2021
DOI: 10.1007/978-3-030-70881-8_4
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of the Use of CVEs by IoT Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…There are several reasons for this. Notably, recent research indicates that vulnerabilities for which an exploit code is difficult to create, or which the impact of the exploitation is limited are less likely to be exploited even after the public divulgation of the vulnerability [14]. The prospect of avoiding blackhat exploitation of the vulnerability even after it is discovered and disclosed mitigates the risks incurred by the creation of the backdoor.…”
Section: Utilitarianismmentioning
confidence: 99%
“…There are several reasons for this. Notably, recent research indicates that vulnerabilities for which an exploit code is difficult to create, or which the impact of the exploitation is limited are less likely to be exploited even after the public divulgation of the vulnerability [14]. The prospect of avoiding blackhat exploitation of the vulnerability even after it is discovered and disclosed mitigates the risks incurred by the creation of the backdoor.…”
Section: Utilitarianismmentioning
confidence: 99%
“…The Bashlite worm abuses the Shell-Shock vulnerability, which is a serious security vulnerability of Unix Bash Shell, to infect over one million Busybox devices [22].The IoT Reaper integrates a series of nine HTTP-based exploits, which all based on previously disclosed IoT vulnerabilities [25]. According to statistics, the number of CVE vulnerabilities involved in Echobot is as high as 73 [23].…”
Section: Related To Target Environmentmentioning
confidence: 99%