Data underlying the publication: “No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis”
doi:10.4121/19248725.v1
The doi above is for this specific version of this dataset, which is currently the latest. Newer versions may be published in the future.
For a link that will always point to the latest version, please use
doi: 10.4121/19248725
doi: 10.4121/19248725
Datacite citation style:
Al Alsadi, Arwa (2022): Data underlying the publication: “No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis”. Version 1. 4TU.ResearchData. dataset. https://doi.org/10.4121/19248725.v1
Other citation styles (APA, Harvard, MLA, Vancouver, Chicago, IEEE) available at Datacite
Dataset
This includes: - Datasets: The three datasets used in this research (Urlhaus, Honeypot and Genealogy)
- Scripts: Scripts used to search for exploits signatures and vulnerability matching
- PCAPs: Network traffic captures
- Exploit signatures: the exploits signatures found in the three datasets
- Vulnerability information: List of all the corresponding vulnerabilities for the exploits found
- Scripts: Scripts used to search for exploits signatures and vulnerability matching
- PCAPs: Network traffic captures
- Exploit signatures: the exploits signatures found in the three datasets
- Vulnerability information: List of all the corresponding vulnerabilities for the exploits found
history
- 2022-03-01 first online, published, posted
publisher
4TU.ResearchData
format
Zip; csv; py
associated peer-reviewed publication
No Spring Chicken: Quantifying the Lifespan of Exploits in IoTMalware Using Static and Dynamic Analysis
organizations
TU Delft, Faculty of Technology, Policy and Management, Department of Multi Actor Systems.
DATA
files (1)
- 10,297,520,865 bytesMD5:
1bb89786c83ddc68d754b974cc0f73ff
No-Spring-Chicken-Quantifying-the-Lifespan-of-Exploits-in-IoTMalware-Using-Static-and-Dynamic-Analy.zip -
download all files (zip)
10,297,520,865 bytes unzipped