♫musicjinni

Ubiquity, security and you - malware, security and the Internet of Things

video thumbnail
This presentation by Heather Goudey (independent researcher) and Jasmine Sesso (Microsoft) was delivered at VB2015 in Prague, Czech Republic.

The Internet of Things (IoT) is where the virtual world meets the physical world. Physical objects (such as refrigerators or cars - sometimes even people) are labelled, identified and connected. Massive amounts of data are gathered from a multitude of omnipresent sensor nodes, and analysed to solve difficult, real-world problems. The applications of these systems are seemingly endless and range from automating your whole house, to monitoring your health, to managing large-scale industry. The future proposed by this recent computing paradigm shift is exciting, and some of it is already here.

However, even a brief analysis of the possible implications of this type of ubiquitous computing suggests a more dystopian outcome. While the wonders of the IoT are many and varied, the privacy and security implications are somewhat unknown. By 2020, it is estimated that there will be approximately 50 billion nodes in operation worldwide. Even if you choose to not be virtualized by the IoT, escaping unrecorded by its many nodes will be nigh on impossible, and its tangible effects on physical systems means that traditional notions of what constitutes risk will need to be rethought. One thing is certain though - the threats of malware have never been more real.

This paper looks at the state of the AV industry in the context of the IoT in 2015, then drills down into the specific security implications faced, as well as the current approaches taken to address them. We examine the behaviour of current malware found in the wild already targeting the IoT, extrapolate trends, take a critical look at recent recommendations from the FTC's (Federal Trade Commission) 'Internet of Things - Privacy and Security in a Connected World' staff report and discuss the relevance of AV in this brave new world.

Ubiquity, security and you - malware, security and the Internet of Things

The Internet of Bad Things, Observed

Keynote address: One man's anti-malware researcher is...

The Unbearable Lightness of APTing

Solving the (in)security of home networked devices

Modern Attacks on Russian Financial Institutions

The TAO of .NET and PowerShell malware analysis

C&C-as-a-Service: abusing third-party web services as C&C channels

Last-minute paper: A Malicious OS X Cocktail Served from a Tainted Bottle

DDoS trojan: a malicious concept that conquered the ELF format

Sizing cybercrime: incidents and accidents, hints and allegations

Economic sanctions on malware

Modelling the network behaviour of malware to block malicious patterns

It's a file infector... it's ransomware... it's Virlock

TurlaSat: The Fault in our Stars

Will Android trojan, worm or rootkit survive in SEAndroid and containerization?

Dead and buried in their crypts: defeating modern ransomware

Quantifying maliciousness in Alexa top-ranked domains

Speaking Dyreza protocol. Advantages of 'learning' a new language

Last-minute paper: The mysterious case of Linux.Wifatch

Effectively testing APT defences

Building a malware lab in the age of Big Data

The Volatility Bot-Excavator

Breaking the bank(er): automated configuration data extraction for banking malware

Anonymity is king

WaveAtlas: surfing through the landscape of current malware packers

A quantitative examination of the current state of corporate security practices

Doing more with less: a study of file-less infection attacks

Well, that escalated quickly. From penny-stealing malware to multi-million-dollar heists

Digital 'Bian Lian' (face changing): the skeleton key malware

Disclaimer DMCA