Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue
{"title":"基于可执行文件字节序列的物联网恶意软件检测","authors":"Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue","doi":"10.1109/AsiaJCIS50894.2020.00033","DOIUrl":null,"url":null,"abstract":"Attacks towards the Internet of Things (IoT) devices are on the rise. To enable precaution and countermeasure against IoT malware, we present a cross-platform analysis of IoT malware programs based on static discriminating information extracted directly from ELF binaries. With experiments on a dataset composed of more than 222K samples cross 7 different CPU architectures, we demonstrate that efficient malware detection can be realized with near optimal accuracy.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"IoT-Malware Detection Based on Byte Sequences of Executable Files\",\"authors\":\"Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue\",\"doi\":\"10.1109/AsiaJCIS50894.2020.00033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attacks towards the Internet of Things (IoT) devices are on the rise. To enable precaution and countermeasure against IoT malware, we present a cross-platform analysis of IoT malware programs based on static discriminating information extracted directly from ELF binaries. With experiments on a dataset composed of more than 222K samples cross 7 different CPU architectures, we demonstrate that efficient malware detection can be realized with near optimal accuracy.\",\"PeriodicalId\":247481,\"journal\":{\"name\":\"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS50894.2020.00033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS50894.2020.00033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IoT-Malware Detection Based on Byte Sequences of Executable Files
Attacks towards the Internet of Things (IoT) devices are on the rise. To enable precaution and countermeasure against IoT malware, we present a cross-platform analysis of IoT malware programs based on static discriminating information extracted directly from ELF binaries. With experiments on a dataset composed of more than 222K samples cross 7 different CPU architectures, we demonstrate that efficient malware detection can be realized with near optimal accuracy.