Malware Threat Hunting in IoT and IIoT Environments
The ever-increasing connection between public networks and the Industrial Internet of Things (IIoT) that form a significant portion of our critical infrastructure offers new opportunities for cybercriminals and state-sponsored Advanced Persistent Threat (APT) actors. The significant number and diversity of Internet-connected IoT devices that are monitoring and controlling our pipelines, turbines, smart grids, smart transport systems, etc. result in a large and complex attack surface that must be continuously monitored and protected. Exploit-kits, ransomware, and malware are the main tools in the attackers’ arsenal when targeting IIoT networks. This talk starts with discussing why classic cybersecurity defense mechanisms such as patching, password management, etc. are not effective in protecting IoT systems against malicious payloads and why cyber threat hunting is the most effective detection and deterrence strategy. It then presents several state-of-the-art malware and ransomware threat hunting systems and suggests future research directions in the field.
Mon 13 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
13:15 - 15:00 | International Workshop on Software Security Session 1International Workshop on Software Security at Software Security Virtual Room Chair(s): Mahmood Niazi King Fahd University of Petroleum and Minerals | ||
13:15 15mTalk | Workshop opening International Workshop on Software Security | ||
13:30 60mTalk | Malware Threat Hunting in IoT and IIoT Environments International Workshop on Software Security Ali Dehghantanha University of Guelph | ||
14:30 30mTalk | Paper 1 - EVSec: An Approach to Extract and Visualize Security Scenarios from System Logs International Workshop on Software Security |
Link to join session 1: https://us06web.zoom.us/j/83639875839?pwd=V1p1Z2pHRUp5QjNpRWdSWU9qMnlXZz09
Link to join session 2: https://us06web.zoom.us/j/85818817239?pwd=SW42V2tOcHdlY0o5OStQNFk3WUY4UT09