|
[1] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis et al., “Understanding the mirai botnet,” in 26th USENIX security symposium (USENIX Security 17), Vancouver, Canada, Aug. 16–18, 2017, pp. 1093–1110. [2] M. Kumar, “New mirai okiru botnet targets devices running widely-used arc processors,” The Hacker News, Jan. 15, 2018. [Online]. Available: https://thehackernews.com/2018/01/mirai-okiru-arc-botnet.html [3] R. Millman, “Satori botnet searching internet for open ethereum mining rigs,” SC Media, May 18, 2018. [Online]. Available: https://www.scmagazine.com/news/satori-botnet-searching-internet-for-open-ethereum-mining-rigs [4] D. D. J. Manuel, R. Joven, “Omg: Mirai-based bot turns iot devices into proxy servers,” Fortinet, Feb. 21, 2018. [Online]. Available: https://www.fortinet.com/blog/threat-research/omg--mirai-based-bot-turns-iot-devices-into-proxy-servers [5] R. T. J. Salvio, “Fresh totolink vulnerabilities picked up by beastmode mirai campaign,” Fortinet, Apr. 01, 2022. [Online]. Available: https://www.fortinet.com/blog/threat-research/totolink-vulnerabilities-beastmode-mirai-campaign [6] W. Xie, J. Chen, Z. Wang, C. Feng, E. Wang, Y. Gao, B. Wang, and K. Lu, ““game of hide-and-seek: Exposing hidden interfaces in embedded web applications of iot device,” in Proceedings of the ACM Web Conference 2022, Lyon, France, Apr. 25–29, 2022, pp. 524–532. [7] A. Liu, A. Alqazzaz, H. Ming, and B. Dharmalingam, “Iotverif: Automatic verification of ssl/tls certificate for iot applications,” IEEE Access, vol. 9, pp. 27 038–27 050, 2019. [8] E. Süren, F. Heiding, J. Olegård, and R. Lagerström, “Patriot: practical and agile threat research for iot,” International Journal of Information Security, vol. 22, no. 1, pp. 213–233, 2023. [9] R. Akhilesh, O. Bills, N. Chilamkurti, and M. J. M. Chowdhury, “Automated penetration testing framework for smart-home-based iot devices,” Future Internet, vol. 14, no. 10, p. 276, 2022. [10] V. Visoottiviseth, P. Akarasiriwong, S. Chaiyasart, and S. Chotivatunyu, “Pentos: Penetration testing tool for internet of thing devices,” in TENCON 2017-2017 IEEE Region 10 Conference. Penang, Malaysia: IEEE, Nov. 5–8 2017, pp. 2279–2284. [11] M. W. Daming D. Chen, Manuel Egele and D. Brumley, “Towards automated dynamic analysis for linux-based embedded firmware.” in Network and Distributed System Security Symposium 2016, San Diego, California, Feb. 21–24 2016, pp. 1–1. [12] H. Li, Q. Huang, F. Ding, H. Hu, L. Cheng, G. Gu, and Z. Zhao, “Understanding and detecting remote infection on linux-based iot devices,” in Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, Nagasaki, Japan, May 30.–Jun. 3 2022, pp. 873–887. [13] H. Alasmary, A. Khormali, A. Anwar, J. Park, J. Choi, A. Abusnaina, A. Awad, D. Nyang, and A. Mohaisen, “Analyzing and detecting emerging internet of things malware: A graph-based approach,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8977–8988, Oct. 2019. [14] B. Eshete and V. Venkatakrishnan, “Dynaminer: Leveraging offline infection analytics for on-the-wire malware detection,” in 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, U.S.A, Jun. 26–29 2017, pp. 463–474. [15] S. M. P. Dinakarrao, X. Guo, H. Sayadi, C. Nowzari, A. Sasan, S. Rafatirad, L. Zhao, and H. Homayoun, “Cognitive and scalable technique for securing iot networks against malware epidemics,” IEEE Access, vol. 8, pp. 138 508–138 528, Jul. 2020. [16] K. Shaukat, S. Luo, and V. Varadharajan, “A novel deep learning-based approach for malware detection,” Engineering Applications of Artificial Intelligence, vol. 122, p. 106030, 2023. [17] Ö. A. Aslan and R. Samet, “A comprehensive review on malware detection approaches,” IEEE Access, vol. 8, pp. 6249–6271, 2020. [18] T. Laskos, “Arachni,” Sarosys LLC, May 29, 2022. [Online]. Available: https://github.com/Arachni/arachni [19] vanhauser thc, “thc-hydra,” The Hacker’s Choice, Jun. 12, 2023. [Online]. Available: https://github.com/vanhauser-thc/thc-hydra [20] D. Wetter, “testssl.sh,” drwetter, Oct. 10, 2023. [Online]. Available: https://github.com/drwetter/testssl.sh [21] S. Shekyan, “slowhttptest,” shekyan, Jun. 10, 2022. [Online]. Available: https://github.com/shekyan/slowhttptest [22] Lucyoa, “routersploit,” threat9, Oct. 18, 2018. [Online]. Available: https://github.com/threat9/routersploit [23] R.-H. Huang and J.-Y. Lin, “自動化物聯網裝置搜尋及漏洞檢測平台,” in 第32 屆國防科技學術研討會, Taoyuan, Taiwan, Nov. 10. 2023. [24] H. C. Rudolph, “Ciphersuite,” May 6, 2018. [Online]. Available: https://ciphersuite.info/ [25] M. Kim, D. Kim, E. Kim, S. Kim, Y. Jang, and Y. Kim, “Firmae: Towards large-scale emulation of iot firmware for dynamic analysis,” in Proceedings of the 36th Annual Computer Security Applications Conference, Austin, U.S.A, Dec. 7–11 2020, pp. 733–745.
|