IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies

IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies

Black Hat via YouTube Direct link

Introduction

1 of 34

1 of 34

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Contact Information
  3. 3 Agenda
  4. 4 What is IoT
  5. 5 Why is IoT interesting
  6. 6 Platform heterogeneity
  7. 7 Timeline of IoT malware
  8. 8 Why IoT malware
  9. 9 Metadata
  10. 10 Vulnerability Details
  11. 11 Metadata Collection
  12. 12 Malware Families
  13. 13 Ideas Rules
  14. 14 Vulnerability Assessment Rules
  15. 15 Dynamic Analysis
  16. 16 In Vivo Analysis
  17. 17 Analysis Process
  18. 18 Package Generic
  19. 19 Sample Analysis
  20. 20 Case Studies
  21. 21 Hydra
  22. 22 Peyote Ripper
  23. 23 Open Questions
  24. 24 Virus Totals
  25. 25 First Scene in the Wild
  26. 26 VirusTotal
  27. 27 Conclusion
  28. 28 Challenges
  29. 29 Mesh CV
  30. 30 IoT Malware Names
  31. 31 Takeaways
  32. 32 Possible Solutions
  33. 33 What We Want
  34. 34 Thank You

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.