This HTML5 document contains 33 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n19doi:10.1007/
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
n20http://purl.org/ontology/bibo/status/
dchttp://purl.org/dc/elements/1.1/
n4https://kar.kent.ac.uk/id/eprint/84209#
n21https://kar.kent.ac.uk/id/subject/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n15https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n5http://eprints.org/ontology/
n17https://kar.kent.ac.uk/id/event/
bibohttp://purl.org/ontology/bibo/
n12https://kar.kent.ac.uk/id/publication/
n22https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n6https://kar.kent.ac.uk/id/document/
n13https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n16https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n10https://kar.kent.ac.uk/84209/
n8https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:84209
rdf:type
bibo:AcademicArticle bibo:Article n5:ConferenceItemEPrint n5:EPrint
rdfs:seeAlso
n10:
owl:sameAs
n19:978-3-030-70852-8_1
n5:hasAccepted
n6:3221087
n5:hasDocument
n6:3221159 n6:3221160 n6:3221161 n6:3221162 n6:3221087 n6:3221092
dc:hasVersion
n6:3221087
dcterms:title
Persistence in Linux-Based IoT Malware
wdrs:describedby
n15:export_kar_RDFN3.n3 n16:export_kar_RDFN3.n3
dcterms:date
2021-03-03
dcterms:creator
n8:ext-jjp31@kent.ac.uk n8:ext-b.arief@kent.ac.uk n8:ext-d.j.barnes@kent.ac.uk n8:ext-crb34@kent.ac.uk n8:ext-j.c.hernandez-castro@kent.ac.uk
bibo:status
n20:peerReviewed n20:published
dcterms:publisher
n22:ext-1c5ddec173ca8cdfba8b274309638579
bibo:abstract
The Internet of Things (IoT) is a rapidly growing collection of “smart” devices capable of communicating over the Internet. Being connected to the Internet brings new features and convenience, but it also poses new security threats, such as IoT malware. IoT malware has shown similar growth, making IoT devices highly vulnerable to remote compromise. However, most IoT malware variants do not exhibit the ability to gain persistence, as they typically lose control over the compromised device when the device is restarted. This paper investigates how persistence for various IoT devices can be implemented by attackers, such that they retain control even after the device has been rebooted. Having persistence would make it harder to remove IoT malware. We investigated methods that could be used by an attacker to gain persistence on a variety of IoT devices, and compiled the requirements and potential issues faced by these methods, in order to understand how best to combat this future threat. We successfully used these methods to gain persistence on four vulnerable IoT devices with differing designs, features and architectures. We also identified ways to counter them. This work highlights the enormous risk that persistence poses to potentially billions of IoT devices, and we hope our results and study will encourage manufacturers and developers to consider implementing our proposed countermeasures or create new techniques to combat this nascent threat.
dcterms:isPartOf
n12:ext-03029743 n13:repository
dcterms:subject
n21:QA76
bibo:authorList
n4:authors
bibo:presentedAt
n17:ext-c4bd704ab3211159aa74844adf335de1
bibo:volume
12556