최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on software and data engineering. 소프트웨어 및 데이터 공학, v.11 no.5, 2022년, pp.197 - 202
김영호 (단국대학교 컴퓨터학과) , 이현종 ((주)케이사인 보안기술연구소) , 황두성 (단국대학교 소프트웨어학과)
IoT (Internet of Things) devices are being attacked by malware due to many security vulnerabilities, such as the use of weak IDs/passwords and unauthenticated firmware updates. However, due to the diversity of CPU architectures, it is difficult to set up a malware analysis environment and design fea...
A. S. Gillis, "What is IoT (Internet of Things) and how does it work," IoT Agenda, TechTarget, 11, 2020.
Statista, "Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2030," 2020.
M. B. Barcena and C. Wueest, "Insecurity in the internet of things," Security Response, Symantec, 2015.
N. Woolf, "DDoS attack that disrupted internet was largest of its kind in history, experts say," The Guardian, 26, 2016.
J. Gamblin, Mirai Source Code [Internet], https://github.com/jgamblin/Mirai-Source-Code.
AhnLab, "Mirai variant malware analysis report," ASEC Report, Vol.100, 2020.
Y. Ye, T. Li, D. Adjeroh, and S. S. Iyengar, "A survey on malware detection using data mining techniques," ACM Computing Surveys (CSUR), Vol.50, No.3, pp.1-40, 2017.
E. Cozzi, M. Graziano, Y. Fratantonio, and D. Balzarotti, "Understanding linux malware," In 2018 IEEE Symposium on Security and Privacy (SP), IEEE, 2018.
R. Sihwail, K. Omar, and K. A. Z. Ariffin, "A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis," International Journal on Advanced Science, Engineering and Information Technology, Vol.8, No.4-2, pp.1662-1671, 2018.
T. L. Wan et al., "Efficient detection and classification of internet-of-things malware based on byte sequences from executable files," IEEE Open Journal of the Computer Society, Vol.1, pp.262-275, 2020.
H. Darabian, A. Dehghantanha, S. Hashemi, S. Homayoun, and K. K. R. Choo, "An opcode-based technique for polymorphic Internet of Things malware detection," Concurrency and Computation Practice and Experience, Vol.32, No.6, pp.e5173, 2019.
I. Miliaraki, K. Berberich, R. Genmulla, and S. Zoupanos, "Mind the gap: Large-scale frequent sequence mining," In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, ACM, 2013.
J. Jeon, J. H. Park, and Y. Jeong, "Dynamic analysis for IoT malware detection with convolution neural network model," IEEE Access, Vol.8, pp.96899-96911, 2020.
M. D. Zeiler and R. Fergus, "Visualizing and understanding convolution networks," European Conference on Computer Vision, Springer, Cham, 2014.
R. Lyda and J. Hamrock, "Using entropy analysis to find encrpyted and packed malware," IEEE Security & Privacy, Vol.5, No.2, pp.40-45, 2007.
I. Sorokin, "Comparing files using structural entropy," Journal in Computer Virology, Vol.7, No.4, pp.259-265, 2011.
S. Goki, "Deep learning from scratch 2," Oreilly, 2019.
Malwares.com [Internet], https://www.malwares.com/.
Kaspersky [Internet], https://www.kaspersky.co.kr/.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.