Presentation | 2019-03-07 How to build malware sandbox using real IoT devices Jia Xiong, Tatsuya Tamai, Kazuki Tamiya, Satoshi Hara, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxes has not been well investigated. A standard approach is to prepare a typical embedded device environment using common tools like Busybox although such an approach has an obvious limitation against advanced malware that utilizes specific functions and/or libraries provided only by the target devices. In this study, we first show a methodology to construct malware sandbox using real IoT devices with vulnerability. Then, we show examples of sandbox implementation with five real devices and the analysis results of in-the-wild IoT malware. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | IoT devices / Malware / Dynamic analysis |
Paper # | ICSS2018-69 |
Date of Issue | 2019-02-28 (ICSS) |
Conference Information | |
Committee | ICSS / IPSJ-SPT |
---|---|
Conference Date | 2019/3/7(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | NICT Okinawa Electromagnetic Technology Center |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Security, etc. |
Chair | Yoshiaki Shiraishi(Kobe Univ.) |
Vice Chair | Hiroki Takakura(NII) / Katsunari Yoshioka(Yokohama National Univ.) |
Secretary | Hiroki Takakura(NTT) / Katsunari Yoshioka(NICT) |
Assistant | Akira Yamada(KDDI labs.) / Keisuke Kito(Mitsubishi Electric) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | How to build malware sandbox using real IoT devices |
Sub Title (in English) | |
Keyword(1) | IoT devices |
Keyword(2) | Malware |
Keyword(3) | Dynamic analysis |
1st Author's Name | Jia Xiong |
1st Author's Affiliation | Yokohama National University(Yokohama National Univ.) |
2nd Author's Name | Tatsuya Tamai |
2nd Author's Affiliation | Yokohama National University(Yokohama National Univ.) |
3rd Author's Name | Kazuki Tamiya |
3rd Author's Affiliation | Yokohama National University(Yokohama National Univ.) |
4th Author's Name | Satoshi Hara |
4th Author's Affiliation | Yokohama National University/Fujisoft incorporated(Yokohama National Univ./Fujisoft) |
5th Author's Name | Rui Tanabe |
5th Author's Affiliation | Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.) |
6th Author's Name | Akira Fujita |
6th Author's Affiliation | Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.) |
7th Author's Name | Katsunari Yoshioka |
7th Author's Affiliation | Graduate School of Environment and Information Sciences/Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.) |
8th Author's Name | Tsutomu Matsumoto |
8th Author's Affiliation | Graduate School of Environment and Information Sciences/Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.) |
Date | 2019-03-07 |
Paper # | ICSS2018-69 |
Volume (vol) | vol.118 |
Number (no) | ICSS-486 |
Page | pp.pp.7-12(ICSS), |
#Pages | 6 |
Date of Issue | 2019-02-28 (ICSS) |