<div class="csl-bib-body">
<div class="csl-entry">Al Alsadi, A. A., Sameshima, K., Bleier, J., Yoshioka, K., Lindorfer, M., van Eeten, M., & Hernández Gañán, C. (2022). No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. In Yuji Suga, Kouichi Sakurai, Xuhua Ding, & Kazue Sako (Eds.), <i>ASIA CCS ’22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security</i> (pp. 309–321). Association for Computing Machinery. https://doi.org/10.1145/3488932.3517408</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/80253
-
dc.description.abstract
The Internet of things (IoT) is composed by a wide variety of software and hardware components that inherently contain vulnerabilities. Previous research has shown that it takes only a few minutes from the moment an IoT device is connected to the Internet to the first infection attempts. Still, we know little about the evolution of exploit vectors: Which vulnerabilities are being targeted in the wild, how has the functionality changed over time, and for how long are vulnerabilities being targeted? Understanding these questions can help in the secure development, and deployment of IoT networks. We present the first longitudinal study of IoT malware exploits by analyzing 17,720 samples collected from three different sources from 2015 to 2020. Leveraging static and dynamic analysis, we extract exploits from these binaries to then analyze them along the following four dimensions: (1) evolution of infection vectors over the years, (2) exploit lifespan, vulnerability age, and the time-to-exploit of vulnerabilities, (3) functionality of exploits, and (4) targeted IoT devices and manufacturers. Our descriptive analysis uncovers several patterns: IoT malware keeps evolving, shifting from simply leveraging brute force attacks to including dozens of device-specific exploits. Once exploits are developed, they are rarely abandoned. The most recent binaries still target (very) old vulnerabilities. In some cases, new exploits are developed for a vulnerability that has been known for years. We find that the mean time-to-exploit after vulnerability disclosure is around 29 months, much longer than for malware targeting other environments.
en
dc.description.sponsorship
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds
-
dc.language.iso
en
-
dc.subject
dynamic analysis
en
dc.subject
exploits
en
dc.subject
infection vectors
en
dc.subject
iot
en
dc.subject
malware
en
dc.subject
static analysis
en
dc.subject
vulnerabilities
en
dc.title
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
en
dc.type
Inproceedings
en
dc.type
Konferenzbeitrag
de
dc.contributor.affiliation
Delft University of Technology, Netherlands (the)
-
dc.contributor.affiliation
Yokohama National University, Japan
-
dc.contributor.affiliation
Yokohama National University, Japan
-
dc.contributor.affiliation
Delft University of Technology, Netherlands (the)
-
dc.contributor.affiliation
Delft University of Technology, Netherlands (the)
-
dc.relation.isbn
978-1-4503-9140-5
-
dc.description.startpage
309
-
dc.description.endpage
321
-
dc.relation.grantno
ICT19-056
-
dc.type.category
Full-Paper Contribution
-
tuw.booktitle
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security