2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364598
|View full text |Cite
|
Sign up to set email alerts
|

Revealing and analysing modem malware

Abstract: Abstract-Malware targeting broadband devices like ADSL modems, routers and wireless access points is very frequent in recent days. In this paper, we provide a formal description of modem malware life cycle. Furthermore, we propose a set of techniques to perform detailed analysis of infected modem and we provide the binary samples of modem malware at our web repository. Description of the modem malware evolution is also included. Based on our experiences with analysing and monitoring modem malware, we report on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 5 publications
(6 reference statements)
0
4
0
Order By: Relevance
“…ese problems made researchers do further study [6][7][8][9][10][11][12][13] and attracted the widespread attention of researchers such as IoT malware. ese methods can be divided into two main categories.…”
Section: Introductionmentioning
confidence: 99%
“…ese problems made researchers do further study [6][7][8][9][10][11][12][13] and attracted the widespread attention of researchers such as IoT malware. ese methods can be divided into two main categories.…”
Section: Introductionmentioning
confidence: 99%
“…Inside IoT network, network devices such as router, switch, IoT gateway play a important role in transmitting data between devices. To secure these IoT devices, especially routers, works presented in [8,9,10,11,12,13] allow identifying vulnerabilities/malware in commercial off-the-shelf (COST) network devices. There are two main classes in firmware analysis: static and dynamic approach.…”
Section: Introductionmentioning
confidence: 99%
“…In response to these risks, researchers have been developing new methods and techniques to detect malicious code on IoT devices [4] [10]. These studies can be divided into two main groups: static analysis [4][5] [7] and dynamic analysis [6] [8][9] [10].…”
Section: Introductionmentioning
confidence: 99%