Nghi Tran, Ngoc-Binh Nguyen, Quoc-Dung Ngo, Van-Hoang Le
{"title":"Towards malware detection in routers with C500-toolkit","authors":"Nghi Tran, Ngoc-Binh Nguyen, Quoc-Dung Ngo, Van-Hoang Le","doi":"10.1109/ICOICT.2017.8074691","DOIUrl":null,"url":null,"abstract":"In this paper, we present C500-toolkit, a new tool for malware detection in Commercial-off-the-shelf routers, based on dynamic analysis approach. This proposed method aims at emulating both web-interface and operating system of firmware image, allowing user gather adequate information for the identification of vulnerabilities and malwares. C500-toolkit is the first prototype that targets firmware image analysis of real router devices. This toolkit can extract firmware image from router flash chip in order to standardize it before monitoring its behavior during the run-time. C500-toolkit was evaluated with a real router device Netgear WNAP320 and the famous malware Linux/Mirai. Using strace to log system-calls during its runtime, we discovered some abnormal behaviors permitting to conclude that the router was not in normal behavior.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOICT.2017.8074691","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
In this paper, we present C500-toolkit, a new tool for malware detection in Commercial-off-the-shelf routers, based on dynamic analysis approach. This proposed method aims at emulating both web-interface and operating system of firmware image, allowing user gather adequate information for the identification of vulnerabilities and malwares. C500-toolkit is the first prototype that targets firmware image analysis of real router devices. This toolkit can extract firmware image from router flash chip in order to standardize it before monitoring its behavior during the run-time. C500-toolkit was evaluated with a real router device Netgear WNAP320 and the famous malware Linux/Mirai. Using strace to log system-calls during its runtime, we discovered some abnormal behaviors permitting to conclude that the router was not in normal behavior.