Visible to the public IoT Malware Analysis

TitleIoT Malware Analysis
Publication TypeConference Paper
Year of Publication2019
AuthorsClincy, Victor, Shahriar, Hossain
Conference Name2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)
Keywordsblockchain, CIA triad, Conferences, data integrity, Human Behavior, image recognition, information system availability, information system confidentiality, information system integrity, Internet of Things, invasive software, IoT, IoT devices, IoT malware analysis, machine learning, malicious software, malicious users, Malware, malware analysis, malware attacks, Metrics, Ollydebug, Predictive Metrics, privacy, pubcrawl, Resiliency, security
AbstractIoT devices can be used to fulfil many of our daily tasks. IoT could be wearable devices, home appliances, or even light bulbs. With the introduction of this new technology, however, vulnerabilities are being introduced and can be leveraged or exploited by malicious users. One common vehicle of exploitation is malicious software, or malware. Malware can be extremely harmful and compromise the confidentiality, integrity and availability (CIA triad) of information systems. This paper analyzes the types of malware attacks, introduce some mitigation approaches and discusses future challenges.
DOI10.1109/COMPSAC.2019.00141
Citation Keyclincy_iot_2019