate these platforms in the future.…”
Section: Limitations and Future Workmentioning
confidence: 99%