{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:58Z","timestamp":1750306258451,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3018898","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["IoT sandbox"],"prefix":"10.1145","author":[{"given":"Kai-Chi","family":"Chang","sequence":"first","affiliation":[{"name":"National Chengchi University, Wenshan District, Taipei City, Taiwan"}]},{"given":"Raylin","family":"Tso","sequence":"additional","affiliation":[{"name":"National Chengchi University, Wenshan District, Taipei City, Taiwan"}]},{"given":"Min-Chun","family":"Tsai","sequence":"additional","affiliation":[{"name":"National Center for Cyber Security Technology, Daan Dist., Taipei City, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"International Telecommunication Union ITU Internet Reports 2005: The Internet of Things (2005)  International Telecommunication Union ITU Internet Reports 2005: The Internet of Things (2005)"},{"key":"e_1_3_2_1_2_1","unstructured":"How Big The Internet Of Things Could Become http:\/\/readwrite.com\/2013\/09\/30\/how-big-the-internet-of-things-could-become#feed=%2Finfrastructure&awesm=~opF6zyqLuIAM4L  How Big The Internet Of Things Could Become http:\/\/readwrite.com\/2013\/09\/30\/how-big-the-internet-of-things-could-become#feed=%2Finfrastructure&awesm=~opF6zyqLuIAM4L"},{"key":"e_1_3_2_1_3_1","unstructured":"Shodan https:\/\/www.shodan.io\/  Shodan https:\/\/www.shodan.io\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Shekyan and Harutyunyan hack IOT devices in 2012 hack in box conference http:\/\/www.forbes.com\/sites\/kashmirhill\/2014\/05\/27\/article-may-scare-you-away-from-internet-of-things\/#3219002a23dd  Shekyan and Harutyunyan hack IOT devices in 2012 hack in box conference http:\/\/www.forbes.com\/sites\/kashmirhill\/2014\/05\/27\/article-may-scare-you-away-from-internet-of-things\/#3219002a23dd"},{"key":"e_1_3_2_1_5_1","unstructured":"Hackers Use Refrigerator Other Devices to Send 750 000 Spam Emails http:\/\/www.dailytech.com\/Hackers+Use+Refrigerator+Oter+Devices+to+Send+750000+Spam+Emails+\/article34161.htm  Hackers Use Refrigerator Other Devices to Send 750 000 Spam Emails http:\/\/www.dailytech.com\/Hackers+Use+Refrigerator+Oter+Devices+to+Send+750000+Spam+Emails+\/article34161.htm"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2010.15"},{"key":"e_1_3_2_1_7_1","unstructured":"Yin Minn Pa Pa Shogo Suzuki Katsunari Yoshioka Tsutomu Matsumoto Takahiro Kasama and Christian Rossow \"IoTPOT: Analysing the Rise of IoT Compromises\" 2015  Yin Minn Pa Pa Shogo Suzuki Katsunari Yoshioka Tsutomu Matsumoto Takahiro Kasama and Christian Rossow \" IoTPOT: Analysing the Rise of IoT Compromises\" 2015"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Asmitha K A and Vinod P \"A Machine Learning Approach for Linux Malware Detection\" Issues and Challenges in Intelligent Computing Techniques (ICICT) 2014 pp 825--830  Asmitha K A and Vinod P \" A Machine Learning Approach for Linux Malware Detection \" Issues and Challenges in Intelligent Computing Techniques (ICICT) 2014 pp 825--830","DOI":"10.1109\/ICICICT.2014.6781387"},{"key":"e_1_3_2_1_9_1","unstructured":"Vmware http:\/\/www.vmware.com\/  Vmware http:\/\/www.vmware.com\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Ubuntu http:\/\/www.ubuntu.com\/  Ubuntu http:\/\/www.ubuntu.com\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Snort https:\/\/www.snort.org\/  Snort https:\/\/www.snort.org\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Intrusion Detection System https:\/\/en.wikipedia.org\/wiki\/Intrusion_detection_system  Intrusion Detection System https:\/\/en.wikipedia.org\/wiki\/Intrusion_detection_system"},{"key":"e_1_3_2_1_13_1","unstructured":"Qeum http:\/\/wiki.qemu.org\/Main_Page  Qeum http:\/\/wiki.qemu.org\/Main_Page"},{"key":"e_1_3_2_1_14_1","unstructured":"C&C Server http:\/\/whatis.techtarget.com\/definition\/command-and-control-server-CC-server  C&C Server http:\/\/whatis.techtarget.com\/definition\/command-and-control-server-CC-server"},{"key":"e_1_3_2_1_15_1","unstructured":"Strace tool http:\/\/sourceforge.net\/projects\/strace\/  Strace tool http:\/\/sourceforge.net\/projects\/strace\/"},{"key":"e_1_3_2_1_16_1","unstructured":"CVE-2012-1823 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2012-1823  CVE-2012-1823 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2012-1823"},{"key":"e_1_3_2_1_17_1","unstructured":"CVE-2012--2311 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2311  CVE-2012--2311 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2311"},{"key":"e_1_3_2_1_18_1","unstructured":"CVE-2012--2335 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-233  CVE-2012--2335 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-233"},{"key":"e_1_3_2_1_19_1","unstructured":"CVE-2012--2336 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2336  CVE-2012--2336 https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2336"},{"key":"e_1_3_2_1_20_1","unstructured":"Debian https:\/\/www.debian.org\/  Debian https:\/\/www.debian.org\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Iptables https:\/\/en.wikipedia.org\/wiki\/Iptables  Iptables https:\/\/en.wikipedia.org\/wiki\/Iptables"},{"key":"e_1_3_2_1_22_1","unstructured":"Router backdoor https:\/\/wikidevi.com\/wiki\/TCP-32764  Router backdoor https:\/\/wikidevi.com\/wiki\/TCP-32764"},{"key":"e_1_3_2_1_23_1","unstructured":"G-ISAC (Government Information Sharing and Analysis Center) http:\/\/www.nccst.nat.gov.tw\/GISAC?lang=en  G-ISAC (Government Information Sharing and Analysis Center) http:\/\/www.nccst.nat.gov.tw\/GISAC?lang=en"},{"key":"e_1_3_2_1_24_1","unstructured":"Network Attached Storage https:\/\/en.wikipedia.org\/wiki\/Network-attached_storage  Network Attached Storage https:\/\/en.wikipedia.org\/wiki\/Network-attached_storage"},{"key":"e_1_3_2_1_25_1","unstructured":"Industrial Control Systems https:\/\/en.wikipedia.org\/wiki\/Industrial_control_system  Industrial Control Systems https:\/\/en.wikipedia.org\/wiki\/Industrial_control_system"},{"key":"e_1_3_2_1_26_1","unstructured":"Network Intrusion Detection System https:\/\/www.sans.org\/security-resources\/idfaq\/what-is-intrusion-detection\/1\/1  Network Intrusion Detection System https:\/\/www.sans.org\/security-resources\/idfaq\/what-is-intrusion-detection\/1\/1"},{"key":"e_1_3_2_1_27_1","unstructured":"NCCST (National Center for Cyber Security Technology) http:\/\/www.nccst.nat.gov.tw\/  NCCST (National Center for Cyber Security Technology) http:\/\/www.nccst.nat.gov.tw\/"},{"key":"e_1_3_2_1_28_1","unstructured":"TWNCERT (Taiwan National Computer Emergency Response Team) http:\/\/www.twncert.org.tw\/  TWNCERT (Taiwan National Computer Emergency Response Team) http:\/\/www.twncert.org.tw\/"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018898","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3018898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:12Z","timestamp":1750220652000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018898"}},"subtitle":["to analysis IoT malware Zollard"],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":28,"alternative-id":["10.1145\/3018896.3018898","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3018898","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}