Attributes | Values |
---|
type
| |
seeAlso
| |
sameAs
| |
http://eprints.org/ontology/hasAccepted
| |
http://eprints.org/ontology/hasDocument
| |
dc:hasVersion
| |
Title
| - Persistence in Linux-Based IoT Malware
|
described by
| |
Date
| |
Creator
| |
status
| |
Publisher
| |
abstract
| - The Internet of Things (IoT) is a rapidly growing collection of “smart” devices capable of communicating over the Internet. Being connected to the Internet brings new features and convenience, but it also poses new security threats, such as IoT malware. IoT malware has shown similar growth, making IoT devices highly vulnerable to remote compromise. However, most IoT malware variants do not exhibit the ability to gain persistence, as they typically lose control over the compromised device when the device is restarted. This paper investigates how persistence for various IoT devices can be implemented by attackers, such that they retain control even after the device has been rebooted. Having persistence would make it harder to remove IoT malware. We investigated methods that could be used by an attacker to gain persistence on a variety of IoT devices, and compiled the requirements and potential issues faced by these methods, in order to understand how best to combat this future threat. We successfully used these methods to gain persistence on four vulnerable IoT devices with differing designs, features and architectures. We also identified ways to counter them. This work highlights the enormous risk that persistence poses to potentially billions of IoT devices, and we hope our results and study will encourage manufacturers and developers to consider implementing our proposed countermeasures or create new techniques to combat this nascent threat.
|
Is Part Of
| |
Subject
| |
list of authors
| |
presented at
| |
volume
| |
is topic
of | |
is primary topic
of | |