Deep learning based cross architecture internet of things malware detection and classification

R Chaganti, V Ravi, TD Pham - Computers & Security, 2022 - Elsevier
The number of publicly exposed Internet of Things (IoT) devices has been increasing, as
more number of these devices connected to the internet with default settings. The devices …

[HTML][HTML] IoT malware detection architecture using a novel channel boosted and squeezed CNN

M Asam, SH Khan, A Akbar, S Bibi, T Jamal, A Khan… - Scientific Reports, 2022 - nature.com
Interaction between devices, people, and the Internet has given birth to a new digital
communication model, the internet of things (IoT). The integration of smart devices to …

A survey of recent advances in deep learning models for detecting malware in desktop and mobile platforms

P Maniriho, AN Mahmood, MJM Chowdhury - ACM Computing Surveys, 2024 - dl.acm.org
Malware is one of the most common and severe cyber threats today. Malware infects
millions of devices and can perform several malicious activities including compromising …

A survey on cross-architectural IoT malware threat hunting

AD Raju, IY Abualhaol, RS Giagone, Y Zhou… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, the increase in non-Windows malware threats had turned the focus of the
cybersecurity community. Research works on hunting Windows PE-based malwares are …

[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources

T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …

SYMBEXCEL: automated analysis and understanding of malicious excel 4.0 macros

N Ruaro, F Pagani, S Ortolani… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Malicious software (malware) poses a significant threat to the security of our networks and
users. In the ever-evolving malware landscape, Excel 4.0 Office macros (XL4) have recently …

HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants

J Carrillo-Mondéjar, H Turtiainen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices and their firmware are notorious for their lifelong
vulnerabilities. As device infection increases, vendors also fail to release patches at a …

Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of …

S Yonamine, Y Taenaka, Y Kadobayashi… - Journal of Computer …, 2023 - Springer
As malware poses a significant threat to IoT devices, the technology to combat IoT malware,
like sandbox, has not received enough attention. The majority of efforts in existing …

[HTML][HTML] An automated behaviour-based clustering of IoT botnets

T Trajanovski, N Zhang - Future Internet, 2021 - mdpi.com
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet
variants, some of which are equipped with new capabilities and may be difficult to detect …

[HTML][HTML] Artificial intelligence-driven malware detection framework for internet of things environment

S Alsubai, AK Dutta, AM Alnajim, R Ayub… - PeerJ Computer …, 2023 - peerj.com
Abstract The Internet of Things (IoT) environment demands a malware detection (MD)
framework for protecting sensitive data from unauthorized access. The study intends to …