IoT Security: Malware Forensics

  • Online

This course was developed by IEEE Educational Activities with the support from IEEE Internet of Things Technical Community. In this course, we focus on IoT Malware Forensics. The course is structured in two parts. In the first part, we will examine IoT Malware and IoT Malware forensics from a high-level perspective. In the second part, we’ll learn how to apply IoT Malware forensics to a real-world IoT malware while using Mirai as a case study. Mirai was the most well-known IoT Botnet that hijacked and weaponized millions of IoT devices for launching DDoS attacks.

What you will learn:

  • Introduce IoT Malware
  • Discuss IoT Malware forensics
  • Examine a case study: Mirai (a real-world IoT Botnet)

This course is part of the following course program

All About IoT Security

Courses included in this program:

Who should attend: Electrical Engineer, Design Engineer, Communications Systems Engineer, Product Engineer, Computer Engineer, Software Engineer, Project Engineer
Software/Security Engineer, AI/ML Engineer


Xiaolu Zhang Photo

Xiaolu Zhang

Dr. Zhang is an associate professor of practice in the department of information systems and cybersecurity at the University of Texas at San Antonio (UTSA). His research interest is in the wide field of cybersecurity and forensics. His work has been published in the industry’s top-tier journals and shared at conferences addressing numerous fields such as mobile phone security and forensics, Internet of Things (IoT) forensics, IoT malware forensic analysis and distributed cloud security and forensics. He has been teaching operating system security, reverse engineering, digital forensic analysis and other classes in various institutions for several years. Zhang received his Ph.D. in computer science from Jilin University, Changchun, China, in 2016. Prior to his current position, he was a visiting Ph.D. student at the University of New Haven, West Haven, CT, USA, and a postdoc researcher at UTSA. In addition, he was the recipient of a China Scholarship Council Scholarship for his doctoral work as well as the winner of UTSA's Endowed 1969 Commemorative Award for Teaching Excellence.

Kim-Kwang Raymond Choo Photo

Kim-Kwang Raymond Choo

Raymond Choo received a Ph.D. in information security in 2006 from Queensland University of Technology, Australia. He currently holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio. He is the founding co-editor-in-chief of ACM Distributed Ledger Technologies: Research and Practice, and the founding Chair of IEEE Technology and Engineering Management Society Technical Committee (TC) on Blockchain and Distributed Ledger Technologies. He is the recipient of the 2022 IEEE Hyper-Intelligence TC Award for Excellence in Hyper-Intelligence Systems (Technical Achievement Award), the 2022 IEEE TC on Homeland Security Research and Innovation Award, the 2022 IEEE TC on Secure and Dependable Measurement Mid-Career Award, and the 2019 IEEE TC on Scalable Computing Award for Excellence in Scalable Computing (Middle Career Researcher).

Publication Year: 2023

ISBN: 978-1-7281-7839-4

IoT Security: Malware Forensics
  • Course Provider: Educational Activities
  • Course Number: EDP696
  • Duration (Hours): 1
  • Credits: 0.1 CEU/ 1 PDH