IoT Malware - Comprehensive Survey, Analysis Framework and Case Studies
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a comprehensive survey of IoT malware in this 47-minute Black Hat conference talk. Delve into the evolution of computer malware as it expands to Internet of Things devices, examining the increasing number and variety of vulnerable computing systems. Learn about metadata collection, malware families, vulnerability assessment rules, and dynamic analysis techniques. Discover real-world case studies, including Hydra and Peyote Ripper, and discuss open questions in the field. Gain insights into challenges, potential solutions, and key takeaways for understanding and combating IoT malware threats.
Syllabus
Introduction
Contact Information
Agenda
What is IoT
Why is IoT interesting
Platform heterogeneity
Timeline of IoT malware
Why IoT malware
Metadata
Vulnerability Details
Metadata Collection
Malware Families
Ideas Rules
Vulnerability Assessment Rules
Dynamic Analysis
In Vivo Analysis
Analysis Process
Package Generic
Sample Analysis
Case Studies
Hydra
Peyote Ripper
Open Questions
Virus Totals
First Scene in the Wild
VirusTotal
Conclusion
Challenges
Mesh CV
IoT Malware Names
Takeaways
Possible Solutions
What We Want
Thank You
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network