参考文献
[1]Heffner C,Yap D.Hacking the Routers:SOHO Router Security[J].SourceSec Security Research,2014,55(2):76-82.
[2]付思源,刘功申,李建华.基于UEFI固件的恶意代码防范技术研究[J].计算机工程,2012,38(9):117-120.
[3]周振柳.计算机固件安全技术[M].北京:清华大学出版社,2012.
[4]马佳敏,潘理,姚颉文.面向新一代固件接口标准的固件模糊测试系统[J].计算机工程,2014,40(7):277-280.
[5]Cui Ang,Costello M.When Firmware Modifications Attack:A Case Study of Embedded Exploitation[C]//Proceedings of Network and Distributed System Security Symposium.San Diego,USA:NDSS Press,2013:134-141.
[6]Costin A,Zaddach J,Francillon A,et al.A Large-scale Analysis of the Security of Embedded Firmwares[C]//Proceedings of USENIX Security Symposium.San Diego,USA:USENIX Association,2014:95-110.
[7]Shoshitaishvili Y,Wang Ruoyu,Hauser C,et al.Firmalice-automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware[C]//Proceedings of Network and Distributed System Security Symposium.San Diego,USA:NDSS
Press,2015:145-156.
[8]Mulder J,Schwartz M,Berg M,et al.Analysis of Field Devices Used in Industrial Control Systems[M].Berlin,Germany:Springer,2012:45-57.
[9]Zaddach J,Bruno L,Francillon A,et al.AVATAR:A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares[C]//Proceedings of Network and Distributed System Security Symposium.San Diego,USA:NDSS Press,2014:167-
173.
[10]忽朝俭,薛一波,赵粮,等.无文件系统嵌入式固件后门检测[J].通信学报,2013,34(8):140-145.
[11]Hemel A,Kalleberg K T,Vermaas R,et al.Finding Software License Violations Through Binary Code Clone Detection[C]//Proceedings of the 8th Working Conference on Mining Software Repositories.New York,USA:ACM Press,2011:63-72.
[12]Bailey M,Oberheide J,Andersen J,et al.Automated Classification and Analysis of Internet Malware[M]//Kruegel C,Lippmann R,Clark A.Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2007:178-197.
[13]Cilibrasi R,Clustering by Compression[J].IEEE Transactions on Information Theory,2005,51(4):1523-1545.
[14]Kornblum J.Identifying Almost Identical Files Using Context Triggered Piecewise Hashing[J].Digital Investigation,2006,3(3):91-97.
[15]Huntley S.Dlink DIR-645 UPNP Buffer Overflow[EB/OL].[2016-01-07].http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008.
[16]di Pinto A.Multiple Vulnerabilities on D-Link Dir-505 Devices[EB/OL].[2016-01-07].http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10029.
编辑金胡考 |