Annual Computer Security Applications Conference 2021
DOI: 10.1145/3485832.3485894
|View full text |Cite
|
Sign up to set email alerts
|

Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification

Abstract: The Internet of Things (IoT) is constituted of devices that are exponentially growing in number and in complexity. They use numerous customized firmware and hardware, without taking into consideration security issues, which make them a target for cybercriminals, especially malware authors.We will present a novel approach of using side channel information to identify the kinds of threats that are targeting the device. Using our approach, a malware analyst is able to obtain precise knowledge about malware type a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 36 publications
0
7
0
2
Order By: Relevance
“…WattsUpDoc [16] was one of the earliest efforts in malware detection through hardware side-channel that demonstrated the measurement of power usage on medical embedded devices. Recently in [50,56], the authors proposed to detect and classify malware by observing EM signals. This type of work only detects busy malware under its behavioral activity, however fails to detect stealthy rootkits after their installation.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…WattsUpDoc [16] was one of the earliest efforts in malware detection through hardware side-channel that demonstrated the measurement of power usage on medical embedded devices. Recently in [50,56], the authors proposed to detect and classify malware by observing EM signals. This type of work only detects busy malware under its behavioral activity, however fails to detect stealthy rootkits after their installation.…”
Section: Related Workmentioning
confidence: 99%
“…Recent work to detect malware using EM [36,50,56] [22], SHA1 [54]). Even attacks over short distance such as Screaming channels [15], which succeeded in breaking AES by exploiting wireless communication, are possible.…”
Section: Software Defined Radios (Sdr)mentioning
confidence: 99%
See 3 more Smart Citations