Please use this identifier to cite or link to this item:

http://hdl.handle.net/10609/99186
Title: Sandbox environment for IOT malware
Author: Fernández Coderch, Víctor
Director: Hernández Gañán, Carlos
Tutor: Rifà Pous, Helena  
Keywords: internet of things
malware
sandbox
Issue Date: 4-Jun-2019
Publisher: Universitat Oberta de Catalunya (UOC)
Abstract: Currently, the high growth in the number of interconnected devices has established the internet of things as a good target for malware developers. Its characteristics make it ideal to be targets of attack, low security, long time spent connected to the Internet, interconnected to other devices, are the weakest link against which to initiate an attack resulting in a point of access to other devices. All this makes it necessary to emphasize the analysis of malware specifically studying the one developed for these devices. To be able to analyze malware, it is necessary to have tools that facilitate this task. Now there are sandboxes to perform this task. The objective of this work is to prepare a sandbox, which is defined as an isolated, safe environment, where the changes made by the malware will be reversible. This implies that the malware will have the free way to make all the modifications for which it is programmed leaving the respective trace but allowing later to leave the machine as it was at its origin, prior to the execution of the malware. This environment will be prepared and configured to replicate the execution of malware aimed at architectures commonly used in the IoT such as ARM or MIPS. The result of each analysis will be given by the execution of the malware within the sandbox. This execution will return a very useful set of information that will go from the analysis of the structure of the file (static) to the detail of each execution step (dynamic) that will make changes in the guest system through system calls during its execution, including an analysis of the use of the network during this process. All this environment will generate a report which can draw conclusions from the purpose of the malware and generate an effective prevention for future infections.
Language: Spanish
URI: http://hdl.handle.net/10609/99186
Appears in Collections:Bachelor thesis, research projects, etc.

Share:
Export:
Files in This Item:
File Description SizeFormat 
vfernandezcoTFM0619memoria.pdfMemoria del TFM1.3 MBAdobe PDFView/Open

This item is licensed under a Creative Commons License Creative Commons