Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/166124
Title: Automated malware behaviour analysis for IoT technologies
Authors: Lee, John Kai Jie
Keywords: Engineering
Issue Date: 2023
Publisher: Nanyang Technological University
Source: Lee, J. K. J. (2023). Automated malware behaviour analysis for IoT technologies. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/166124
Project: SCSE22-0588 
Abstract: As we transition our society into the digital age, the increasing prevalence of IoT Networks and devices will require more cybersecurity personnel to keep these IoT systems secure. A key part of doing this would require personnel to conduct malware analysis on malicious software, to understand their inner workings and how to combat them. To do so, requires learning the complex malware analysis process. Currently, this involves having to utilize a myriad of basic analysis tools, as well as advanced reverse engineering. However, there is a great level of difficulty involved in parsing convoluted binary data. New analyst may not be familiar how and what tools to use for basic analysis. And even those familiar with malware analysis may not be comfortable with reverse engineering a binary and understanding its workings from its assembly listing. This includes two key components. Firstly, we will compile a list of currently available analysis tools and simplify the analysis process by developing a malware analysis framework that outlines the key data points to look for during analysis. This will provide analysts with the necessary tools and information needed to conduct effective malware analysis. Secondly, we will showcase advanced analysis techniques by providing analysis scripts that automate the reverse engineering process in malware analysis. To test the accuracy of our behaviour classification system, we conduct analysis on known malware samples using our framework and analysis script. Afterwhich, we compare the detection accuracy using the script and determine how much malware behaviour it was able to detect. The results show that following our framework and script, we were able to detect over 80% of the key malware behaviours in the known malware sample, showing a more simplified malware analysis process to facilitate in learning.
URI: https://hdl.handle.net/10356/166124
Schools: School of Computer Science and Engineering 
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
FYP___Kai_Jie_Lee__John-Amended_Final_Report.pdf
  Restricted Access
5.1 MBAdobe PDFView/Open

Page view(s)

200
Updated on Mar 16, 2025

Download(s)

20
Updated on Mar 16, 2025

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.