首页> 外文会议>International Conference on Information and Communications Security >Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection
【24h】

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection

机译:静态剖析物联网恶意软件:分析、表征和检测

获取原文

摘要

Software vulnerabilities in emerging systems, such as the Internet of Things (IoT), allow for multiple attack vectors that are exploited by adversaries for malicious intents. One of such vectors is malware, where limited efforts have been dedicated to IoT malware analysis, characterization, and understanding. In this paper, we analyze recent IoT malware through the lenses of static analysis. Towards this, we reverse-engineer and perform a detailed analysis of almost 2,900 IoT malware samples of eight different architectures across multiple analysis directions. We conduct string analysis, unveiling operation, unique textual characteristics, and network dependencies. Through the control flow graph analysis, we unveil unique graph-theoretic features. Through the function analysis, we address obfuscation by function approximation. We then pursue two applications based on our analysis: 1) Combining various analysis aspects, we reconstruct the infection lifecycle of various prominent malware families, and 2) using multiple classes of features obtained from our static analysis, we design a machine learning-based detection model with features that are robust and an average detection rate of 99.8%.
机译:物联网(IoT)等新兴系统中的软件漏洞允许对手利用多个攻击向量进行恶意攻击。其中一个载体是恶意软件,在这些载体中,物联网恶意软件分析、特征描述和理解的努力有限。在本文中,我们通过静态分析的视角来分析最近的物联网恶意软件。为此,我们对八种不同体系结构的近2900个物联网恶意软件样本进行了逆向工程和详细分析,这些样本跨越多个分析方向。我们进行字符串分析、揭幕操作、独特的文本特征和网络依赖性。通过控制流图分析,我们揭示了独特的图论特征。通过函数分析,我们通过函数近似来解决模糊问题。然后,我们在分析的基础上开发了两个应用程序:1)结合各种分析方面,我们重建了各种著名恶意软件家族的感染生命周期;2)使用从静态分析中获得的多类特征,我们设计了一个基于机器学习的检测模型,具有鲁棒性强的特征,平均检测率为99.8%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号