Presentation 2021-03-01
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue, Satoshi Hara, Hironobu Sakaki, Kouichirou Okada, Eitaro Shioji, Mitsuaki Akiyama, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persistent IoT malware that continues to infect devices even after their reboot has been reported. Since such malware depends on the configuration of a specific device, it is assumed that the behavior cannot be observed correctly by dynamic analysis using a virtual environment based on a general embedded OS. In this study, we propose a method to estimate the configuration of the target IoT devices by analyzing system calls executed by the malware and to adapt the sandbox to the environment in which the malware can work.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Embedded System / IoT Malware / Persistent Infection / Dynamic Analysis
Paper # ICSS2020-41
Date of Issue 2021-02-22 (ICSS)

Conference Information
Committee ICSS / IPSJ-SPT
Conference Date 2021/3/1(2days)
Place (in Japanese) (See Japanese page)
Place (in English) Online
Topics (in Japanese) (See Japanese page)
Topics (in English) Security, Trust, etc.
Chair Hiroki Takakura(NII)
Vice Chair Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT)
Secretary Katsunari Yoshioka(NICT) / Kazunori Kamiya(KDDI labs.)
Assistant Keisuke Kito(Mitsubishi Electric) / Toshihiro Yamauchi(Okayama Univ.)

Paper Information
Registration To Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Sub Title (in English)
Keyword(1) Embedded System
Keyword(2) IoT Malware
Keyword(3) Persistent Infection
Keyword(4) Dynamic Analysis
1st Author's Name Takahiro Inoue
1st Author's Affiliation Yokohama National University(YNU)
2nd Author's Name Satoshi Hara
2nd Author's Affiliation Yokohama National University/FUJISOFT INCORPORATED(YNU/FUJISOFT)
3rd Author's Name Hironobu Sakaki
3rd Author's Affiliation Yokohama National University/RainForest(YNU/RainForest)
4th Author's Name Kouichirou Okada
4th Author's Affiliation Yokohama National University/RainForest(YNU/RainForest)
5th Author's Name Eitaro Shioji
5th Author's Affiliation NTT Secure Platform Laboratories(NTT)
6th Author's Name Mitsuaki Akiyama
6th Author's Affiliation NTT Secure Platform Laboratories(NTT)
7th Author's Name Takayuki Sasaki
7th Author's Affiliation Yokohama National University(YNU)
8th Author's Name Rui Tanabe
8th Author's Affiliation Yokohama National University(YNU)
9th Author's Name Katsunari Yoshioka
9th Author's Affiliation Yokohama National University(YNU)
10th Author's Name Koji Nakao
10th Author's Affiliation Yokohama National University(YNU)
11th Author's Name Tsutomu Matsumoto
11th Author's Affiliation Yokohama National University(YNU)
Date 2021-03-01
Paper # ICSS2020-41
Volume (vol) vol.120
Number (no) ICSS-384
Page pp.pp.90-95(ICSS),
#Pages 6
Date of Issue 2021-02-22 (ICSS)