No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis

被引:7
作者
Al Alsadi, Arwa Abdulkarim [1 ]
Sameshima, Kaichi [2 ]
Bleier, Jakob [3 ]
Yoshioka, Katsunari [2 ]
Lindorfer, Martina [3 ]
van Eeten, Michel [1 ]
Ganan, Carlos H. [1 ]
机构
[1] Delft Univ Technol, Delft, Netherlands
[2] Yokohama Natl Univ, Yokohama, Kanagawa, Japan
[3] TU Wien, Vienna, Austria
来源
ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2022年
基金
荷兰研究理事会;
关键词
Static Analysis; Dynamic Analysis; Exploits; Vulnerabilities; Infection Vectors; Malware; IoT;
D O I
10.1145/3488932.3517408
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of things (IoT) is composed by a wide variety of software and hardware components that inherently contain vulnerabilities. Previous research has shown that it takes only a few minutes from the moment an IoT device is connected to the Internet to the first infection attempts. Still, we know little about the evolution of exploit vectors: Which vulnerabilities are being targeted in the wild, how has the functionality changed over time, and for how long are vulnerabilities being targeted? Understanding these questions can help in the secure development, and deployment of IoT networks. We present the first longitudinal study of IoT malware exploits by analyzing 17,720 samples collected from three different sources from 2015 to 2020. Leveraging static and dynamic analysis, we extract exploits from these binaries to then analyze them along the following four dimensions: (1) evolution of infection vectors over the years, (2) exploit lifespan, vulnerability age, and the time-to-exploit of vulnerabilities, (3) functionality of exploits, and (4) targeted IoT devices and manufacturers. Our descriptive analysis uncovers several patterns: IoT malware keeps evolving, shifting from simply leveraging brute force attacks to including dozens of device-specific exploits. Once exploits are developed, they are rarely abandoned. The most recent binaries still target (very) old vulnerabilities. In some cases, new exploits are developed for a vulnerability that has been known for years. We find that the mean time-to-exploit after vulnerability disclosure is around 29 months, much longer than for malware targeting other environments.
引用
收藏
页码:309 / 321
页数:13
相关论文
共 65 条
  • [51] Soska K, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P625
  • [52] Spanos Georgios, 2018, J SYST SOFTWARE, V2018
  • [53] Strings, 2009, STRINGS 1 LIN MAN PA
  • [54] The MITRE Corporation, 2021, CVE COMM VULN EXP CV
  • [55] Tschofenig Hannes, 2017, INT THINGS SOFTW UPD
  • [56] URLhaus, URLHAUS MALW URL EXC
  • [57] Betrayed By Updates: How Negative Experiences Affect Future Security
    Vaniea, Kami E.
    Rader, Emilee
    Wash, Rick
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2671 - 2674
  • [58] Identifying Risk Factors for Webserver Compromise
    Vasek, Marie
    Moore, Tyler
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 326 - 345
  • [59] VirusTotal, 2020, VIR REF API
  • [60] Vulndb, 2020, COMPR VULN INT