Paper Abstract and Keywords |
Presentation |
2019-03-07 14:20
How to build malware sandbox using real IoT devices Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxes has not been well investigated. A standard approach is to prepare a typical embedded device environment using common tools like Busybox although such an approach has an obvious limitation against advanced malware that utilizes specific functions and/or libraries provided only by the target devices. In this study, we first show a methodology to construct malware sandbox using real IoT devices with vulnerability. Then, we show examples of sandbox implementation with five real devices and the analysis results of in-the-wild IoT malware. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
IoT devices / Malware / Dynamic analysis / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 118, no. 486, ICSS2018-69, pp. 7-12, March 2019. |
Paper # |
ICSS2018-69 |
Date of Issue |
2019-02-28 (ICSS) |
ISSN |
Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICSS2018-69 |
|