Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT)

@article{Min2015DesignAE,
  title={Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT)},
  author={Byungho Min and Vijay Varadharajan},
  journal={2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)},
  year={2015},
  pages={80-89}
}
In this paper, we analyse the Internet of Things (IoT) aspect of smart home from a security perspective, and adapt an advanced malware technique (called feature-distributed malware) for the IoT. We design several attacks including cyber-physical system attacks and advanced cyber attacks, and then evaluate their impact via practical evaluations. Our proposed offensive techniques are based on the following current smart home status: (1) almost every smart home appliance is directly or indirectly… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-5 of 5 extracted citations

Security Aspects of Cyber Physical Systems

2018 1st International Conference on Computer Applications & Information Security (ICCAIS) • 2018
View 2 Excerpts

Security Attacks and Countermeasures on Cloud Assisted IoT Applications

2018 IEEE International Conference on Smart Cloud (SmartCloud) • 2018
View 2 Excerpts

Industrial IoT Technologies and Applications

Xu Ting, Zhao Chuanxing, Chu Yuezhong
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering • 2017

References

Publications referenced by this paper.
Showing 1-10 of 33 references

Threat Landscape and Good Practice Guide for Smart Home and Converged Media

D. Barnard-Wills, L. Marinos, S. Portesi
enisa, Tech. Rep., Dec. 2014. • 2014
View 4 Excerpts
Highly Influenced

How To Smart Home: A Step by Step Guide to Your Personal Internet of Things, 3rd edition

O. Kyas
2015
View 1 Excerpt

Apr.) Baby Monitor Hacker Still Terrorizing Babies And Their Parents. http://www.forbes.com/sites/kashmirhill/2014/04/29/ baby-monitor-hacker-still-terrorizing-babies-and-their-parents

K. Hill
2014
View 2 Excerpts

Black Hat Python: Python Programming for Hackers and Pentesters

J. Seitz
2014
View 2 Excerpts

Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures

2014 19th International Conference on Engineering of Complex Computer Systems • 2014
View 5 Excerpts

Feb.) Don’t Shop or Bank With a Smart TV. https: //blog.kaspersky.co.uk/dont-shop-or-bank-with-a-smart-tv

C. Bodnar
2014
View 1 Excerpt

Jul.) Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords. http://arstechnica.com/security/2014/07/cryptoweakness-in-smart-led-lightbulbs-exposes-wi-fi-passwords

D. Goodin
2014
View 1 Excerpt

Jun.) Nest Learning Thermostat has its security cracked open by GTVHacker. http://www.engadget.com/2014/06/23/ nest-thermostat-rooted

R. Lawler
2014
View 1 Excerpt

Similar Papers

Loading similar papers…