论文标题

对你来说很难,但对我来说却不是:衡量修复持续性IoT恶意软件的困难和用户经验

Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware

论文作者

Rodríguez, Elsa, Fukkink, Max, Parkin, Simon, van Eeten, Michel, Gañán, Carlos

论文摘要

消费者IoT设备可能会遭受恶意软件攻击,并将其招募到僵尸网络中或更糟。有证据表明,对设备所有者解决物联网恶意软件的通用建议可以成功地解决IoT恶意软件,但这并不能说明持久性IoT恶意软件的新兴形式。关于持久性恶意软件的了解,该恶意软件存在持续存储,需要针对性的手动努力将其删除。本文介绍了一项有关消费者删除持久性IoT恶意软件的现场研究。我们与ISP合作,将760个恶意软件类别的760个客户的对比处理时间:Windows恶意软件,非持久性IoT恶意软件和持久性IoT恶意软件。我们还联系了ISP客户,该客户在其网络附加的存储设备(特别是QSnatch)上具有持久的物联网恶意软件。我们发现,持续的物联网恶意软件表现出平均感染时间比Windows或Mirai恶意软件高很多倍。 Qsnatch的生存率在180天后的生存率为30%,因此大多数(如果不是所有其他观察到的恶意软件)已被删除。对于接受采访的设备用户,Qsnatch感染持续了更长的时间,因此显然很难摆脱,但参与者并没有报告遵循通知说明的困难。我们看到有两个因素推动了这一矛盾的发现:首先,大多数用户报告具有很高的技术能力。此外,我们发现了针对这些任务的计划行为的证据以及需要多次通知的需求。我们的发现证明了外部从外部进行持续恶意软件的批判性质,因为像我们习惯于用于Windows恶意软件和Mirai感染的AV工具或动力周期的自动扫描不会解决持久性的IoT恶意软件感染。

Consumer IoT devices may suffer malware attacks, and be recruited into botnets or worse. There is evidence that generic advice to device owners to address IoT malware can be successful, but this does not account for emerging forms of persistent IoT malware. Less is known about persistent malware, which resides on persistent storage, requiring targeted manual effort to remove it. This paper presents a field study on the removal of persistent IoT malware by consumers. We partnered with an ISP to contrast remediation times of 760 customers across three malware categories: Windows malware, non-persistent IoT malware, and persistent IoT malware. We also contacted ISP customers identified as having persistent IoT malware on their network-attached storage devices, specifically QSnatch. We found that persistent IoT malware exhibits a mean infection duration many times higher than Windows or Mirai malware; QSnatch has a survival probability of 30% after 180 days, whereby most if not all other observed malware types have been removed. For interviewed device users, QSnatch infections lasted longer, so are apparently more difficult to get rid of, yet participants did not report experiencing difficulty in following notification instructions. We see two factors driving this paradoxical finding: First, most users reported having high technical competency. Also, we found evidence of planning behavior for these tasks and the need for multiple notifications. Our findings demonstrate the critical nature of interventions from outside for persistent malware, since automatic scan of an AV tool or a power cycle, like we are used to for Windows malware and Mirai infections, will not solve persistent IoT malware infections.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源