[1] |
PENG Yong, JIANG Changqing, XIE Feng, et al.Information Security Research Progress in Industrial Control Systems[J]. Journal of Tsinghua University: Science and Technology, 2012, 52(10): 1396-1408.
|
|
彭勇,江常青,谢丰,等.工业控制系统信息安全研究进展[J].清华大学学报:自然科学版,2012,52(10):1396-1408.
|
[2] |
TAO Yaodong, LI Ning, ZENG Guangsheng.Review of Industrial Control Systems Security[J]. Computer Engineering and Applications, 2016, 52(13): 8-18.
|
|
陶耀东,李宁,曾广圣.工业控制系统安全综述[J].计算机工程与应用, 2016,52(13):8-18.
|
[3] |
PENG Yong, WANG Ting, XIONG Qi, et al.Research on Fuzzy Testing Technology for Private Protocol[J]. Journal of Beijing Jiaotong University, 2013, 37(5): 8-12.
|
|
彭勇,王婷,熊琦,等.针对私有协议的模糊测试技术研究[J].北京交通大学学报,2013,37(5):8-12.
|
[4] |
SUN Zhe, LIU Daguang, WU Xueli, et al.Design and Implementation of Network Protocol Auto Vulnerability Mining Tool based on Fuzzing[J]. Netinfo Security, 2014,14(6): 23-30.
|
|
孙哲,刘大光,武学礼,等.基于模糊测试的网络协议自动化漏洞挖掘工具设计与实现[J].信息网络安全,2014,14(6):23-30.
|
[5] |
ZHANG Yafeng, HONG Zheng, WU Lifa, et al.Protocol State Based Fuzzing Method for Industrial Control Protocols[J]. Computer Science, 2017, 44(5): 132-140.
|
|
张亚丰,洪征,吴礼发,等.基于状态的工控协议Fuzzing测试技术[J].计算机科学,2017,44(5):132-140.
|
[6] |
LAI Zhiquan.Research on Software Fuzzy Testing Method Based on State Protocol of Dynamic Stain Analysis[D]. Changsha: National University of Defense Technology,2010.
|
|
赖志权. 基于动态污点分析的状态协议实现软件模糊测试方法研究[D].长沙:国防科学技术大学,2010.
|
[7] |
ZHANG Meichao, ZENG Fanping, HUANG Yi.Fuzzing Testing Based on Vulnerability Database[J]. Journal of Chinese Computer Systems, 2011, 32(4): 651-655.
|
|
张美超,曾凡平,黄奕.基于漏洞库的fuzzing测试技术[J].小型微型计算机系统,2011,32(4):651-655.
|
[8] |
LI Weiming, ZHANG Aifang, LIU Jiancai, et al.An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering Method[J]. Chinese Journal of Computers, 2011, 34(2): 242-255.
|
|
李伟明,张爱芳,刘建财,等.网络协议的自动化模糊测试漏洞挖掘方法[J].计算机学报,2011,34(2):242-255.
|
[9] |
WANG Lei, LI Feng, LI Lian, et al.Principle and Practice of Taint Analysis[J]. Journal of Software, 2017, 28(4): 860-882.
|
|
王蕾,李丰,李炼,等.污点分析技术的原理和实践应用[J].软件学报,2017,28(4):860-882.
|
[10] |
SHAO Lin, ZHANG Xiaosong, SU Enbiao.New Method of Software Vulnerability Detection Based on Fuzzing[J]. Application Research of Computers, 2009, 26(3): 292-294.
|
|
邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):292-294.
|
[11] |
BEKRAR S, BEKRAR C, GROZ R, et al.A Taint Based Approach for Smart Fuzzing[C]// IEEE.IEEE Fifth International Conference on Software Testing, Verification and Validation, April 17-21, 2012, Montreal, QC, Canada.NJ: IEEE, 2012:818-825.
|
[12] |
SONG Zheng, WANG Yongjian, JIN Bo, et al.Review on Dynamic Taint Analysis of Binary Programs[J]. Netinfo Security, 2016, 16(3): 77-83.
|
|
宋铮,王永剑,金波,等.二进制程序动态污点分析技术研究综述[J].信息网络安全,2016,16(3):77-83.
|
[13] |
BASNIGHT Z, BUTTS J, JR J L, et al.Firmware Modification Attacks on Programmable Logic Controllers[J]. International Journal of Critical Infrastructure Protection, 2013, 6(2):76-84.
|
[14] |
DAI Zhonghua, ZHAO Bo, WANG Ting, et al.A Fuzzing Test Method for Embedded Device Firmware Based on Taint Analysis[J]. Advanced Engineering Sciences, 2016, 48(2): 125-131.
|
|
戴忠华,赵波,王婷,等.基于污点分析的嵌入式设备固件模糊测试方法[J].工程科学与技术,2016,48(2):125-131.
|
[15] |
CHENG Ligen, LIU Shengli, XIAO Da, et al.A Heuristic Fuzzing Test Method for Cisco IOS[J]. Computer Engineering, 2014, 40(12): 68-73.
|
|
陈立根,刘胜利,肖达,等.一种Cisco IOS引导式模糊测试方法[J].计算机工程,2014,40(12):68-73.
|
[16] |
YI Shengwei, ZHANG Chongbin, XIE Feng, et al.Security Analysis of Industrial Control Network Protocol Based on Peach[J]. Journal of Tsinghua University: Science and Technology, 2017(1): 50-54.
|
|
伊胜伟,张翀斌,谢丰,等.基于Peach的工业控制网络协议安全分析[J].清华大学学报:自然科学版,2017(1):50-54.
|