Login / Signup

Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware.

Shun YonamineYuzo TaenakaYouki KadobayashiDaisuke Miyamoto
Published in: J. Comput. Virol. Hacking Tech. (2023)
Keyphrases
  • case study
  • dynamic analysis
  • static analysis
  • malicious behavior
  • management system
  • malicious code
  • reverse engineering
  • data mining
  • design process
  • web services
  • context aware
  • malware detection