Please use this identifier to cite or link to this item:
Title: SandBox for IoT Malware analysis (Diseker)
Author: El Azizi, Oussama
Tutor: Hernández Gañán, Carlos
Keywords: sandbox
malware analysis
Issue Date: Dec-2020
Publisher: Universitat Oberta de Catalunya (UOC)
Abstract: The market of IoT devices has been increasing rapidly in the last few years, adding new devices and tools to homes, adding new tools that can be managed remotely to hospitals and allowing us to monitor our health and security very closely by using wearables and installing cameras in our houses, but the fast and rapid increase of those limited resource devices made the industry start developing new devices without standardization, using weak cryptography systems that can be easily broken due to the limited resources or by deploying devices without the proper services to install them in houses or hospitals (such as cameras and monitorization devices). The lack of standardization, weak security configurations and outdated systems used by the IoT devices in the market, has made the IoT devices an easy target to threat actors which in turn increased the presence of IoT malware on the internet. Those threat actors take advantage of the presence of such security weak devices and use them for attacks such DDoS, mining or spamming. In this project I will be discussing a readapted sandbox for IoT devices that will help security analysts tun malicious code in it and understand it behaviour which will help them extract IOCs and create signatures to protect network and devices from being used maliciously. This sandbox with the name Diseker, was successful of analysing multiple malware instances as well as helped established a pattern performed by most of the malware in the dataset.
Language: English
Appears in Collections:Bachelor thesis, research projects, etc.

Files in This Item:
File Description SizeFormat 
oelaziziTFM1220memory.pdfMemory of TFM1.66 MBAdobe PDFView/Open

This item is licensed under a Creative Commons License Creative Commons