Research Article

Automatic Analysis Architecture of IoT Malware Samples

Figure 4

Clusters generated for the MIPS (a), PowerPC (b), x64 (c), x86 (d), and ARM (e) architectures using cyclomatic complexity and the custom function described in Section 3.
(a)
(b)
(c)
(d)
(e)