Abstract

As IoT devices are always connected to mobile devices or other computing devices via the Internet, clever malwares targeting IoT devices or other computing devices connected to IoT devices are emerging. Therefore, effective IoT security research is needed to respond to hacking attacks by these kinds of malware. This paper studied the method of identifying and analyzing malware combined with social engineering from the perspective of digital forensics. The paper classified and analyzed intelligent malware characteristics and proposed a method of quickly identifying and analyzing the malware that secretly intruded into the devices installed with Android, Linux OS, using digital forensics techniques. Moreover, this paper proved its effectiveness by applying this investigation method to two actual malware cases. The research outcomes will be useful in responding to increasingly clever malware attacking IoT devices.

Highlights

  • Many people today use computers and mobile devices such as smartphones, tablet PCs, smartwatches, smart cameras, navigation systems, and IoT devices such as smart TVs, AI speakers, robot vacuum cleaners, and various other home networking devices in their daily lives

  • The rest of this paper is organized as follows: Chapter 2 introduces the background and related research on IoT malware analysis; Chapter 3 proposes a useful investigation model for malware forensics investigation on IoT devices; Chapter 4 analyzes cases wherein accidents occurred due to malware combined with social engineering techniques from a digital forensic perspective; Chapter 5 is a discussion of our research; Chapter 6 presents the conclusion and future work

  • PROPOSED METHODOLOGY In this chapter, we propose an investigation model, as shown in Figure 1, for an effective incident response that can detect, analyze, and track intelligent IoT malware combined with social engineering techniques from the perspective of a digital forensic investigation

Read more

Summary

Introduction

Many people today use computers and mobile devices such as smartphones, tablet PCs, smartwatches, smart cameras, navigation systems, and IoT devices such as smart TVs, AI speakers, robot vacuum cleaners, and various other home networking devices in their daily lives. Even electric cars like Tesla, which can be considered an IoT device, have recently been connected to the network. The number of IoT devices owned by individuals continues to increase; 13.6 IoT devices are expected to be owned per US citizen by 2022 [1]. As these various IoT devices are closely used in everyday life, various kinds of information are stored. With the recent release of various health services and apps available on wearable devices, vital personal biometric information can be stored

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call