| [1] | 
																						 
											 国家工业信息安全产业发展联盟.工业信息安全态势白皮书(2017年)[EB/OL].[2018-03-10].https://max.book 118.com/html/2018/1007/5043141300001320.shtm.
											 											 | 
										
																													
																						| [2] | 
																						 
											 ZHU B,JOSEPH A,SASTRY S.A taxonomy of cyber attacks on SCADA systems[C]//Proceedings of 2011 International Conference on Internet of Things and 4th International Conference on Cyber,Physical and Social Computing.Washington D.C.,USA:IEEE Press,2012:380-388.
											 											 | 
										
																													
																						| [3] | 
																						 
											 BODUNGEN C E,SINGER B L,SHBEEB A,等.黑客大曝光:工业控制系统安全[M].戴超,张鹿,译.北京:机械工业出版社,2017.
											 											 | 
										
																													
																						| [4] | 
																						 
											 陶耀东,李宁,曾广圣.工业控制系统安全综述[J].计算机工程与应用,2016,52(13):8-18.
											 											 | 
										
																													
																						| [5] | 
																						 
											 彭勇,江常青,谢丰,等.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408.
											 											 | 
										
																													
																						| [6] | 
																						 
											 王炎,刘嘉勇,刘亮,等.漏洞利用工具研发框架研究[J].计算机工程,2018,44(3):127-131.
											 											 | 
										
																													
																						| [7] | 
																						 
											 严俊龙.基于Metasploit框架自动化渗透测试研究[J].信息网络安全,2013(2):53-56.
											 											 | 
										
																													
																						| [8] | 
																						 
											 姚宇,祝烈煌,武传坤.工业控制网络安全技术与实践[M].北京:机械工业出版社,2017.
											 											 | 
										
																													
																						| [9] | 
																						 
											 屈婉莹,魏为民,朱苏榕.工业控制系统通信协议安全研究[C]//全国智能电网用户端能源管理学术年会.上海:出版者不详,2015:220-224.
											 											 | 
										
																													
																						| [10] | 
																						 
											 冯涛,鲁晔,方君丽.工业以太网协议脆弱性与安全防护技术综述[J].通信学报,2017,38(增刊):185-196.
											 											 | 
										
																													
																						| [11] | 
																						 
											 SHAHZAD A,LEE M,LEE Y K,et al.Realtime MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information[J].Symmetry,2015,7(3):1176-1210.
											 											 | 
										
																													
																						| [12] | 
																						 
											 HUITSING P,CHANDIA R,PAPA M,et al.Attack taxonomies for the Modbus protocols[J].International Journal of Critical Infrastructure Protection,2008,1(1):37-44.
											 											 | 
										
																													
																						| [13] | 
																						 
											 VAIDYA B,MAKRAKIS D,MOUFTAH H T.Authentication and authorization mechanisms for substation automation in smart grid network[J].IEEE Network,2013,27(1):5-11.
											 											 | 
										
																													
																						| [14] | 
																						 
											 PREMNATH A P,JO J Y,KIM Y.Application of NTRU cryptographic algorithm for SCADA security[C]//Proceedings of International Conference on Information Technology:New Generations.Washington D.C.,USA:IEEE Press,2014:341-346.
											 											 | 
										
																													
																						| [15] | 
																						 
											 张环宇,陈凯.基于零动态的工控系统攻击检测识别安全模型[J].计算机工程,2017,43(10):98-103.
											 											 | 
										
																													
																						| [16] | 
																						 
											 FORMBY D,SRINIVASAN P,LEONARD A,et al.Who's in control of your control system? device fingerprinting for cyber-physical systems[C]//Proceedings of Network and Distributed System Security Symposium.San Diego,USA:IEICE,2016:1-15.
											 											 | 
										
																													
																						| [17] | 
																						 
											 李伟.基于Modbus协议的工控节点设计与实现[J].计算机工程,2010,36(16):226-228.
											 											 | 
										
																													
																						| [18] | 
																						 
											 司马莉萍,贺贵明,陈明榜.基于Modbus/TCP协议的工业控制通信[J].计算机应用,2005,25(z1):29-31.
											 											 | 
										
																													
																						| [19] | 
																						 
											 BOSSERT G,HIET G.Towards automated protocol reverse engineering using semantic information[C]//Proceedings of ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2014:51-62.
											 											 | 
										
																													
																						| [20] | 
																						 
											 DUCHÊNE J,GUERNIC C L,ALATA E,et al.State of the art of network protocol reverse engineering tools[J].Journal of Computer Virology and Hacking Techniques,2017(2):1-16.
											 											 | 
										
																													
																						| [21] | 
																						 
											 ANTROBUS R,FREY S,GREEN B,et al.SimaticScan:towards a specialised vulnerability scanner for industrial control systems[C]//Proceedings of the 4th International Symposium on ICS and SCADA Cyber Security Research.Belfast,UK:[s.n.],2016:1-8.
											 											 | 
										
																													
																						| [22] | 
																						 
											 VOYIATZIS A G,KATSIGIANNIS K,KOUBIAS S.A Modbus/TCP fuzzer for testing Internet worked industrial systems[C]//Proceedings of IEEE Conference on Emerging Technologies and Factory Automation.Washington D.C.,USA:IEEE Press,2015:1-6.
											 											 | 
										
																													
																						| [23] | 
																						 
											 张亚丰,洪征,吴礼发,等.基于范式语法的工控协议Fuzzing测试技术[J].计算机应用研究,2016,33(8):2433-2439.
											 											 | 
										
																													
																						| [24] | 
																						 
											 VARGAS C,LANGFINGER M,VOGEL-HEUSER B.A tiered security analysis of industrial control system devices[C]//Proceedings of IEEE International Conference on Industrial Informatics.Washington D.C.,USA:IEEE Press,2017:399-404.
											 											 | 
										
																													
																						| [25] | 
																						 
											 詹静,杨静.基于远程证明的可信Modbus/TCP协议研究[J].四川大学学报(工程科学版),2017,49(1):197-205.
											 											 |