Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive survey of IoT malware in this 47-minute Black Hat conference talk. Delve into the evolution of computer malware as it expands to Internet of Things devices, examining the increasing number and variety of vulnerable computing systems. Learn about metadata collection, malware families, vulnerability assessment rules, and dynamic analysis techniques. Discover real-world case studies, including Hydra and Peyote Ripper, and discuss open questions in the field. Gain insights into challenges, potential solutions, and key takeaways for understanding and combating IoT malware threats.
Syllabus
Introduction
Contact Information
Agenda
What is IoT
Why is IoT interesting
Platform heterogeneity
Timeline of IoT malware
Why IoT malware
Metadata
Vulnerability Details
Metadata Collection
Malware Families
Ideas Rules
Vulnerability Assessment Rules
Dynamic Analysis
In Vivo Analysis
Analysis Process
Package Generic
Sample Analysis
Case Studies
Hydra
Peyote Ripper
Open Questions
Virus Totals
First Scene in the Wild
VirusTotal
Conclusion
Challenges
Mesh CV
IoT Malware Names
Takeaways
Possible Solutions
What We Want
Thank You
Taught by
Black Hat