Presentation 2019-03-07
How to build malware sandbox using real IoT devices
Jia Xiong, Tatsuya Tamai, Kazuki Tamiya, Satoshi Hara, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxes has not been well investigated. A standard approach is to prepare a typical embedded device environment using common tools like Busybox although such an approach has an obvious limitation against advanced malware that utilizes specific functions and/or libraries provided only by the target devices. In this study, we first show a methodology to construct malware sandbox using real IoT devices with vulnerability. Then, we show examples of sandbox implementation with five real devices and the analysis results of in-the-wild IoT malware.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) IoT devices / Malware / Dynamic analysis
Paper # ICSS2018-69
Date of Issue 2019-02-28 (ICSS)

Conference Information
Committee ICSS / IPSJ-SPT
Conference Date 2019/3/7(2days)
Place (in Japanese) (See Japanese page)
Place (in English) NICT Okinawa Electromagnetic Technology Center
Topics (in Japanese) (See Japanese page)
Topics (in English) Security, etc.
Chair Yoshiaki Shiraishi(Kobe Univ.)
Vice Chair Hiroki Takakura(NII) / Katsunari Yoshioka(Yokohama National Univ.)
Secretary Hiroki Takakura(NTT) / Katsunari Yoshioka(NICT)
Assistant Akira Yamada(KDDI labs.) / Keisuke Kito(Mitsubishi Electric)

Paper Information
Registration To Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) How to build malware sandbox using real IoT devices
Sub Title (in English)
Keyword(1) IoT devices
Keyword(2) Malware
Keyword(3) Dynamic analysis
1st Author's Name Jia Xiong
1st Author's Affiliation Yokohama National University(Yokohama National Univ.)
2nd Author's Name Tatsuya Tamai
2nd Author's Affiliation Yokohama National University(Yokohama National Univ.)
3rd Author's Name Kazuki Tamiya
3rd Author's Affiliation Yokohama National University(Yokohama National Univ.)
4th Author's Name Satoshi Hara
4th Author's Affiliation Yokohama National University/Fujisoft incorporated(Yokohama National Univ./Fujisoft)
5th Author's Name Rui Tanabe
5th Author's Affiliation Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.)
6th Author's Name Akira Fujita
6th Author's Affiliation Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.)
7th Author's Name Katsunari Yoshioka
7th Author's Affiliation Graduate School of Environment and Information Sciences/Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.)
8th Author's Name Tsutomu Matsumoto
8th Author's Affiliation Graduate School of Environment and Information Sciences/Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.)
Date 2019-03-07
Paper # ICSS2018-69
Volume (vol) vol.118
Number (no) ICSS-486
Page pp.pp.7-12(ICSS),
#Pages 6
Date of Issue 2019-02-28 (ICSS)