OAK

Security Vulnerability Assessment and Malware Analysis for Next-Generation ICT Technologies : Focused on the case of Cryptocurrency and IoT

Metadata Downloads
Alternative Title
Security Vulnerability Assessment and Malware Analysis for Next-Generation ICT Technologies : Focused on the case of Cryptocurrency and IoT
Abstract
In the Fourth Industrial Revolution society, the next-generation ICT technologies are increasingly indispensable across diverse fields such as finance, transportation, and public institutions. For example, blockchain technology, renowned for its attributes of anonymity, reliability, and security, stands out as a representative example of its integration into various applications, including cryptocurrencies and decentralized exchanges. Similarly, the Internet of Things (IoT) occupies a significant position as one of the key elements in a hyper-connected society. It manifests itself through smart homes, connected cars, and drones, among others. Despite of the widespread adoption of these technologies, however, there remains a need for the evaluation and assessment of their security aspects. In particular, the rise of malware that exploits cryptocurrencies, such as ransomware and crypto-miners, is impacting the next generation of ICT technologies, including IoT.
This study classifies malware that monetizes cryptocurrency into Advanced Persistent Threats (APTs) and non-APTs, and analyzes each malware in terms of cryptocurrency exploitation and damage scale to derive their characteristics. Furthermore, an IoT drone is specifically chosen to simulate an attack scenario targeting remote update technology. The study aims to investigate the possibility of deliberately delaying Over-The-Air (OTA) updates, hindering the installation of the latest firmware patches on IoT devices. Finally, by examining attack traces from a memory forensics perspective, the research highlights the potential for forensic analysis in future attacks.| 4차산업혁명 사회에서 차세대 ICT 기술은 금융, 교통, 공공기관 등 다양한 분야에서 필수적인 요소로 자리 잡고 있다. 일례로 블록체인 기술은 익명성, 신뢰성, 보안성 등을 바탕으로 암호화폐나 탈중앙화 거래소를 비롯하여 여러 기술에 접목되고 있으며, 사물인터넷(Internet of Things, IoT) 또한 스마트홈, 커넥티드카, 드론 등의 형태로 초연결사회의 주요 요소로써 활용되고 있다. 그러나, 이러한 보편성에도 불구하고 여전히 해당 기술들에 대한 보안성 점검 및 검토의 필요성이 요구되는 실정이다. 특히, 랜섬웨어 또는 크립토마이너 (crypto-miner)와 같이 암호화폐를 악용하는 악성코드가 증가하면서, IoT를 비롯한 차세대 ICT 기술들에도 영향을 미치고 있다.
본 연구는 암호화폐로 수익을 창출하는 악성코드를 APT (Advanced Persistent Threats)와 non-APT로 분류하고, 각 악성코드의 암호화폐 악용 및 피해 규모 측면을 중점으로 분석하여 각각의 특징을 도출한다. 또한, IoT 드론을 선정하여 원격 업데이트 기술에 대한 모의 공격 시나리오를 구현하고, 최종적으로 OTA 업데이트를 지연시켜 IoT 기기의 최신 펌웨어 패치를 방해하는 연구를 수행한다. 이후, 메모리 포렌식 관점에서 공격 흔적을 도출하여 향후 공격에 대한 포렌식 가능성을 보인다.
Author(s)
백지연
Issued Date
2023
Awarded Date
2023-08
Type
Dissertation
URI
https://repository.sungshin.ac.kr/handle/2025.oak/1850
http://dcollection.sungshin.ac.kr/common/orgView/000000014767
Alternative Author(s)
Baek, Jiyeon
Affiliation
성신여자대학교 일반대학원
Department
일반대학원 미래융합기술공학과
Advisor
김성민
Table Of Contents
Ⅰ. Introduction 1
Ⅱ. On the Analysis of Recent Malware Attacks and its Social Ramification 3
1. Introduction 3
2. Background 5
1) Cryptocurrency 5
2) Cryptojacking 7
3) Clipboard Hijacking 8
4) Ransomware as a Service (RaaS) 9
3. Malware classification: APT vs non-APT 10
4. Non-APT Malware 15
1) HackBoss Malware 15
2) Crackonosh Malware 16
3) Magniber Malware 17
4) Phorpiex and Twizt Malware 17
5) Mykings Malware 18
6) Dridex Malware 19
7) Summary 20
5. APT Malware 22
1) The Case of Attack on KLAYSwap Service 22
2) Blackcat Malware 23
3) BlackMatter Malware 23
4) Phoenix Cryptolocker Malware 24
5) Darkside Malware 25
6) Cuba Malware 26
7) Conti Malware 27
8) Lockbit Malware 28
9) REvil(Sodinokibi) Malware 28
10) Netwalker Malware 29
11) Clop Malware 30
12) Lockergoga Malware 31
13) Ryuk Malware 32
14) Summary 32
6. Discussion and Related Policy 35
1) Summary of Analysis 35
2) Related Policy 36
7. Summary 39
Ⅲ. A Study on Vulnerability Analysis and Memory Forensics of ESP32 40
1. Introduction 40
2. Related work 43
3. Simulation of OTA attack scenario 45
1) Cracking Wireless Access Point 47
2) OTA update packet sniffing 48
3) TCP SYN Flooding attack during OTA update 50
4. ESP32 Memory Analysis 52
1) ESP32 Memory Structure 52
2) Memory Dump Analysis 54
5. Summary 59
Ⅳ. Conclusion 60
Degree
Master
Publisher
성신여자대학교 일반대학원
Appears in Collections:
미래융합기술공학과 > 학위논문
공개 및 라이선스
  • 공개 구분공개
  • 엠바고2023-08-25
파일 목록

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.