AA
Arwa Al Alsadi
2 records found
1
Bin there, target that
Analyzing the target selection of IoT vulnerabilities in malware binaries
For years, attackers have exploited vulnerabilities in Internet of Things (IoT) devices. Previous research has examined target selection in cybercrime, but there has been little investigation into the factors that influence target selection in attacks on IoT. This study aims to b
...
No Spring Chicken
Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
The Internet of things (IoT) is composed by a wide variety of software and hardware components that inherently contain vulnerabilities. Previous research has shown that it takes only a few minutes from the moment an IoT device is connected to the Internet to the first infection a
...