2018 10th International Conference on Knowledge and Systems Engineering (KSE) 2018
DOI: 10.1109/kse.2018.8573374
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Three Deep Learning-based Approaches for IoT Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 13 publications
0
16
0
Order By: Relevance
“…Nguyen et al [40] proposed "BE-PUM" -Binary code analyzer based on dynamic symbolic execution on x86that overcomes obfuscation for precise malware disassembly. IoT malwares do not employ obfuscation as frequently as PC malware.…”
Section: Discussion On Surveyed Papersmentioning
confidence: 99%
See 4 more Smart Citations
“…Nguyen et al [40] proposed "BE-PUM" -Binary code analyzer based on dynamic symbolic execution on x86that overcomes obfuscation for precise malware disassembly. IoT malwares do not employ obfuscation as frequently as PC malware.…”
Section: Discussion On Surveyed Papersmentioning
confidence: 99%
“…Allows data recovery and reverse engineering hexedit -Helps to view/edit files in hex or ASCII IDAPro [28], [18], [34], [35], [36], [30] Prominently used interactive disassembler and debugger tool magic -file command's magic pattern file nucleus [28] A structural control flow graph analysis based compiler agnostic function detection tool for binaries proposed by Andriesse et al [37]. obj(ect)dump [38], [39], [40] Information dump about object files including intended target instruction set architecture (ISA) and structural information. Relies on BFD.…”
Section: Elfdump -mentioning
confidence: 99%
See 3 more Smart Citations