{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:12:38Z","timestamp":1755997958500,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561463","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"472-487","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["MalNet"],"prefix":"10.1145","author":[{"given":"Ali","family":"Davanian","sequence":"first","affiliation":[{"name":"University of California Riverside"}]},{"given":"Michalis","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"University of California Riverside"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"unstructured":"[n. d.]. VirusTotal. https:\/\/www.virustotal.com.  [n. d.]. VirusTotal. https:\/\/www.virustotal.com.","key":"e_1_3_2_2_1_1"},{"unstructured":"Hungenberg Thomas and Eckert Matthias. 2022. Internet Services Simulation Suite. https:\/\/www.inetsim.org.  Hungenberg Thomas and Eckert Matthias. 2022. Internet Services Simulation Suite. https:\/\/www.inetsim.org.","key":"e_1_3_2_2_2_1"},{"unstructured":"abuse.ch. [n. d.]. About MalwareBazaar. https:\/\/bazaar.abuse.ch\/about\/.  abuse.ch. [n. d.]. About MalwareBazaar. https:\/\/bazaar.abuse.ch\/about\/.","key":"e_1_3_2_2_3_1"},{"unstructured":"Abuse.ch. [n. d.]. MalwareBazaar. https:\/\/bazaar.abuse.ch\/.  Abuse.ch. [n. d.]. MalwareBazaar. https:\/\/bazaar.abuse.ch\/.","key":"e_1_3_2_2_4_1"},{"key":"e_1_3_2_2_5_1","volume-title":"d.]. Best Dedicated Hosting Services Of","author":"Advisor Forbes","year":"2022","unstructured":"Forbes Advisor . [n. d.]. Best Dedicated Hosting Services Of 2022 . https:\/\/www.forbes.com\/advisor\/business\/software\/best-dedicated-server-hosting. Forbes Advisor. [n. d.]. Best Dedicated Hosting Services Of 2022. https:\/\/www.forbes.com\/advisor\/business\/software\/best-dedicated-server-hosting."},{"doi-asserted-by":"crossref","unstructured":"Arwa Abdulkarim Al Alsadi Kaichi Sameshima Jakob Bleier Katsunari Yoshioka Martina Lindorfer Michel van Eeten and Carlos H Ga\u00f1\u00e1n. 2022. No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. (2022).  Arwa Abdulkarim Al Alsadi Kaichi Sameshima Jakob Bleier Katsunari Yoshioka Martina Lindorfer Michel van Eeten and Carlos H Ga\u00f1\u00e1n. 2022. No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. (2022).","key":"e_1_3_2_2_6_1","DOI":"10.1145\/3488932.3517408"},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J Alex Halderman , Luca Invernizzi , Michalis Kallitsis , 2017 . Understanding the Mirai Botnet . In Proceedings of the USENIX Security Symposium. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et al. 2017. Understanding the Mirai Botnet. In Proceedings of the USENIX Security Symposium."},{"unstructured":"Big Data Cloud API. [n. d.]. Autonomous Systems (AS) advertised IPv4 space rank. https:\/\/www.bigdatacloud.com\/insights\/as-rank.  Big Data Cloud API. [n. d.]. Autonomous Systems (AS) advertised IPv4 space rank. https:\/\/www.bigdatacloud.com\/insights\/as-rank.","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC, FREENIX Track).","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, A Fast and Portable Dynamic Translator . In Proceedings of the USENIX Annual Technical Conference (ATC, FREENIX Track). Fabrice Bellard. 2005. QEMU, A Fast and Portable Dynamic Translator. In Proceedings of the USENIX Annual Technical Conference (ATC, FREENIX Track)."},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/bouwman","author":"Bouwman Xander","year":"2020","unstructured":"Xander Bouwman , Harm Griffioen , Jelle Egbers , Christian Doerr , Bram Klievink , and Michel van Eeten . 2020 . A different cup of TI? The added value of commercial threat intelligence . In Proceedings of the USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/bouwman Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, and Michel van Eeten. 2020. A different cup of TI? The added value of commercial threat intelligence. In Proceedings of the USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/bouwman"},{"doi-asserted-by":"crossref","unstructured":"Daming D Chen Maverick Woo David Brumley and Manuel Egele. 2016. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.. In NDSS.  Daming D Chen Maverick Woo David Brumley and Manuel Egele. 2016. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.. In NDSS.","key":"e_1_3_2_2_11_1","DOI":"10.14722\/ndss.2016.23415"},{"key":"e_1_3_2_2_12_1","volume-title":"USENIX Security Symposium. 95--110","author":"Costin Andrei","year":"2014","unstructured":"Andrei Costin , Jonas Zaddach , Aur\u00e9lien Francillon , Davide Balzarotti , and Sophia Antipolis . 2014 . A Large-Scale Analysis of the Security of Embedded Firmwares .. In USENIX Security Symposium. 95--110 . Andrei Costin, Jonas Zaddach, Aur\u00e9lien Francillon, Davide Balzarotti, and Sophia Antipolis. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares.. In USENIX Security Symposium. 95--110."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1109\/SP.2018.00054"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1145\/3427228.3427256"},{"unstructured":"Crowdstrike. [n. d.]. Linux-Targeted Malware Increases by 35% in 2021: XorDDoS Mirai and Mozi Most Prevalent. https:\/\/www.crowdstrike.com\/blog\/linux-targeted-malware-increased-by-35-percent-in-2021\/.  Crowdstrike. [n. d.]. Linux-Targeted Malware Increases by 35% in 2021: XorDDoS Mirai and Mozi Most Prevalent. https:\/\/www.crowdstrike.com\/blog\/linux-targeted-malware-increased-by-35-percent-in-2021\/.","key":"e_1_3_2_2_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1145\/3386367.3431317"},{"key":"e_1_3_2_2_17_1","volume-title":"CnCHunter: An MITM-Approach to Identify Live CnC Servers. Black Hat USA","author":"Davanian Ali","year":"2021","unstructured":"Ali Davanian , Ahmad Darki , and Michalis Faloutsos . 2021. CnCHunter: An MITM-Approach to Identify Live CnC Servers. Black Hat USA ( 2021 ). Ali Davanian, Ahmad Darki, and Michalis Faloutsos. 2021. CnCHunter: An MITM-Approach to Identify Live CnC Servers. Black Hat USA (2021)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1145\/3460120.3484537"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1145\/3372297.3417277"},{"key":"e_1_3_2_2_20_1","volume-title":"Entelecheia: Detecting P2P Botnets in their Waiting Stage.. In IFIP Networking.","author":"Hang Huy","year":"2013","unstructured":"Huy Hang , X. Wei , M. Faloutsos , and Tina Eliassi-Rad . 2013 . Entelecheia: Detecting P2P Botnets in their Waiting Stage.. In IFIP Networking. Huy Hang, X. Wei, M. Faloutsos, and Tina Eliassi-Rad. 2013. Entelecheia: Detecting P2P Botnets in their Waiting Stage.. In IFIP Networking."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.14722\/ndss.2019.23488"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1109\/BigData.2016.7840712"},{"key":"e_1_3_2_2_23_1","volume-title":"2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM). IEEE, 143--151","author":"Kato Seiya","year":"2021","unstructured":"Seiya Kato , Rui Tanabe , Katsunari Yoshioka , and Tsutomu Matsumoto . 2021 . Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices . In 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM). IEEE, 143--151 . Seiya Kato, Rui Tanabe, Katsunari Yoshioka, and Tsutomu Matsumoto. 2021. Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices. In 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM). IEEE, 143--151."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1145\/3355369.3355590"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1007\/978-3-319-66332-6_19"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.14722\/ndss.2020.24161"},{"key":"e_1_3_2_2_27_1","volume-title":"Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices. Black Hat USA","author":"Luo Tongbo","year":"2017","unstructured":"Tongbo Luo , Zhaoyan Xu , Xing Jin , Yanhui Jia , and Xin Ouyang . 2017 . Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices. Black Hat USA (2017). Tongbo Luo, Zhaoyan Xu, Xing Jin, Yanhui Jia, and Xin Ouyang. 2017. Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices. Black Hat USA (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_28_1","DOI":"10.1145\/2508859.2516749"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1145\/2076732.2076734"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_30_1","DOI":"10.1145\/2076732.2076736"},{"unstructured":"NFOservers. [n. d.]. NFOservers. https:\/\/www.nfoservers.com.  NFOservers. [n. d.]. NFOservers. https:\/\/www.nfoservers.com.","key":"e_1_3_2_2_31_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1007\/978-3-319-45719-2_17"},{"key":"e_1_3_2_2_33_1","volume-title":"Procedings of the USENIX Security Symposium.","author":"Ryan Court Kevin Snow Kevin Valakuzhy","year":"2021","unstructured":"Kevin Valakuzhy Ryan Court Kevin Snow Fabian Monrose Manos Antonakakis Omar Alrawi , Charles Lever . 2021 . The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle . In Procedings of the USENIX Security Symposium. Kevin Valakuzhy Ryan Court Kevin Snow Fabian Monrose Manos Antonakakis Omar Alrawi, Charles Lever. 2021. The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle. In Procedings of the USENIX Security Symposium."},{"unstructured":"pyxyp inc. [n. d.]. VulDB vulnerability database. https:\/\/vuldb.com\/?kb.about.  pyxyp inc. [n. d.]. VulDB vulnerability database. https:\/\/vuldb.com\/?kb.about.","key":"e_1_3_2_2_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_35_1","DOI":"10.1145\/3427228.3427261"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_36_1","DOI":"10.1145\/3407023.3409177"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_37_1","DOI":"10.1145\/3291061"},{"unstructured":"Valve Developer Community. 2022. Forum. https:\/\/developer.valvesoftware.com\/wiki\/Main_Page.  Valve Developer Community. 2022. Forum. https:\/\/developer.valvesoftware.com\/wiki\/Main_Page.","key":"e_1_3_2_2_38_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_39_1","DOI":"10.1007\/978-3-030-00470-5_26"},{"unstructured":"VirusTotal. [n. d.]. VirusTotal Contributors. https:\/\/support.virustotal.com\/hc\/en-us\/articles\/115002146809-Contributors.  VirusTotal. [n. d.]. VirusTotal Contributors. https:\/\/support.virustotal.com\/hc\/en-us\/articles\/115002146809-Contributors.","key":"e_1_3_2_2_40_1"},{"key":"e_1_3_2_2_41_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Zhu Shuofei","year":"2020","unstructured":"Shuofei Zhu , Jianjun Shi , Limin Yang , Boqin Qin , Ziyi Zhang , Linhai Song , and Gang Wang . 2020 . Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines . In Proceedings of the USENIX Security Symposium. Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, and Gang Wang. 2020. Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In Proceedings of the USENIX Security Symposium."},{"unstructured":"Albert Zsigovits. 2021. Mirai\/Gafgyt Fork with New DDoS Modules Discovered. https:\/\/cujo.com\/mirai-gafgyt-with-new-ddos-modules-discovered\/.  Albert Zsigovits. 2021. Mirai\/Gafgyt Fork with New DDoS Modules Discovered. https:\/\/cujo.com\/mirai-gafgyt-with-new-ddos-modules-discovered\/.","key":"e_1_3_2_2_42_1"}],"event":{"sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"],"acronym":"IMC '22","name":"IMC '22: ACM Internet Measurement Conference","location":"Nice France"},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561463","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561463"}},"subtitle":["a binary-centric network-level profiling of IoT malware"],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":42,"alternative-id":["10.1145\/3517745.3561463","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561463","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}