跨平台物联网漏洞挖掘算法评估框架与实现结题报告 参考文献

参考文献

[1] 吴世忠, 郭涛, 董国伟, 张普含, “软件漏洞分析技术, 科学出版社, 2014.
[2] Sebastian Vasile, David Oswald, and Tom Chothia, “Breaking All the Things—A Systematic Survey of Firmware Extraction Techniques for IoT Devices,” in Seventeenth Smart Card Research and Advanced Application Conference (CARDIS’18), pp. 171-185, 2018.
[3] “Binwalk,” ReFirm Labs, Inc. https://github.com/ReFirmLabs/ binwalk.
[4] “Firmware Mod Kit,” Bitsum, https://bitsum.com/firmware_mod_ kit.htm.
[5] “Binary Analysis Next Generation (BANG),” https://github.com/ armijnhemel/binaryanalysis-ng.

[6] “Mucking About With SquashFS,” Craig, http://www.devttys0. com/2014/08/mucking-about-with-squashfs/ Aug, 2014

[7] Sam L. Thomas, Flavio D. Garcia, Tom Chothia, “HumIDIFy: A Tool for Hidden Functionality Detection in Firmware,” in International conference on detection of intrusions and malware, and vulnerability assessment(DIMVA’17), pp. 279-300, 2017.

[8] “Ida: About - hex-ray,” https://www.hex-rays.com/products/ida/index.shtml.

[9] Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Audrey Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna, “SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis,” in Proc. of IEEE Symposium on Security and Privacy (S&P’16), pp. 138-157, 2016.

[10] Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna, “Firmalice-automatic detection of authentication bypass vulnerabilities in binary fifirmware,” in Network and Distributed System Security Symposium (NDSS’15), 2015.

[11] Sam L. Thomas, Tom Chothia, Flavio D. Garcia, "Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality." European Symposium on Research in Computer Security (ESORICS‘17), pp. 513-531, 2017.

[12] Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, and Zhenkai Liang, “DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware,” in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’18), pp. 430-441, 2018.

[13] Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Auré-lien Francillon, and Davide Balzarotti, “PIE: Parser identifification in embedded systems,” in Annual Computer Security Applications Conference (ACSAC’15), 2015.

[14] Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu and Limin Sun, “A Lightweight Method for Accelerating Discovery ofTaint-Style Vulnerabilities in Embedded Systems,” in International Conference on Information and Communication Security(ICICS’16), pp. 27-36, 2016.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值