R Kawasoe, C Han, R Isawa, T Takahashi… - Proceedings of the 36th …, 2021 - dl.acm.org
IoT malware that infects IoT devices is rampant. Most IoT malware variants are generated by changing various behaviors such as an attack method based on existing malware families …
With the development of IoT devices, there is a rapid increase in new types of IoT malware and variants, causing social problems. The malware's phylogenetic tree has been used in …
T Trajanovski, N Zhang - Future Internet, 2021 - mdpi.com
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect …
It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So far …
N Naveen Kumar, S Balamurugan… - International Journal of …, 2024 - Springer
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with the fast-paced …
K Nakao, K Yoshioka, T Sasaki, R Tanabe… - … on Information and …, 2023 - search.ieice.org
In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the loose, analyzed IoT malware with new features such as persistent infection, developed …
The number of IoT malware specimens has in-creased rapidly and diversified in recent years. To efficiently analyze a large number of malware specimens, we aim to reduce the …
K Oshio, S Takada, T He, C Han… - 2023 IEEE 47th …, 2023 - ieeexplore.ieee.org
The number of IoT malware variants infecting vulnerable IoT devices is growing. Many of these are created by modifying parts of publicly available source codes and adding …
K Oshio, S Takada, C Han, A Tanaka… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Most IoT malware is variants generated by editing and reusing parts of the functions based on publicly available source codes. In our previous study, we proposed a method to estimate …