2018
DOI: 10.1007/978-3-030-00470-5_26
|View full text |Cite
|
Sign up to set email alerts
|

Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(27 citation statements)
references
References 7 publications
3
22
0
Order By: Relevance
“…In this paper, Vervier and Shen [120] studied the behavior of cybercriminals by operating low-and high-interaction IoT honeypots. They found that both the diversity and complexity of IoT botnets are increasing, while the Mirai malware family is still dominant.…”
Section: Botnetmentioning
confidence: 99%
“…In this paper, Vervier and Shen [120] studied the behavior of cybercriminals by operating low-and high-interaction IoT honeypots. They found that both the diversity and complexity of IoT botnets are increasing, while the Mirai malware family is still dominant.…”
Section: Botnetmentioning
confidence: 99%
“…In this work, we have used the source code of 20 IoT malware programs, which we compiled using various compiler options. We have focused on malware for this project because many recent research efforts [12,21,5,19,10] use binary disassemblers like IDA Pro to analyze IoT malware. We believe that our work will give malware researchers a better idea about the level of accuracy that they can expect from IDA Pro.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…IoT malware analysis. There have been several studies analyzing the behavior of IoT malware [5,19,17,10]. The studies focus mostly on the behavior, and the spread patterns of IoT malware and using static and dynamic analysis.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations