No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis

被引:7
作者
Al Alsadi, Arwa Abdulkarim [1 ]
Sameshima, Kaichi [2 ]
Bleier, Jakob [3 ]
Yoshioka, Katsunari [2 ]
Lindorfer, Martina [3 ]
van Eeten, Michel [1 ]
Ganan, Carlos H. [1 ]
机构
[1] Delft Univ Technol, Delft, Netherlands
[2] Yokohama Natl Univ, Yokohama, Kanagawa, Japan
[3] TU Wien, Vienna, Austria
来源
ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2022年
基金
荷兰研究理事会;
关键词
Static Analysis; Dynamic Analysis; Exploits; Vulnerabilities; Infection Vectors; Malware; IoT;
D O I
10.1145/3488932.3517408
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of things (IoT) is composed by a wide variety of software and hardware components that inherently contain vulnerabilities. Previous research has shown that it takes only a few minutes from the moment an IoT device is connected to the Internet to the first infection attempts. Still, we know little about the evolution of exploit vectors: Which vulnerabilities are being targeted in the wild, how has the functionality changed over time, and for how long are vulnerabilities being targeted? Understanding these questions can help in the secure development, and deployment of IoT networks. We present the first longitudinal study of IoT malware exploits by analyzing 17,720 samples collected from three different sources from 2015 to 2020. Leveraging static and dynamic analysis, we extract exploits from these binaries to then analyze them along the following four dimensions: (1) evolution of infection vectors over the years, (2) exploit lifespan, vulnerability age, and the time-to-exploit of vulnerabilities, (3) functionality of exploits, and (4) targeted IoT devices and manufacturers. Our descriptive analysis uncovers several patterns: IoT malware keeps evolving, shifting from simply leveraging brute force attacks to including dozens of device-specific exploits. Once exploits are developed, they are rarely abandoned. The most recent binaries still target (very) old vulnerabilities. In some cases, new exploits are developed for a vulnerability that has been known for years. We find that the mean time-to-exploit after vulnerability disclosure is around 29 months, much longer than for malware targeting other environments.
引用
收藏
页码:309 / 321
页数:13
相关论文
共 65 条
  • [1] Economic Factors of Vulnerability Trade and Exploitation
    Allodi, Luca
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1483 - 1499
  • [2] Alrawi O, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3505
  • [3] SoK: Security Evaluation of Home-Based IoT Deployments
    Alrawi, Omar
    Lever, Chaz
    Antonakakis, Manos
    Monrose, Fabian
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
  • [4] [Anonymous], 2015, P USENIX WORKSHOP OF
  • [5] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
  • [6] Anwar A, 2021, Arxiv, DOI arXiv:2103.14217
  • [7] Blinowski GJ, 2020, ADV INTELL SYST COMP, V1173, P82, DOI 10.1007/978-3-030-48256-5_9
  • [8] Bouwmeester Brennen, 2021, P USENIX S USABLE PR
  • [9] Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai
    Cetin, Orcun
    Ganan, Carlos
    Altena, Lisette
    Kasama, Takahiro
    Inoue, Daisuke
    Tamiya, Kazuki
    Tie, Ying
    Yoshioka, Katsunari
    van Eeten, Michel
    [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [10] Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks
    Cetin, Orcun
    Ganan, Carlos
    Altena, Lisette
    Tajalizadehkhoob, Samaneh
    van Eeten, Michel
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 326 - 339