Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering

K Oshio, S Takada, T He, C Han… - 2023 IEEE 47th …, 2023 - ieeexplore.ieee.org
The number of IoT malware variants infecting vulnerable IoT devices is growing. Many of
these are created by modifying parts of publicly available source codes and adding …

Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees

T He, C Han, A Tanaka, T Takahashi… - Proceedings of the 20th …, 2023 - dl.acm.org
This research aims at automatic clustering from a large-scale malware specimen set by
constructing a phylogenetic tree. In our previous work, we proposed a scalable method for …

[PDF][PDF] Scalable and Fast Method for IoT Malware Clustering

何天祥 - 2023 - catalog.lib.kyushu-u.ac.jp
IoT malware has been a rapid proliferation in recent years, and a large amount of malware is
newly spread every day. Honeypots and anti-malware platforms (such as VirusTotal 1) …