2021
DOI: 10.48084/etasr.4296
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Analysis of IoT Malware Evasion Techniques

Abstract: Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack certain characteristics such as homogeneity and security. Malware is malicious software that affects a system as it can steal sensitive information, slow its speed, cause frequent hangs, and disrupt operations. The most common malware types are adware, computer viruses, spyware, trojans, worms, rootkits, key loggers, botnets, and ransomware. Malware detection is critical for a system's security. Many security rese… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 52 publications
0
14
0
Order By: Relevance
“…1) Malware: Malware encompasses malicious code or malicious software, and it is essentially a program that is covertly implanted inside a system with the purpose of disrupting the data so that the data would lose their integrity, confidentiality, or accessibility [50]. Malware is regarded as a major external threat to systems as it can affect the systems' operation [40,43,50]. Malware can cause widespread damage and disruption, and significant efforts would be required to fix this malware problem.…”
Section: Cyber Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…1) Malware: Malware encompasses malicious code or malicious software, and it is essentially a program that is covertly implanted inside a system with the purpose of disrupting the data so that the data would lose their integrity, confidentiality, or accessibility [50]. Malware is regarded as a major external threat to systems as it can affect the systems' operation [40,43,50]. Malware can cause widespread damage and disruption, and significant efforts would be required to fix this malware problem.…”
Section: Cyber Attacksmentioning
confidence: 99%
“…Malware can cause widespread damage and disruption, and significant efforts would be required to fix this malware problem. Malware comes in various forms including Trojans, virus, worms, spyware and ransomware [40,43,50]. The details are as follows:…”
Section: Cyber Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…However, cybercriminals are innovating new tactics and are refining their attack techniques. As a result, phishing attacks are becoming more sophisticated and evading detection even by advanced technical countermeasures [9][10][11]. The literature discusses several possible ways to identify phishing attempts based on various clues that are visible with the naked eye.…”
Section: Phishing Threat Challengesmentioning
confidence: 99%