Presentation | 2021-03-01 Analyzing the Transition of Vulnerabilities Targeted by IoT Malware Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. In this research, we dynamically analyzed 5,855 samples of IoT malware collected over the past two years by IoT honeypots and investigate the attack functions using vulnerabilities incorporated in these malwares. As a result of the experiment, we confirmed that the malware samples collected in 2018 attacked at least 8 types of known vulnerabilities in 12 ports, while at least 31 types of known vulnerabilities targeting 44 ports were observed from the malware samples collected in 2020. The targeted vulnerabilities were ranging from those published 11 years before to those published 1 months ago from the sample collection that, the variety and the functions targeting old and new vulnerabilities have been incorporated into IoT malware. In addition, targeted vulnerabilities include not only those in IoT device but also those in general Web service, and that IoT malware are used in attacks targeting Web services. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | IoT / Malware / Dynamic Analysis |
Paper # | ICSS2020-40 |
Date of Issue | 2021-02-22 (ICSS) |
Conference Information | |
Committee | ICSS / IPSJ-SPT |
---|---|
Conference Date | 2021/3/1(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Online |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Security, Trust, etc. |
Chair | Hiroki Takakura(NII) |
Vice Chair | Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT) |
Secretary | Katsunari Yoshioka(NICT) / Kazunori Kamiya(KDDI labs.) |
Assistant | Keisuke Kito(Mitsubishi Electric) / Toshihiro Yamauchi(Okayama Univ.) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Analyzing the Transition of Vulnerabilities Targeted by IoT Malware |
Sub Title (in English) | |
Keyword(1) | IoT |
Keyword(2) | Malware |
Keyword(3) | Dynamic Analysis |
1st Author's Name | Kaichi Sameshima |
1st Author's Affiliation | Yokohama National University(YNU) |
2nd Author's Name | Takayuki Sasaki |
2nd Author's Affiliation | Yokohama National University(YNU) |
3rd Author's Name | Rui Tanabe |
3rd Author's Affiliation | Yokohama National University(YNU) |
4th Author's Name | Katsunari Yoshioka |
4th Author's Affiliation | Yokohama National University(YNU) |
5th Author's Name | Koji Nakao |
5th Author's Affiliation | Yokohama National University(YNU) |
6th Author's Name | Tsutomu Matsumoto |
6th Author's Affiliation | Yokohama National University(YNU) |
Date | 2021-03-01 |
Paper # | ICSS2020-40 |
Volume (vol) | vol.120 |
Number (no) | ICSS-384 |
Page | pp.pp.84-89(ICSS), |
#Pages | 6 |
Date of Issue | 2021-02-22 (ICSS) |