Data underlying the publication: “No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis”

DOI:10.4121/19248725.v1
The DOI displayed above is for this specific version of this dataset, which is currently the latest. Newer versions may be published in the future. For a link that will always point to the latest version, please use
DOI: 10.4121/19248725
Datacite citation style:
Al Alsadi, Arwa (2022): Data underlying the publication: “No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis”. Version 1. 4TU.ResearchData. dataset. https://doi.org/10.4121/19248725.v1
Other citation styles (APA, Harvard, MLA, Vancouver, Chicago, IEEE) available at Datacite

Dataset

Delft University of Technology logo

Usage statistics

1189
views
221
downloads

Licence

CC BY 4.0
This includes: - Datasets: The three datasets used in this research (Urlhaus, Honeypot and Genealogy)
- Scripts: Scripts used to search for exploits signatures and vulnerability matching
- PCAPs: Network traffic captures
- Exploit signatures: the exploits signatures found in the three datasets
- Vulnerability information: List of all the corresponding vulnerabilities for the exploits found

History

  • 2022-03-01 first online, published, posted

Publisher

4TU.ResearchData

Format

Zip; csv; py

Organizations

TU Delft, Faculty of Technology, Policy and Management, Department of Multi Actor Systems.

DATA