Persistence in Linux-Based IoT Malware.
Calvin BrierleyJamie PontBudi AriefDavid J. BarnesJulio C. Hernandez-CastroPublished in: NordSec (2020)
Keyphrases
- operating system
- management system
- open source
- file system
- detect malicious
- database applications
- reverse engineering
- malware detection
- big data
- cloud computing
- linux kernel
- control flow
- strongly typed
- malicious code
- static analysis
- dynamic analysis
- command line
- anti virus
- location information
- key management
- database
- red hat
- software engineering
- data analysis