A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices

被引:3
作者
Kim, Dohyun [1 ]
Pan, Yi [2 ]
Park, Jong Hyuk [3 ]
机构
[1] Catholic Univ Pusan, Dept Comp Engn, Busan 46252, South Korea
[2] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30302 USA
[3] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
关键词
Malware; Phishing; Computer hacking; Digital forensics; Web pages; Smart phones; Analytical models; IoT security; IoT device forensics; IoT malware; malware investigation; social engineering malware;
D O I
10.1109/ACCESS.2020.3043939
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As IoT devices are always connected to mobile devices or other computing devices via the Internet, clever malwares targeting IoT devices or other computing devices connected to IoT devices are emerging. Therefore, effective IoT security research is needed to respond to hacking attacks by these kinds of malware. This paper studied the method of identifying and analyzing malware combined with social engineering from the perspective of digital forensics. The paper classified and analyzed intelligent malware characteristics and proposed a method of quickly identifying and analyzing the malware that secretly intruded into the devices installed with Android, Linux OS, using digital forensics techniques. Moreover, this paper proved its effectiveness by applying this investigation method to two actual malware cases. The research outcomes will be useful in responding to increasingly clever malware attacking IoT devices.
引用
收藏
页码:224487 / 224499
页数:13
相关论文
共 36 条
[1]   Intelligent mobile malware detection using permission requests and API calls [J].
Alazab, Moutaz ;
Alazab, Mamoun ;
Shalaginov, Andrii ;
Mesleh, Abdelwadood ;
Awajan, Albara .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :509-521
[2]  
Alzaylaee MK, 2017, PROCEEDINGS OF THE 3RD ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2017, P65, DOI 10.1145/3041008.3041010
[3]  
[Anonymous], 2017-2022 white paper
[4]  
[Anonymous], TELECOMMUN SYST
[5]  
[Anonymous], 2017, P INT C INF COMM TEC
[6]  
[Anonymous], 2016, TSINGHUA SCI TECHNOL
[7]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[8]  
Chebyshev V., 2021, MOBILE MALWARE EVOLU
[9]  
Dimitriadis A., 2020, ARRAY, V5, DOI DOI 10.1016/J.ARRAY.2019.100015
[10]   TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones [J].
Enck, William ;
Gilbert, Peter ;
Han, Seungyeop ;
Tendulkar, Vasant ;
Chun, Byung-Gon ;
Cox, Landon P. ;
Jung, Jaeyeon ;
McDaniel, Patrick ;
Sheth, Anmol N. .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2014, 32 (02)