Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

Efficient signature generation for classifying cross-architecture IoT malware

M Alhanahnah, Q Lin, Q Yan, N Zhang… - 2018 IEEE conference …, 2018 - ieeexplore.ieee.org
Internet-of-Things IoT devices are increasingly targeted Uy adversaries due to their unique
characteristics such as constant online connection, lack of protection, and full integration in …

Honware: A virtual honeypot framework for capturing CPE and IoT zero days

A Vetterl, R Clayton - 2019 APWG symposium on electronic …, 2019 - ieeexplore.ieee.org
Existing solutions are ineffective in detecting zero day exploits targeting Customer Premise
Equipment (CPE) and Internet of Things (IoT) devices. We present honware, a high …

Honeypots in the age of universal attacks and the Internet of Things

A Vetterl - 2020 - repository.cam.ac.uk
Today's Internet connects billions of physical devices. These devices are often immature and
insecure, and share common vulnerabilities. The predominant form of attacks relies on …

Crosys: Cross Architectural Dynamic Analysis

S Lee, J Lee, J Ko, J Shim - Proceedings of the 12th ACM SIGPLAN …, 2023 - dl.acm.org
Though there was a surge in the production of IoT devices, IoT malware analysis has
remained a problem wanting for a clever solution. However, unlike PC and mobile, whose …

Practical Methods for Fuzzing Real-World Systems

P Srivastava - 2023 - search.proquest.com
The current software ecosystem is exceptionally complex. A key defining feature of this
complexity is the vast input space that software applications must process. This feature …

NAS Honeypot Technology Based on Attack Chain

B Liu, H Shu, F Kang - International Conference on Computer Engineering …, 2020 - Springer
With the wide application of network attached storage (NAS), the security problem is
becoming more and more serious, together with the increasingly fierce attacks against NAS …