Data underlying the publication: “No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis”

doi:10.4121/19248725.v1
The doi above is for this specific version of this dataset, which is currently the latest. Newer versions may be published in the future. For a link that will always point to the latest version, please use
doi: 10.4121/19248725
Datacite citation style:
Al Alsadi, Arwa (2022): Data underlying the publication: “No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis”. Version 1. 4TU.ResearchData. dataset. https://doi.org/10.4121/19248725.v1
Other citation styles (APA, Harvard, MLA, Vancouver, Chicago, IEEE) available at Datacite
Dataset
Delft University of Technology logo
usage stats
1189
views
221
downloads
keywords
binaries, dataset, pcaps
licence
cc-by.png logo CC BY 4.0
This includes: - Datasets: The three datasets used in this research (Urlhaus, Honeypot and Genealogy)
- Scripts: Scripts used to search for exploits signatures and vulnerability matching
- PCAPs: Network traffic captures
- Exploit signatures: the exploits signatures found in the three datasets
- Vulnerability information: List of all the corresponding vulnerabilities for the exploits found
history
  • 2022-03-01 first online, published, posted
publisher
4TU.ResearchData
format
Zip; csv; py
organizations
TU Delft, Faculty of Technology, Policy and Management, Department of Multi Actor Systems.

DATA

files (1)