Abstract: Attacks towards the Internet of Things (IoT) devices are on the rise. To enable precaution and countermeasure against IoT malware, we present a cross-platform analysis of IoT malware ...
Note that although the file size did not change during steps 3-5, the entropy decreased, indicating more zeros within the file, thereby providing more compression opportunities for subsequent steps.