Deep learning based cross architecture internet of things malware detection and classification
The number of publicly exposed Internet of Things (IoT) devices has been increasing, as
more number of these devices connected to the internet with default settings. The devices …
more number of these devices connected to the internet with default settings. The devices …
[HTML][HTML] IoT malware detection architecture using a novel channel boosted and squeezed CNN
Interaction between devices, people, and the Internet has given birth to a new digital
communication model, the internet of things (IoT). The integration of smart devices to …
communication model, the internet of things (IoT). The integration of smart devices to …
A survey of recent advances in deep learning models for detecting malware in desktop and mobile platforms
Malware is one of the most common and severe cyber threats today. Malware infects
millions of devices and can perform several malicious activities including compromising …
millions of devices and can perform several malicious activities including compromising …
A survey on cross-architectural IoT malware threat hunting
AD Raju, IY Abualhaol, RS Giagone, Y Zhou… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, the increase in non-Windows malware threats had turned the focus of the
cybersecurity community. Research works on hunting Windows PE-based malwares are …
cybersecurity community. Research works on hunting Windows PE-based malwares are …
[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources
T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …
become more mature. Most studies use learning models to detect or classify malware …
SYMBEXCEL: automated analysis and understanding of malicious excel 4.0 macros
Malicious software (malware) poses a significant threat to the security of our networks and
users. In the ever-evolving malware landscape, Excel 4.0 Office macros (XL4) have recently …
users. In the ever-evolving malware landscape, Excel 4.0 Office macros (XL4) have recently …
HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants
J Carrillo-Mondéjar, H Turtiainen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices and their firmware are notorious for their lifelong
vulnerabilities. As device infection increases, vendors also fail to release patches at a …
vulnerabilities. As device infection increases, vendors also fail to release patches at a …
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of …
S Yonamine, Y Taenaka, Y Kadobayashi… - Journal of Computer …, 2023 - Springer
As malware poses a significant threat to IoT devices, the technology to combat IoT malware,
like sandbox, has not received enough attention. The majority of efforts in existing …
like sandbox, has not received enough attention. The majority of efforts in existing …
[HTML][HTML] An automated behaviour-based clustering of IoT botnets
T Trajanovski, N Zhang - Future Internet, 2021 - mdpi.com
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet
variants, some of which are equipped with new capabilities and may be difficult to detect …
variants, some of which are equipped with new capabilities and may be difficult to detect …
[HTML][HTML] Artificial intelligence-driven malware detection framework for internet of things environment
S Alsubai, AK Dutta, AM Alnajim, R Ayub… - PeerJ Computer …, 2023 - peerj.com
Abstract The Internet of Things (IoT) environment demands a malware detection (MD)
framework for protecting sensitive data from unauthorized access. The study intends to …
framework for protecting sensitive data from unauthorized access. The study intends to …