Research Article
Automatic Analysis Architecture of IoT Malware Samples
Figure 4
Clusters generated for the MIPS (a), PowerPC (b), x64 (c), x86 (d), and ARM (e) architectures using cyclomatic complexity and the custom function described in Section 3.
(a) |
(b) |
(c) |
(d) |
(e) |