/EIMI

Multiarchitecture platform designed for IoT malware execution, characterization and classification.

Primary LanguageHTML

EIMI

EIMI is a multiarchitecture platform designed for IoT malware execution, characterization and classification.

The spanish version of this README can be found in LÉEME.md.

Getting Started

These instructions will get you a copy of the project up and running on your local machine.

Prerequisites

In order to execute the project, the following packages are needed:

Frontend Packages:

django libvirt r2pipe paramiko termcolor dotenv scp nltk

Backend Packages:

fortawesome animate bootstrap chart.js d3 d3-scale-chromatic jquery
jquery.easing perfect-scrollbar select2

Execution

To execute the platform, the following command mut be run:

python3 eimi.py -r on|off <sample>

Changelog

The relevant changes of the project are available in CHANGELOG.md.

Contributing

Please read CONTRIBUTING.md for details on the process for submitting pull requests to us.

Contributors

The list of contributors is available in CONTRIBUTORS.md.

Wiki

For more information on how to use the platform, visit the WIKI.

License

This project is licensed under the GNU General Public License. For more information, please visit: https://www.gnu.org/licenses/licenses.en.html

Acknowledgements

uclm
i3a
cybercamp

References

E. Cozzi, M. Graziano, Y. Fratantonio and D. Balzarotti, "Understanding Linux Malware," 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2018, pp. 161-175.
PurpleBooth Ltd. (https://purplebooth.co.uk/)
Keep a Changelog (https://keepachangelog.com/en/1.0.0/)