Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies

Black Hat via YouTube

Overview

Explore a comprehensive survey of IoT malware in this 47-minute Black Hat conference talk. Delve into the evolution of computer malware as it expands to Internet of Things devices, examining the increasing number and variety of vulnerable computing systems. Learn about metadata collection, malware families, vulnerability assessment rules, and dynamic analysis techniques. Discover real-world case studies, including Hydra and Peyote Ripper, and discuss open questions in the field. Gain insights into challenges, potential solutions, and key takeaways for understanding and combating IoT malware threats.

Syllabus

Introduction
Contact Information
Agenda
What is IoT
Why is IoT interesting
Platform heterogeneity
Timeline of IoT malware
Why IoT malware
Metadata
Vulnerability Details
Metadata Collection
Malware Families
Ideas Rules
Vulnerability Assessment Rules
Dynamic Analysis
In Vivo Analysis
Analysis Process
Package Generic
Sample Analysis
Case Studies
Hydra
Peyote Ripper
Open Questions
Virus Totals
First Scene in the Wild
VirusTotal
Conclusion
Challenges
Mesh CV
IoT Malware Names
Takeaways
Possible Solutions
What We Want
Thank You

Taught by

Black Hat

Reviews

Start your review of IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.