The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.32620/reks.2022.1.11
|View full text |Cite
|
Sign up to set email alerts
|

Technique for IoT malware detection based on control flow graph analysis

Abstract: The Internet of Things (IoT) refers to the millions of devices around the world that are connected to the Internet. Insecure IoT devices designed without proper security features are the targets of many Internet threats. The rapid integration of the Internet into the IoT infrastructure in various areas of human activity, including vulnerable critical infrastructure, makes the detection of malware in the Internet of Things increasingly important. Annual reports from IoT infrastructure cybersecurity companies an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
3

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 12 publications
(12 reference statements)
0
5
0
3
Order By: Relevance
“…It is impossible to unambiguously answer this question in numerical and parametric form based on the conducted research. This point needs additional investigation in the context of implementing proactive technologies of AI-powered protection of assets against cyberattacks [46][47][48] . However, these aspects do not affect the functionality and adequacy of the material presented in the article.…”
Section: Discussionmentioning
confidence: 99%
“…It is impossible to unambiguously answer this question in numerical and parametric form based on the conducted research. This point needs additional investigation in the context of implementing proactive technologies of AI-powered protection of assets against cyberattacks [46][47][48] . However, these aspects do not affect the functionality and adequacy of the material presented in the article.…”
Section: Discussionmentioning
confidence: 99%
“…The use of mathematical models for systems with functions important for safety in normative documents is recommendatory. The following classes of models can be distinguished: risk-oriented [3], Bayesian [4], fault trees [5], FMECA [6], Markov and semi-Markov [7], [8], multi-phase [9], control flow graph analysis [10], etc.…”
Section: B Related Workmentioning
confidence: 99%
“…Bobrovnikova [23] introduced a novel approach rooted in control flow graph analysis for the IoT malware detection, demonstrating its effectiveness in safeguarding the IoT devices from cyber threats. This innovative method contributes to the advancement of the IoT security measures.…”
Section: State Of the Artmentioning
confidence: 99%