Scalable and fast algorithm for constructing phylogenetic trees with application to IoT malware clustering

T He, C Han, R Isawa, T Takahashi, S Kijima… - IEEE …, 2023 - ieeexplore.ieee.org
With the development of IoT devices, there is a rapid increase in new types of IoT malware
and variants, causing social problems. The malware's phylogenetic tree has been used in …

A fast algorithm for constructing phylogenetic trees with application to IoT malware clustering

T He, C Han, R Isawa, T Takahashi, S Kijima… - … Conference on Neural …, 2019 - Springer
For efficiently handling thousands of malware specimens, we aim to quickly and
automatically categorize those into malware families. A solution for this could be the …

Scalable and fast hierarchical clustering of IoT malware using active data selection

T He, C Han, T Takahashi, S Kijima… - … Conference on Fog …, 2021 - ieeexplore.ieee.org
The number of IoT malware specimens has in-creased rapidly and diversified in recent
years. To efficiently analyze a large number of malware specimens, we aim to reduce the …

An evolutionary study of IoT malware

H Wang, W Zhang, H He, P Liu, DX Luo… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Recent years have witnessed lots of attacks targeted at the widespread Internet of Things
(IoT) devices and malicious activities conducted by compromised IoT devices. After some …

The tangled genealogy of IoT malware

E Cozzi, PA Vervier, M Dell'Amico, Y Shen… - Proceedings of the 36th …, 2020 - dl.acm.org
The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of
large-scale IoT botnets has dramatically increased the volume and sophistication of Linux …

Efficient signature generation for classifying cross-architecture IoT malware

M Alhanahnah, Q Lin, Q Yan, N Zhang… - 2018 IEEE conference …, 2018 - ieeexplore.ieee.org
Internet-of-Things IoT devices are increasingly targeted Uy adversaries due to their unique
characteristics such as constant online connection, lack of protection, and full integration in …

[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources

T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …

ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence

YL Aung, M Ochoa, J Zhou - International Conference on Information …, 2022 - Springer
Recently, malware targeting IoT devices has become more prevalent. In this paper, we
propose a practical AT tack detection and L ive malware A nalysis S ystem (ATLAS) that …

Clustering iot malware based on binary similarity

M Bak, D Papp, C Tamás… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we propose to cluster malware samples based on their TLSH similarity. We
apply this approach to clustering IoT malware samples as IoT botnets built from malware …

IoT malware analysis and new pattern discovery through sequence analysis using meta-feature information

CJ Wu, SY Huang, K Yoshioka… - IEICE Transactions on …, 2020 - search.ieice.org
A drastic increase in cyberattacks targeting Internet of Things (IoT) devices using telnet
protocols has been observed. IoT malware continues to evolve, and the diversity of OS and …