Presentation 2018-11-22
Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban, Katsunari Yoshioka, Daisuke Inoue,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) At the ICSS workshop held in June, 2018, we proposed a method for calculatingsimilarity between IoT malware samples over CPU architectures, based on theirbinaries. The binaries whose CPU architectures differ from each other consist of different types of instructions, which means it is difficult to calculate their similarity scores based on their binaries. To tackle this problem, our method first converts the binaries into instructions of IR (Intermediate Representation), and then it calculates the similarity based on those converted instructions of binaries. Our method can be effective; however, we evaluated effectiveness of our method with just 12 malware samples. In this paper, we show experiments using 945 IoT malware samples, which were categorized into three malware families. The experiments confirmed that our method produced an accuracy of 0.70 against 945 IoT malware samples, and we sense our method captures some features shared between IoT malware samples for good classification of malware.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Internet of Things / Malware analysis / Intermediate representation / N-gram / Jaccard similarity
Paper # ICSS2018-66
Date of Issue 2018-11-14 (ICSS)

Conference Information
Committee ICSS
Conference Date 2018/11/21(2days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair Yoshiaki Shiraishi(Kobe Univ.)
Vice Chair Hiroki Takakura(NII) / Katsunari Yoshioka(Yokohama National Univ.)
Secretary Hiroki Takakura(NTT) / Katsunari Yoshioka(NICT)
Assistant Akira Yamada(KDDI labs.) / Keisuke Kito(Mitsubishi Electric)

Paper Information
Registration To Technical Committee on Information and Communication System Security
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Part II: Calculating Similarity between IoT Malware over CPU Architectures
Sub Title (in English)
Keyword(1) Internet of Things
Keyword(2) Malware analysis
Keyword(3) Intermediate representation
Keyword(4) N-gram
Keyword(5) Jaccard similarity
1st Author's Name Ryoichi Isawa
1st Author's Affiliation National Institute of Information and Communications Technology(NICT)
2nd Author's Name Tao Ban
2nd Author's Affiliation National Institute of Information and Communications Technology(NICT)
3rd Author's Name Katsunari Yoshioka
3rd Author's Affiliation Yokohama National University/National Institute of Information and Communications Technology(YNU/NICT)
4th Author's Name Daisuke Inoue
4th Author's Affiliation National Institute of Information and Communications Technology(NICT)
Date 2018-11-22
Paper # ICSS2018-66
Volume (vol) vol.118
Number (no) ICSS-315
Page pp.pp.73-78(ICSS),
#Pages 6
Date of Issue 2018-11-14 (ICSS)