当前位置: 首页 > article >正文

跨平台物联网漏洞挖掘算法评估框架设计与实现项目经费使用记录和参考文献

5.经费使用记录

目前暂无

参考文献:

[1] 吴世忠, 郭涛, 董国伟, 张普含, “软件漏洞分析技术, 科学出版社, 2014.
[2] Sebastian Vasile, David Oswald, and Tom Chothia, “Breaking All the Things—A Systematic Survey of Firmware Extraction Techniques for IoT Devices,” in Seventeenth Smart Card Research and Advanced Application Conference (CARDIS’18), pp. 171-185, 2018.
[3] “Binwalk,” ReFirm Labs, Inc. https://github.com/ReFirmLabs/ binwalk.
[4] “Firmware Mod Kit,” Bitsum, https://bitsum.com/firmware_mod_ kit.htm.
[5] “Binary Analysis Next Generation (BANG),” https://github.com/ armijnhemel/binaryanalysis-ng.

[6] “Mucking About With SquashFS,” Craig, http://www.devttys0. com/2014/08/mucking-about-with-squashfs/ Aug, 2014

[7] Sam L. Thomas, Flavio D. Garcia, Tom Chothia, “HumIDIFy: A Tool for Hidden Functionality Detection in Firmware,” in International conference on detection of intrusions and malware, and vulnerability assessment(DIMVA’17), pp. 279-300, 2017.

[8] “Ida: About - hex-ray,” https://www.hex-rays.com/products/ida/index.shtml.

[9] Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Audrey Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna, “SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis,” in Proc. of IEEE Symposium on Security and Privacy (S&P’16), pp. 138-157, 2016.

[10] Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna, “Firmalice-automatic detection of authentication bypass vulnerabilities in binary fifirmware,” in Network and Distributed System Security Symposium (NDSS’15), 2015.

[11] Sam L. Thomas, Tom Chothia, Flavio D. Garcia, "Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality." European Symposium on Research in Computer Security (ESORICS‘17), pp. 513-531, 2017.

[12] Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, and Zhenkai Liang, “DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware,” in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’18), pp. 430-441, 2018.

[13] Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Auré-lien Francillon, and Davide Balzarotti, “PIE: Parser identifification in embedded systems,” in Annual Computer Security Applications Conference (ACSAC’15), 2015.

[14] Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu and Limin Sun, “A Lightweight Method for Accelerating Discovery ofTaint-Style Vulnerabilities in Embedded Systems,” in International Conference on Information and Communication Security(ICICS’16), pp. 27-36, 2016.


http://www.kler.cn/a/522123.html

相关文章:

  • 如何将 Windows 上的文件传递到 Mac 上
  • 大数据相关职位介绍之二(数据治理,数据库管理员, 数据资产管理师,数据质量专员)
  • mac安装dockerdesktop优化
  • 【Rust自学】15.7. 循环引用导致内存泄漏
  • MV结构下设置Qt表格的代理
  • 腾讯云开发提供免费GPU服务
  • 除了layui.js还有什么比较好的纯JS组件WEB UI?在谷歌浏览上显示
  • 【2025年最新版】Java JDK安装、环境配置教程 (图文非常详细)
  • java构建工具之Gradle
  • 【AI论文】FilmAgent: 一个用于虚拟3D空间中端到端电影制作自动化的多智能体框架
  • 常用的npm镜像源配置方法
  • 刀客doc:禁令影响下,TikTok广告业务正在被对手截胡
  • JVM垃圾回收器的原理和调优详解!
  • 深圳大学-智能网络与计算-实验四:云-边协同计算实验
  • Java多线程与高并发专题——保障可见性和有序性
  • 分布式组件底层逻辑是什么?
  • 在计算机上本地运行 Deepseek R1
  • Couchbase UI: Bucket
  • 小程序 uniapp 地图 自定义内容呈现,获取中心点,获取对角经纬度,首次获取对角经纬度
  • 蓝桥村打花结的花纸选择问题
  • 菜鸟之路Day08一一集合进阶(一)
  • 【数据结构】 并查集 + 路径压缩与按秩合并 python
  • vue事件总线(原理、优缺点)
  • Kafka 深入服务端 — 时间轮
  • 利用JSON数据类型优化关系型数据库设计
  • C语言字符串详解