参考文献
[1] Zimmer V, Rothman M, Marisetty S. Beyond BIOS: Developing with the Unified Extensible Firmware Interface[M]. 2nd ed. [S. l.]: Intel Press, 2010.
[2] 周振柳, 计算机固件安全技术[M]. 北京: 清华大学出版社, 2012.
[3] 唐艳武, 蒋 凡. 上下文相关的软件漏洞模式自动提取方法[J]. 计算机工程, 2010, 36(17): 51-56.
[4] Ding Sun, Tan H B K, Liu Kaiping, et al. Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation[C]//Proc. of the 36th International Conference on Computer Software and Applications. Lzmir, Turkey: [s. n.], 2012: 559-564.
[5] Yang Dingning, Zhang Yuqing, Liu Qixu. BlendFuzz: A Model-based Framework for Fuzz Testing Programs with Grammatical Inputs[C]//Proc. of the 11th International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: [s. n.], 2012: 1070-1076.
[6] 李伟明, 张爱芳, 刘建财, 等. 网络协议的自动化模糊测试漏洞挖掘方法[J]. 计算机学报, 2011, 34(2): 242-254.
[7] 沈亚楠, 赵荣彩, 王小芹, 等. 基于文件规范描述的文件模糊测试[J]. 计算机工程, 2010, 36(16): 52-53, 59.
[8] Liu Zhi, Zhang Xiaosong, Li Xiongda. Proactive Vulnerability Finding via Information Flow Tracing[C]//Proc. of the 2nd International Conference on Multimedia Information Networking and Security. Nanjing, China: Nanjing University, 2010: 481-485.
[9] 唐和平, 黄曙光, 张 亮. 动态信息流分析的漏洞利用检测系统[J]. 计算机科学, 2010, 37(7): 148-151.
[10] 章 烨. Fuzz安全测试技术研究[D]. 西安: 西安电子科技大学, 2010.
[11] Intel Corporation. EDK II Module Writer’s Guide Revision 0.01[EB/OL]. [2013-06-18]. http://www.intel.com/.
[12] 姚颉文, 谢康林, 石永军, 等. 基于EFI驱动-协议模型的自我认证测试系统[J]. 计算机仿真, 2005, 22(7): 75-78.
[13] Sutton M, Greene A, Amini P. Fuzzing Brute Force Vulnerability Discovery[M]. [S. l.]: Addison-Wesley, 2006.
[14] Intel Corporation. UEFI SCT Case Writers Guide 0.91[EB/OL]. [2013-06-18]. http://www.uefi.org.
[15] Intel Corporation. EDK II Lab Setup & NT32 Build[EB/OL]. [2013-06-18]. http://uefidk.intel.com/.
[16] Bullseye Testing Technology. BullseyeCoverage Measurement Technique[EB/OL]. [2013-06-18]. http://www.bullseye.com/ measurementTechnique.html.
编辑 顾逸斐 |