Title:
An Empirical Analysis of IoT Malware Infection Techniques

Thumbnail Image
Author(s)
Joaquin, Nicholas
Authors
Advisor(s)
Antonakakis, Manos
Advisor(s)
Editor(s)
Associated Organization(s)
Supplementary to
Abstract
The rise of insecure Internet of Things (IoT) on the Internet is problematic because they are easily compromised. IoT vendors are trying to push products to market as quickly as possible resulting in a significant amount of security issues. This work explores the attacks vectors used by malware to gain privilege control of IoT devices. We achieve this by performing two experiments – a static binary analysis that checks for specific patterns and identifies a binary to a publicly disclosed vulnerability, and a dynamic binary analysis focusing on linking program behavior to malicious actions. We further extend upon this by analyzing ELF section metadata of “tagged” binaries to determine if we can link specific ELF section sizes and entropies to malicious binaries. Through our work, we see that a large portion of vulnerabilities occurs due to improperly validated inputs, followed by weak credentials and improperly secured files. Moreover, we have also found that we are unable to link ELF section metadata to malicious binaries, as a result of anti-analysis efforts by malware authors. Our intention with this work is to understand how malware attacks IoT devices, thereby highlighting the specific security areas that must be prioritized in IoT device development.
Sponsor
Date Issued
2020-05
Extent
Resource Type
Text
Resource Subtype
Undergraduate Thesis
Rights Statement
Rights URI