Request

* required
If you are student, input your supervisor's name
(If your team consists of people from multiple organizations), please list a person from each organization in the box below and make sure that the listed people accept the terms of use below.
Your SSH public key to access our file server
Terms of use
  1. You understand that the Dataset contains malicious contents such as malware binaries and/or malicious URLs.
  2. You warrant that you have requisite skill to safely handle the malicious contents in the Dataset.
  3. You agree not to use the Dataset for any illegal or harmful purposes.
  4. You agree not to publicly display or perform, republish, upload, post, transmit, resell, distribute, or otherwise share or make accessible any portions of the Dataset to a third party.
  5. We may modify these Terms of Use from time to time by posting a modified version on [https://sec.ynu.codes/requests/new], and all modifications to these Terms of Use will become effective upon your subsequent access and use of the Dataset.
  6. Your ACCESS TO AND USE OF THE DATASET IS AT your OWN RISK. YOU UNDERSTAND AND AGREE THAT THE DATASET IS PROVIDED WITHOUT REPRESENTATION OR WARRANTY.
  7. TO THE MAXIMUM EXTENT PERMITTED BY LAW, WE WILL NOT BE LIABLE FOR ANY LOSS OR DAMAGE CAUSED BY THE USE OF THE DATASET.
  8. You allow us to include the name of your organization in the list of organizations with whom we shared the Dataset at [https://sec.ynu.codes/iot/organizations].
  9. Please notify us by sending email to ynugr-iotics[atmark]ynu.ac.jp when you publish a research paper and/or an article using the Dataset.
  10. Please cite the Dataset by referring following papers in your publication that uses the Dataset.
    • Yin Minn Pa Pa, Suzuki Shogo, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats," Journal of Information Processing, Vol.57, No. 4, 2016.
    • Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, and Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow, "IoTPOT: Analysing the Rise of IoT Compromises," 9th USENIX Workshop on Offensive Technologies (USENIX WOOT 2015), 2015.

We will not use your personal information filled in the Request form for any purpose other than responding to your request. Please note that we will publicize the list of organizations to which we have provided the dataset.