Data underlying the publication: “No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis”

DOI:10.4121/19248725.v1
The DOI displayed above is for this specific version of this dataset, which is currently the latest. Newer versions may be published in the future. For a link that will always point to the latest version, please use
DOI: 10.4121/19248725

Datacite citation style

Al Alsadi, Arwa (2022): Data underlying the publication: “No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis”. Version 1. 4TU.ResearchData. dataset. https://doi.org/10.4121/19248725.v1
Other citation styles (APA, Harvard, MLA, Vancouver, Chicago, IEEE) available at Datacite

Dataset

Delft University of Technology logo

Usage statistics

1336
views
254
downloads

Licence

CC BY 4.0

Interoperability

This includes: - Datasets: The three datasets used in this research (Urlhaus, Honeypot and Genealogy)
- Scripts: Scripts used to search for exploits signatures and vulnerability matching
- PCAPs: Network traffic captures
- Exploit signatures: the exploits signatures found in the three datasets
- Vulnerability information: List of all the corresponding vulnerabilities for the exploits found

History

  • 2022-03-01 first online, published, posted

Publisher

4TU.ResearchData

Format

Zip; csv; py

Organizations

TU Delft, Faculty of Technology, Policy and Management, Department of Multi Actor Systems.

DATA