A Survey on Cross-Architectural IoT Malware Threat Hunting

被引:38
作者
Raju, Anandharaju Durai [1 ]
Abualhaol, Ibrahim Y. [2 ]
Giagone, Ronnie Salvador [3 ]
Zhou, Yang [4 ]
Huang, Shengqiang [3 ]
机构
[1] Simon Fraser Univ, Sch Comp Sci, Burnaby, BC V5A 1S6, Canada
[2] Huawei Technol Canada Co Ltd, Kanata, ON K2K 3J1, Canada
[3] Huawei Technol Canada Co Ltd, Burnaby, BC V5C 6S7, Canada
[4] Huawei Technol Canada Co Ltd, Markham, ON L3R 5A4, Canada
关键词
Malware; Linux; Tools; Ground penetrating radar; Geophysical measurement techniques; Operating systems; Internet of Things; Cybersecurity; cross-architecture; IoT; elf; linux; survey; taxonomy; machine learning; malware classification; malware detection; THINGS MALWARE; INTERNET; CHALLENGES;
D O I
10.1109/ACCESS.2021.3091427
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integrated into human life have become a hackers' highway for their malicious activities. The IoT devices employ various Unix-based architectures that follow ELF (Executable and Linkable Format) as their standard binary file specification. This study aims at providing a comprehensive survey on the latest developments in cross-architectural IoT malware detection and classification approaches. Aided by a modern taxonomy, we discuss the feature representations, feature extraction techniques, and machine learning models employed in the surveyed works. We further provide more insights on the practical challenges involved in cross-architectural IoT malware threat hunting and discuss various avenues to instill potential future research.
引用
收藏
页码:91686 / 91709
页数:24
相关论文
共 113 条
[1]   The rise of "malware": Bibliometric analysis of malware study [J].
Ab Razak, Mohd Faizal ;
Anuar, Nor Badrul ;
Salleh, Rosli ;
Firdaus, Ahmad .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 :58-76
[2]   Malware Detection in Cloud Infrastructures using Convolutional Neural Networks [J].
Abdelsalam, Mahmoud ;
Krishnan, Ram ;
Huang, Yufei ;
Sandhu, Ravi .
PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, :162-169
[3]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[4]  
Alhanahnah M, 2018, IEEE CONF COMM NETW
[5]   Compiler-Agnostic Function Detection in Binaries [J].
Andriesse, Dennis ;
Slowinska, Asia ;
Bos, Herbert .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :177-189
[6]  
Phan AV, 2017, 2017 21ST ASIA PACIFIC SYMPOSIUM ON INTELLIGENT AND EVOLUTIONARY SYSTEMS (IES), P37, DOI 10.1109/IESYS.2017.8233558
[7]  
[Anonymous], 2011, SDM. SIAM
[8]  
[Anonymous], 2018, ARXIV180404637
[9]  
[Anonymous], 2017, ARXIV171009435
[10]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093