loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Shun Yonamine ; Yuzo Taenaka and Youki Kadobayashi

Affiliation: Nara Institute of Science and Technology, 8916-5 Takayama, Ikoma, Nara 630-0192, Japan

Keyword(s): Sandbox, IoT, Malware, Dynamic Analysis, Automated Analysis, ARM.

Abstract: As malware poses a significant threat to IoT devices, the technology to combat IoT malware, like sandbox, has not received enough attention. The majority of efforts in existing researches have focused on x86-flavored binaries that are not used for IoT devices. In fact, we have witnessed that many samples of IoT malware that can be observed in the wild are ARM binaries. In this paper, we propose a novel sandbox for analyzing Linux malware including IoT malware. Our sandbox system, called Tamer, supports dynamic analysis for ARM binaries and has some features to automate and facilitate IoT malware analysis, like the automated interaction mechanism and the fake network environment for dynamic analysis. In addition, our system adopts features, like dynamic binary instrumentation and virtual machine introspection, which may allow retrieving further insights from malware. With the dataset of real-world malware, we demonstrated that our sandbox system can analyze IoT malware which is specif ically designed for infecting IoT devices. Through an analysis experiment on a large number of IoT malware samples, we demonstrate a possibility that our system could facilitate a large scale analysis in an automated manner and retrieve further insights from IoT malware. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.191.234.191

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Yonamine, S.; Taenaka, Y. and Kadobayashi, Y. (2022). Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ForSE; ISBN 978-989-758-553-1; ISSN 2184-4356, SciTePress, pages 677-687. DOI: 10.5220/0010968300003120

@conference{forse22,
author={Shun Yonamine. and Yuzo Taenaka. and Youki Kadobayashi.},
title={Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior},
booktitle={Proceedings of the 8th International Conference on Information Systems Security and Privacy - ForSE},
year={2022},
pages={677-687},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010968300003120},
isbn={978-989-758-553-1},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 8th International Conference on Information Systems Security and Privacy - ForSE
TI - Tamer: A Sandbox for Facilitating and Automating IoT Malware Analysis with Techniques to Elicit Malicious Behavior
SN - 978-989-758-553-1
IS - 2184-4356
AU - Yonamine, S.
AU - Taenaka, Y.
AU - Kadobayashi, Y.
PY - 2022
SP - 677
EP - 687
DO - 10.5220/0010968300003120
PB - SciTePress