Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware

Elsa Rodriguez, Max Fukkink, Simon Parkin, Michel Van Eeten, Carlos Ganan

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)
40 Downloads (Pure)

Abstract

Consumer IoT devices may suffer malware attacks, and be recruited into botnets or worse. There is evidence that generic advice to device owners to address IoT malware can be successful, but this does not account for emerging forms of persistent IoT malware. Less is known about persistent malware, which resides on persistent storage, requiring targeted manual effort to remove it. This paper presents a field study on the removal of persistent IoT malware by consumers. We partnered with an ISP to contrast remediation times of 760 customers across three malware categories: Windows malware, non-persistent IoT malware, and persistent IoT malware. We also contacted ISP customers identified as having persistent IoT malware on their network-attached storage devices, specifically QSnatch. We found that persistent IoT malware exhibits a mean infection duration many times higher than Windows or Mirai malware; QSnatch has a survival probability of 30% after 180 days, whereby most if not all other observed malware types have been removed. For interviewed device users, QSnatch infections lasted longer, so are apparently more difficult to get rid of, yet participants did not report experiencing difficulty in following notification instructions. We see two factors driving this paradoxical finding: First, most users reported having high technical competency. Also, we found evidence of planning behavior for these tasks and the need for multiple notifications. Our findings demonstrate the critical nature of interventions from outside for persistent malware, since automatic scan of an AV tool or a power cycle, like we are used to for Windows malware and Mirai infections, will not solve persistent IoT malware infections.
Original languageEnglish
Title of host publicationProceedings - 7th IEEE European Symposium on Security and Privacy, Euro S and P 2022
PublisherIEEE
Pages392-409
Number of pages18
ISBN (Electronic)9781665416146
DOIs
Publication statusPublished - 2022
Event7th IEEE European Symposium on Security and Privacy, Euro S and P 2022 - Genoa, Italy
Duration: 6 Jun 202210 Jun 2022

Publication series

NameProceedings - 7th IEEE European Symposium on Security and Privacy, Euro S and P 2022

Conference

Conference7th IEEE European Symposium on Security and Privacy, Euro S and P 2022
Country/TerritoryItaly
CityGenoa
Period6/06/2210/06/22

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • IoT malware remediation
  • IoT security
  • notifications
  • persistent IoT malware
  • QSnatch

Fingerprint

Dive into the research topics of 'Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware'. Together they form a unique fingerprint.

Cite this