Главная
Study mode:
on
1
Introduction
2
Contact Information
3
Agenda
4
What is IoT
5
Why is IoT interesting
6
Platform heterogeneity
7
Timeline of IoT malware
8
Why IoT malware
9
Metadata
10
Vulnerability Details
11
Metadata Collection
12
Malware Families
13
Ideas Rules
14
Vulnerability Assessment Rules
15
Dynamic Analysis
16
In Vivo Analysis
17
Analysis Process
18
Package Generic
19
Sample Analysis
20
Case Studies
21
Hydra
22
Peyote Ripper
23
Open Questions
24
Virus Totals
25
First Scene in the Wild
26
VirusTotal
27
Conclusion
28
Challenges
29
Mesh CV
30
IoT Malware Names
31
Takeaways
32
Possible Solutions
33
What We Want
34
Thank You
Description:
Explore a comprehensive survey of IoT malware in this 47-minute Black Hat conference talk. Delve into the evolution of computer malware as it expands to Internet of Things devices, examining the increasing number and variety of vulnerable computing systems. Learn about metadata collection, malware families, vulnerability assessment rules, and dynamic analysis techniques. Discover real-world case studies, including Hydra and Peyote Ripper, and discuss open questions in the field. Gain insights into challenges, potential solutions, and key takeaways for understanding and combating IoT malware threats.

IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies

Black Hat
Add to list
0:00 / 0:00