Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines?

T Takahashi, Y Umemura, C Han, T Ban… - … and other Affiliated …, 2021 - ieeexplore.ieee.org
To cope with growing cyber threats on the Internet, various techniques have been proposed
and implemented. Each of these techniques automates specific tasks of cybersecurity …

Investigating behavioral differences between IoT malware via function call sequence graphs

R Kawasoe, C Han, R Isawa, T Takahashi… - Proceedings of the 36th …, 2021 - dl.acm.org
IoT malware that infects IoT devices is rampant. Most IoT malware variants are generated by
changing various behaviors such as an attack method based on existing malware families …

Scalable and fast algorithm for constructing phylogenetic trees with application to IoT malware clustering

T He, C Han, R Isawa, T Takahashi, S Kijima… - IEEE …, 2023 - ieeexplore.ieee.org
With the development of IoT devices, there is a rapid increase in new types of IoT malware
and variants, causing social problems. The malware's phylogenetic tree has been used in …

An automated behaviour-based clustering of IoT botnets

T Trajanovski, N Zhang - Future Internet, 2021 - mdpi.com
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet
variants, some of which are equipped with new capabilities and may be difficult to detect …

Demystifying the Evolution of Android Malware Variants

L Tang, X Chen, S Wen, L Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
It is important to understand the evolution of Android malware as this facilitates the
development of defence techniques by proactively capturing malware features. So far …

A robust method for malware analysis using stacking classifiers and dendrogram visualization

N Naveen Kumar, S Balamurugan… - International Journal of …, 2024 - Springer
Malware analysis is a vital and challenging task in the ever-changing cyber threat
landscape. Traditional signature-based methods cannot keep up with the fast-paced …

Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware

K Nakao, K Yoshioka, T Sasaki, R Tanabe… - … on Information and …, 2023 - search.ieice.org
In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the
loose, analyzed IoT malware with new features such as persistent infection, developed …

Scalable and fast hierarchical clustering of IoT malware using active data selection

T He, C Han, T Takahashi, S Kijima… - … Conference on Fog …, 2021 - ieeexplore.ieee.org
The number of IoT malware specimens has in-creased rapidly and diversified in recent
years. To efficiently analyze a large number of malware specimens, we aim to reduce the …

Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering

K Oshio, S Takada, T He, C Han… - 2023 IEEE 47th …, 2023 - ieeexplore.ieee.org
The number of IoT malware variants infecting vulnerable IoT devices is growing. Many of
these are created by modifying parts of publicly available source codes and adding …

Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique

K Oshio, S Takada, C Han, A Tanaka… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Most IoT malware is variants generated by editing and reusing parts of the functions based
on publicly available source codes. In our previous study, we proposed a method to estimate …