[HTML][HTML] Static analysis of information systems for IoT cyber security: a survey of machine learning approaches

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …

[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review

S Madan, S Sofat, D Bansal - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …

HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version)

D Breitenbacher, I Homoliak, YL Aung… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have become ubiquitous, with applications in many domains,
including industry, transportation, and healthcare; these devices also have many household …

A Survey on Security Issues in IoT Operating Systems

P Sun, Y Wan, Z Wu, Z Fang - Journal of Network and Computer …, 2024 - Elsevier
The security issues of the core (operating systems) of the Internet of Things (IoT) are
becoming increasingly urgent and prominent, this article conducts a systematic research …

SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching

Y Huang, R Wang, W Zheng, Z Zhou, S Wu… - Proceedings of the 39th …, 2024 - dl.acm.org
Open source software (OSS) supply chains have been attractive targets for attacks. One of
the significant, popular attacks is realized by malicious packages on package registries …

An Efficient Framework for Security of Internet‐of‐Things Devices against Malicious Software Updates

A Qureshi, J Shamsi, M Marvi - Journal of Computer Networks …, 2024 - Wiley Online Library
The advent of smart cities has revolutionized urban living by providing innovative solutions,
such as smart homes, smart hospitals, and smart parking. These smart applications have …

Understanding and detecting remote infection on linux-based IoT devices

H Li, Q Huang, F Ding, H Hu, L Cheng, G Gu… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
The rocketed population, poor security, and 24/7 online properties make Linux-based
Internet of Things (IoT) devices ideal targets for attackers. However, due to the budget …

Analyzing the Attack Pattern of Brute Force Attack on SSH Port

A Subhan, YN Kunang, IZ Yadi - … International Conference on …, 2023 - ieeexplore.ieee.org
Cyberattacks are one of the threats in the world of technology. Various kinds of cyberattacks
can be a threat to information security. One example of a cyberattack is a brute force attack …

MLxPack: Investigating the effects of packers on ML-based Malware detection systems using static and dynamic traits

Q Sun, M Abuhamad, E Abdukhamidov… - Proceedings of the 1st …, 2022 - dl.acm.org
Malware is one of the serious computer security threats. To protect computers from infection,
accurate detection of malware is essential. At the same time, malware detection faces two …

[HTML][HTML] MDABP: a novel approach to detect cross-architecture IoT malware based on PaaS

Y Zhao, A Kuerban - Sensors, 2023 - mdpi.com
With the development of internet technology, the Internet of Things (IoT) has been widely
used in several aspects of human life. However, IoT devices are becoming more vulnerable …