Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Massive IoT Malware Classification Method Using Binary Lifting

    Hae-Seon Jeong1, Jin Kwak2,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 467-481, 2022, DOI:10.32604/iasc.2022.021038

    Abstract Owing to the development of next-generation network and data processing technologies, massive Internet of Things (IoT) devices are becoming hyperconnected. As a result, Linux malware is being created to attack such hyperconnected networks by exploiting security threats in IoT devices. To determine the potential threats of such Linux malware and respond effectively, malware classification through an analysis of the executed code is required; however, a limitation exists in that each heterogeneous architecture must be analyzed separately. However, the binary codes of a heterogeneous architecture can be translated to a high-level intermediate representation (IR) of the same format using binary lifting… More >

  • Open Access

    ARTICLE

    MMALE—A Methodology for Malware Analysis in Linux Environments

    José Javier de Vicente Mohino1, Javier Bermejo Higuera1, Juan Ramón Bermejo Higuera1, Juan Antonio Sicilia Montalvo1,*, Manuel Sánchez Rubio1, José Javier Martínez Herraiz2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1447-1469, 2021, DOI:10.32604/cmc.2021.014596

    Abstract In a computer environment, an operating system is prone to malware, and even the Linux operating system is not an exception. In recent years, malware has evolved, and attackers have become more qualified compared to a few years ago. Furthermore, Linux-based systems have become more attractive to cybercriminals because of the increasing use of the Linux operating system in web servers and Internet of Things (IoT) devices. Windows is the most employed OS, so most of the research efforts have been focused on its malware protection rather than on other operating systems. As a result, hundreds of research articles, documents,… More >

Displaying 1-10 on page 1 of 2. Per Page