2013 20th Working Conference on Reverse Engineering (WCRE) 2013
DOI: 10.1109/wcre.2013.6671321
|View full text |Cite
|
Sign up to set email alerts
|

PsybOt malware: A step-by-step decompilation case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Forensic analysis of devices infected by Mirai botnet is provided by Zhang et al [98]. Other botnet studies include analysis on Chuck Norris botnet byČeleda et al [99], [100], Dofloo/Spike botnet by Bohio et al [101], Psyb0t analysis by Durfina et al [102], and Baume et al [103]. IoT security-specific survey was presented by Pajouh et al [104], intrusion detection system specific IoT review was provided by Khraisat et al [105], DDoS attack mitigating intrusion detection systems are surveyed by Mishra et al in [106].…”
Section: Related Workmentioning
confidence: 99%
“…Forensic analysis of devices infected by Mirai botnet is provided by Zhang et al [98]. Other botnet studies include analysis on Chuck Norris botnet byČeleda et al [99], [100], Dofloo/Spike botnet by Bohio et al [101], Psyb0t analysis by Durfina et al [102], and Baume et al [103]. IoT security-specific survey was presented by Pajouh et al [104], intrusion detection system specific IoT review was provided by Khraisat et al [105], DDoS attack mitigating intrusion detection systems are surveyed by Mishra et al in [106].…”
Section: Related Workmentioning
confidence: 99%
“…Converting binaries to source code: A complementary approach is to try to generate the source code from the binary, but this is a very hard task. Some works [18,19] focus on reverse engineering of the malware binary to a high-level language representation, but not source code. Some other efforts [11,27,56] introduce binary decompilation into readable source code.…”
Section: Related Workmentioning
confidence: 99%
“…3, IoT botnets are performing many attacks. In this section, an IoT botnet comparison is done at Table 5 based on model architecture, attacks, target, operation, and propagation [6,[13][14][15][16][17][18][19][20][21][22][23]28]. Table 5 lists the botnets analyzed in this work along with their topology, targets, types of attacks and the infection/operation stages studied in Sect.…”
Section: Related Workmentioning
confidence: 99%