[1] 物联网安全创新实验室.物联网终端安全白皮书(2019)[EB/OL].[2020-07-05].https://baijiahao.baidu.com/s?id=1650552509318730842픴=spider&for=pc. IoT Security Innovation Laboratory.IoT terminal security white paper(2019)[EB/OL].[2020-07-05].https://baijiahao.baidu.com/s?id=1650552509318730842픴=spider&for=pc.(in Chinese) [2] 中国信息通信研究院.物联网安全白皮书[EB/OL].[2020-07-05].http://www.cbdio.com/BigData/2018-09/25/content_5847152.htm. China Institute of Information and Communication.White paper on Internet of things security[EB/OL].[2020-07-05].http://www.cbdio.com/BigData/2018-09/25/content_5847152.htm.(in Chinese) [3] 2018年物联网安全及应用领域深度分析报告[EB/OL].[2020-07-05].https://wenku.baidu.com/view/40b64e8329ea81c758f5f61fb7360b4c2e3f2ad8.html. In depth analysis report on security and application field of Internet of things in 2018[EB/OL].[2020-07-05].https://wenku.baidu.com/view/40b64e8329ea81c758f5f61fb7360b4c2e3f2ad8.html.(in Chinese) [4] 2019物联网安全年报[EB/OL].[2020-07-05].http://vr.sina.com.cn/2020-05-12/doc-iircuyvi2649144.shtml. 2019 Internet of things security annual report[EB/OL].[2020-07-05].http://vr.sina.com.cn/2020-05-12/doc-iircuyvi2649144.shtml.(in Chinese) [5] SAEED N,TAREQ Y,AL-NAFFOURI,et al.Toward the Internet of underground things:a systematic survey[J].IEEE Communications Surveys & Tutorials 2019,21:3443-3466. [6] Talking about the safety of camera[EB/OL].[2020-07-05].https://mp.weixin.qq.com/s/xY6W-zq2dzgeH4N6t6-ouQ. [7] WEI Z,YAN J,ANNI P,et al.The effect of IoT new features on security and privacy:new threats,existing solutions,and challenges yet to be solved[J].IEEE Internet of Things Journal,2019,6(2):1606-1616. [8] VASHI S,RAM J,MODI J,et al.Internet of Things (IoT):a vision,architectural elements,and security issues[C]//Proceedings of International Conference on I-SMAC.Washington D.C.,USA:IEEE Press,2017:15-36. [9] ZHU X,LI Q,ZHANG P,et al.A firmware code gene extraction technology for IoT terminal[J].IEEE Access,2019,7:179591-179604. [10] ZHU X,LI Q,CHEN Z,et al.Research on security detection technology for Internet of things terminal based on firmware code genes[J].IEEE Access,2020,8:150226-150241. [11] 张冀英,杨巨成,李晓卉.物联网导论[M].北京:中国水利水电出版社,2012. ZHANG J Y,YANG J C,LI X H.Introduction to Internet of things[M].Beijing:China Water and Power Press,2012.(in Chinese) [12] ZADDACH J,COSTIN A.Embedded devices security and firmware reverse engineering[EB/OL].[2020-07-05].http://s3.eurecom.fr/slides/bh13us_zaddach.slides.pdf. [13] 刁兆坤,曹世强,孟繁丽.物联网"云管端"的技术发展与应用[J].电信工程技术与标准化,2012,25(6):36-41. DIAO Z K,CAO S Q,MENG F L.Technology development and application profiling of Internet of things based on "cloud,pipe,terminal"[J].Telecommunication Engineering Technology and Standardization,2012,25(6):36-41.(in Chinese) [14] MOHSIN M,ANWAR Z,HUSARI G,et al.IoTSAT:a formal framework for security analysis of the Internet of things[C]//Proceedings of 2016 IEEE Conference on Communications and Network Security.Washington D.C.,USA:IEEE Press,2017:122-136. [15] FreeBuf.Depth:the secret of ZHENWANG virus[EB/OL].[2020-07-05].https://www.freebuf.com/articles/system/19059.html. [16] REDINI N,MACHIRY A,DAS D,et al.BootStomp:on the security of bootloaders in mobile devices[C]//Proceedings of 2017 USENIX Security Symposium.San Diego,USA:USENIX Association,2017:125-139. [17] RAMOS D A,ENGLER D.Under-constrained symbolic execution:correctness checking for real code[EB/OL].[2020-07-05].https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-ramos.pdf. [18] STEVENS,RICHARD W.UNIX网络编程.卷2,进程间通信[M].北京:人民邮电出版社,2009. STEVENS,RICHARD W.UNIX network programming.Volume 2,Interprocess communications[M].Beijing:People's Posts and Telecommunications Press,2009.(in Chinese) [19] PARKER D B.Fighting computer crime:a new framework for protecting information[M].Washington D.C.,USA:John Wiley & Sons.,Inc.,1998. [20] HERNAN S,LAMBERT S,OSTWALD T,et al.Threat modeling-uncover security design flaws using the stride approach[J].MSDN Magazine-Louisville,2006,9:68-75. [21] SCHNEIER B.Attack trees-modeling security threats[EB/OL].[2020-07-05].http://hackerproof.org/wwwb/data/hacker/attacktrees-ddj-ft.pdf. [22] MAVROPOULOS O,MOURATIDIS H,FISH A,et al.A conceptual model to support security analysis in the internet of things[J].Computer Ence & Information Systems,2017,14(2):557-578. [23] 李明哲,金俊,石端银.图论及其算法[M].北京:机械工业出版社,2010. LI M Z,JIN J,SHI D Y.Graph theory and its algorithm[M].Beijing:China Machine Press,2010.(in Chinese) [24] MICHAEL S.计算理论导引[M].2版.唐常杰,译.北京:机械工业出版社,2006. MICHAEL S.Introduction to theory of computation[M].2nd ed.Translation by TANG C J.Beijing:China Machine Press,2006.(in Chinese) |