Explore a comprehensive survey of IoT malware in this 47-minute Black Hat conference talk. Delve into the evolution of computer malware as it expands to Internet of Things devices, examining the increasing number and variety of vulnerable computing systems. Learn about metadata collection, malware families, vulnerability assessment rules, and dynamic analysis techniques. Discover real-world case studies, including Hydra and Peyote Ripper, and discuss open questions in the field. Gain insights into challenges, potential solutions, and key takeaways for understanding and combating IoT malware threats.
IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies