Skip to content

BUseclab/ZEUS_IoT

Repository files navigation

Zeus-IoT

This repository contains the code and data used in the paper "Zeus-IoT: Comprehensive Code Signing to Prevent IoT Device Weaponization." It is organized around two standalone evaluation claims (Effectiveness and Routing Impact), each with its own README, HOWTO, and EXPECTED outputs,use the links below to jump directly to the relevant materials.


Claim 1 - Effectiveness (Execution Control)

Covers enforcement against statically/dynamically linked binaries, shared objects (LD_PRELOAD) manipluation, kernel modules, Lua (inline/interactive/scripts), and shell scripts.


Claim 2 - Routing Impact (Throughput & Overhead)

Shows that routing/forwarding is unaffected; reports mean bitrate, standard deviation, and % overhead of zeus_iot vs vanilla.


Build instructions


Common scripts (root)

  • install.sh - install host prerequisites (once)
  • network_setup.sh - prepare TAPs/bridge/veth/namespace
  • run.sh - launch one OpenWRT variant: ./run.sh <zeus_iot|vanilla>
  • kill_qemu.sh - stop any running QEMU VM
  • artifact/zeus_iot/arm-openwrt.sh - QEMU launcher (Zeus_IoT)
  • artifact/vanilla/arm-openwrt.sh - QEMU launcher (Vanilla)

Note: Run only one OpenWRT variant at a time. Use ./kill_qemu.sh before switching.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published