A Survey on Cross-Architectural IoT Malware Threat Hunting

被引:28
|
作者
Raju, Anandharaju Durai [1 ]
Abualhaol, Ibrahim Y. [2 ]
Giagone, Ronnie Salvador [3 ]
Zhou, Yang [4 ]
Huang, Shengqiang [3 ]
机构
[1] Simon Fraser Univ, Sch Comp Sci, Burnaby, BC V5A 1S6, Canada
[2] Huawei Technol Canada Co Ltd, Kanata, ON K2K 3J1, Canada
[3] Huawei Technol Canada Co Ltd, Burnaby, BC V5C 6S7, Canada
[4] Huawei Technol Canada Co Ltd, Markham, ON L3R 5A4, Canada
关键词
Malware; Linux; Tools; Ground penetrating radar; Geophysical measurement techniques; Operating systems; Internet of Things; Cybersecurity; cross-architecture; IoT; elf; linux; survey; taxonomy; machine learning; malware classification; malware detection; THINGS MALWARE; INTERNET; CHALLENGES;
D O I
10.1109/ACCESS.2021.3091427
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integrated into human life have become a hackers' highway for their malicious activities. The IoT devices employ various Unix-based architectures that follow ELF (Executable and Linkable Format) as their standard binary file specification. This study aims at providing a comprehensive survey on the latest developments in cross-architectural IoT malware detection and classification approaches. Aided by a modern taxonomy, we discuss the feature representations, feature extraction techniques, and machine learning models employed in the surveyed works. We further provide more insights on the practical challenges involved in cross-architectural IoT malware threat hunting and discuss various avenues to instill potential future research.
引用
收藏
页码:91686 / 91709
页数:24
相关论文
共 50 条
  • [1] Federated malware detection based on many-objective optimization in cross-architectural IoT
    Zhang, Zhigang
    Zhang, Zhixia
    Cui, Zhihua
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (03):
  • [2] IoT Malware Threat Hunting Method Based on Improved Transformer
    Li, Yaping
    Li, Yuancheng
    [J]. International Journal of Network Security, 2023, 25 (02) : 267 - 276
  • [3] MODSC: Many-Objective-Optimization-Driven Data-Balancing Strategy in Cross-Architectural Malware Classification for Extreme IoT
    Cui, Zhihua
    Zhang, Zhigang
    Zhang, Zhixia
    Zhang, Wensheng
    Chen, Jinjun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 3702 - 3710
  • [4] A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer
    Haddadpajouh, Hamed
    Mohtadi, Alireza
    Dehghantanaha, Ali
    Karimipour, Hadis
    Lin, Xiaodong
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4540 - 4547
  • [5] A multiview learning method for malware threat hunting: windows, IoT and android as case studies
    Hamid Darabian
    Ali Dehghantanha
    Sattar Hashemi
    Mohammad Taheri
    Amin Azmoodeh
    Sajad Homayoun
    Kim-Kwang Raymond Choo
    Reza M. Parizi
    [J]. World Wide Web, 2020, 23 : 1241 - 1260
  • [6] A multiview learning method for malware threat hunting: windows, IoT and android as case studies
    Darabian, Hamid
    Dehghantanha, Ali
    Hashemi, Sattar
    Taheri, Mohammad
    Azmoodeh, Amin
    Homayoun, Sajad
    Choo, Kim-Kwang Raymond
    Parizi, Reza M.
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 1241 - 1260
  • [7] A cross-architectural quantitative evaluation of mobility approaches
    Chaganti, Vasanta
    Kurose, James
    Venkataramani, Arun
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 639 - 647
  • [8] A cross-architectural interface for code cache manipulation
    Hazelwood, Kim
    Cohn, Robert
    [J]. CGO 2006: 4TH INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2006, : 17 - +
  • [9] Cross-Architectural Design Space Exploration Tool for Reconfigurable Processors
    Bauer, Lars
    Shafique, Muhammad
    Henkel, Joerg
    [J]. DATE: 2009 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, VOLS 1-3, 2009, : 958 - 963
  • [10] Cross-architectural performance Portability of a Java']Java virtual machine implementation
    Jacob, M
    Randall, K
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 2ND JAVA(TM) VIRTUAL MACHINE RESEARCH AND TECHNOLOGY SYMPOSIUM, 2002, : 79 - 89