| 1 |
|
|
|
| 2 |
MUENCH M, STIJOHANN J, KARGL F, et al. What you corrupt is not what you crash: challenges in fuzzing embedded devices[C]//Proceedings of the Network and Distributed System Security Symposium. Washington D. C., USA: IEEE Press, 2018: 1-10.
|
| 3 |
周诚远, 张慧翔, 李晓辉, 等. 浅析物联网设备固件保护与漏洞分析技术. 保密科学技术, 2022 (2): 45- 50.
|
|
ZHOU C Y , ZHANG H X , LI X H , et al. Analysis on firmware protection and vulnerability analysis technology of Internet of Things equipment. Secrecy Science and Technology, 2022 (2): 45- 50.
|
| 4 |
ANDREI C, JONAS Z, AURELIEN F, et al. A large-scale analysis of the security of embedded firmwares[C]//Proceedings of the 23th USENIX Security Symposium. Berkeley, USA: USENIX, 2014: 95-110.
|
| 5 |
POOJA G , PRIYANKA G , GAYATRI C , et al. Steganography using bin-walk tool & its overview. International Journal of Computer Science and Mobile Computing, 2021, 10 (6): 90- 96.
|
| 6 |
DAVID B, IVAN J, THANASSIS A, et al. BAP: a binary analysis platform[C]//Proceedings of CAV 2011. Berlin, Germany: Springer, 2011: 463-469.
|
| 7 |
|
| 8 |
HAIDER A , MUHAMMAD S , MALIHA S , et al. DUDE: decryption, unpacking, deobfuscation, and endian conversion framework for embedded devices firmware. IEEE Transactions on Dependable and Secure Computing, 2024, 21 (4): 99- 101.
|
| 9 |
REDINI N, MACHIRY A, WANG R Y. Karonte: detecting insecure multi-binary interactions in embedded firmware[C]//Proceedings of 2020 IEEE Symposium on Security and Privacy. San Francisco, USA: IEEE Press, 2020: 1544-1561.
|
| 10 |
|
| 11 |
TIEN C W, TSAI T T, CHEN I Y, et al. UFO-hidden backdoor discovery and security verification in IoT device firmware[C]//Proceedings of the IEEE International Symposium on Software Reliability Engineering. Memphis, USA: IEEE Press, 2018: 18-23.
|
| 12 |
SHWARTZ O , MATHOV Y , BOHADANA M , et al. Reverse engineering iot devices: effective techniques and methods. IEEE Internet of Things Journal, 2018, 5 (6): 4965- 4976.
doi: 10.1109/JIOT.2018.2875240
|
| 13 |
|
| 14 |
COSTIN A, ZARRAS A, FRANCILLON A. Automated dynamic firmware analysis at scale: a case study on embedded web interfaces[C]//Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. New York, USA: ACM Press, 2016: 437-448.
|
| 15 |
ELSABAGH M, JOHNSON R, STAVROU A, et al. FIRMSCOPE: automatic uncovering of privilege-escalation vulnerabilities in pre-installed apps in android firmware[C]//Proceedings of the 29th USENIX Security Symposium. [S. l. ]: USENIX, 2020: 1-10.
|
| 16 |
OBERMAIER J, HUTLE M. Analyzing the security and privacy of cloud-based video surveillance systems[C]//Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. New York, USA: ACM Press, 2016: 22-28.
|
| 17 |
|
| 18 |
|
| 19 |
赵亚新, 郭玉东, 舒辉. 基于JTAG的嵌入式设备固件分析技术. 计算机工程与设计, 2014, 35 (10): 3410- 3415.
|
|
ZHAO Y X , GUO Y D , SHU H . Analysis technology of embedded device firmware based on JTAG. Computer Engineering and Design, 2014, 35 (10): 3410- 3415.
|
| 20 |
|
| 21 |
于颖超, 陈左宁, 甘水滔, 等. 嵌入式设备固件安全分析技术研究. 计算机学报, 2021, 44 (5): 859- 881.
|
|
YU Y C , CHEN Z N , GAN S T , et al. Research on the technologies of security analysis technologies on the embedded device firmware. Chinese Journal of Computers, 2021, 44 (5): 859- 881.
|
| 22 |
CHEN D D, EGELE M, WOO M, et al. Towards automated dynamic analysis for linux-based embedded firmware[C]//Proceedings of 2016 Network and Distributed System Security Symposium. San Diego, USA: Internet Society, 2016: 1-10.
|
| 23 |
KIM M, KIM D, KIM E, et al. FirmAE: towards large-scale emulation of IoT firmware for dynamic analysis[C]//Proceedings of the Annual Computer Security Applications Conference. New York, USA: ACM Press, 2020: 733-745.
|
| 24 |
朱晓东. 二进制代码相似性分析关键问题研究[D]. 郑州: 战略支援部队信息工程大学, 2021.
|
|
ZHU X D. Research on key problems of binary code similarity analysis[D]. Zhengzhou: Information Engineering University, 2021. (in Chinese)
|
| 25 |
于颖超, 甘水滔, 邱俊洋, 等. 二进制代码相似度分析及在嵌入式设备固件漏洞搜索中的应用. 软件学报, 2022, 33 (11): 4137- 4172.
|
|
YU Y C , GAN S T , QIU J Y , et al. Binary code similarity analysis and its applications on embedded device firmware vulnerability search. Journal of Software, 2022, 33 (11): 4137- 4172.
|
| 26 |
PEWNY J, GARMANY B, GAWLIK R, et al. Cross-architecture bug search in binary executables[C]//Proceedings of the IEEE Symposium on Security and Privacy. San Jose, USA: IEEE Press, 2015: 709-724.
|
| 27 |
PECKOL J K . Embedded systems: a contemporary design tool. [S. l. ]: John Wiley & Sons, Inc., 2019.
|
| 28 |
朱晓东, 尹青, 常瑞, 等. 基于结构化特征库的递进式固件格式解析. 武汉大学学报(理学版), 2017, 63 (2): 125- 132.
|
|
ZHU X D , YIN Q , CHANG R , et al. Structured feature library-based progressive firmware format parsing. Journal of Wuhan University (Natural Science Edition), 2017, 63 (2): 125- 132.
|
| 29 |
CYR B , MAHMOD J , GUIN U . Low-cost and secure firmware obfuscation method for protecting electronic systems from cloning. IEEE Internet of Things Journal, 2019, 6 (2): 3700- 3711.
doi: 10.1109/JIOT.2018.2890277
|
| 30 |
|
| 31 |
|