YoVDO

IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Malware Analysis Courses Vulnerability Assessment Courses Dynamic Analysis Courses

Course Description

Overview

Explore a comprehensive survey of IoT malware in this 47-minute Black Hat conference talk. Delve into the evolution of computer malware as it expands to Internet of Things devices, examining the increasing number and variety of vulnerable computing systems. Learn about metadata collection, malware families, vulnerability assessment rules, and dynamic analysis techniques. Discover real-world case studies, including Hydra and Peyote Ripper, and discuss open questions in the field. Gain insights into challenges, potential solutions, and key takeaways for understanding and combating IoT malware threats.

Syllabus

Introduction
Contact Information
Agenda
What is IoT
Why is IoT interesting
Platform heterogeneity
Timeline of IoT malware
Why IoT malware
Metadata
Vulnerability Details
Metadata Collection
Malware Families
Ideas Rules
Vulnerability Assessment Rules
Dynamic Analysis
In Vivo Analysis
Analysis Process
Package Generic
Sample Analysis
Case Studies
Hydra
Peyote Ripper
Open Questions
Virus Totals
First Scene in the Wild
VirusTotal
Conclusion
Challenges
Mesh CV
IoT Malware Names
Takeaways
Possible Solutions
What We Want
Thank You


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube