Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT)

  title={Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT)},
  author={Byungho Min and Vijay Varadharajan},
  journal={2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)},
In this paper, we analyse the Internet of Things (IoT) aspect of smart home from a security perspective, and adapt an advanced malware technique (called feature-distributed malware) for the IoT. We design several attacks including cyber-physical system attacks and advanced cyber attacks, and then evaluate their impact via practical evaluations. Our proposed offensive techniques are based on the following current smart home status: (1) almost every smart home appliance is directly or indirectly… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-5 of 5 extracted citations

Security Aspects of Cyber Physical Systems

2018 1st International Conference on Computer Applications & Information Security (ICCAIS) • 2018
View 2 Excerpts

Security Attacks and Countermeasures on Cloud Assisted IoT Applications

2018 IEEE International Conference on Smart Cloud (SmartCloud) • 2018
View 2 Excerpts

Industrial IoT Technologies and Applications

Xu Ting, Zhao Chuanxing, Chu Yuezhong
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering • 2017


Publications referenced by this paper.
Showing 1-10 of 33 references

Threat Landscape and Good Practice Guide for Smart Home and Converged Media

D. Barnard-Wills, L. Marinos, S. Portesi
enisa, Tech. Rep., Dec. 2014. • 2014
View 4 Excerpts
Highly Influenced

How To Smart Home: A Step by Step Guide to Your Personal Internet of Things, 3rd edition

O. Kyas
View 1 Excerpt

Apr.) Baby Monitor Hacker Still Terrorizing Babies And Their Parents. baby-monitor-hacker-still-terrorizing-babies-and-their-parents

K. Hill
View 2 Excerpts

Black Hat Python: Python Programming for Hackers and Pentesters

J. Seitz
View 2 Excerpts

Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures

2014 19th International Conference on Engineering of Complex Computer Systems • 2014
View 5 Excerpts

Feb.) Don’t Shop or Bank With a Smart TV. https: //

C. Bodnar
View 1 Excerpt

Jul.) Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords.

D. Goodin
View 1 Excerpt

Jun.) Nest Learning Thermostat has its security cracked open by GTVHacker. nest-thermostat-rooted

R. Lawler
View 1 Excerpt

Similar Papers

Loading similar papers…