[1] |
GUO Liang.The Present Situation and Future Tendency of the Development of Smart Home[J].Intelligent Building & Smart City, 2018(3):52-54.
|
|
呙靓. 智能家居的发展现状及未来趋势[J].智能建筑与智慧城市, 2018(3):52-54.
|
[2] |
WANG Xuejiao.Brief Discussion on Security Issues of Smart Home System[J].Science Mosaic,2015(7):132-136.
|
|
王雪娇. 浅谈智能家居系统的安全问题[J]. 科技广场, 2015(7):132-136.
|
[3] |
JIANG Fan,WEI Yixiang,ZHUANG Yan,et al.Research of Private Cloud Security’s Response to BlackMail Virus.Netinfo Security[J]. 2017, 17(8):83-88.
|
|
蒋凡, 魏弋翔, 庄严,等. 安全私有云有效应对勒索病毒的原理分析[J]. 信息网络安全, 2017,17(8):83-88.
|
[4] |
MIZRAK A T, CHENG Y C, MARXULLO K, et al.Detecting and Isolating Malicious Routers[J]. IEEE Transactions on Dependable & Secure Computing, 2006, 3(3):230-244.
|
[5] |
JUWAINI M, ALSAQOUR R,ABDELHAQ M,et al.A Review on WEP Wireless Security Protocol[J].Journal of Theoretical and Applied Information Technology, 2012,40(6):39-43.
|
[6] |
LASHKARI A H, DANESH M M S, SAMADI B. A Survey on Wireless Security Protocols (WEP, WPA and WPA2/802.11i)[C]//IEEE. Computer Science and Information Technology,August 8-11,2009,Beijing, China. New York:IEEE, 2009:48-52.
|
[7] |
ZHOU Jie.Research on Decoding WPA/WPA2-PSK with High Speed Based on GPU[D].Xi'an:Xidian University,2010.
|
|
周洁. 基于GPU的WPA/WPA2-PSK高速破译方法研究[D]. 西安:西安电子科技大学, 2010.
|
[8] |
LI Liheng,ZHU Lingzhong,JU Ti.A Study on the Wireless Security of WPA in 802.11 Nwtwork[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2004, 24(1):78-81.
|
|
李立恒, 朱凌众, 居悌. 802.11无线网络WPA安全体系的研究[J]. 南京邮电大学学报(自然科学版), 2004, 24(1):78-81.
|
[9] |
ZISIADIS D, KOPSIDAS S, VARALIS A, et al.Enhancing WPS Security[C]//IEEE. Wireless Days,November 21-23,2012, Dublin, Ireland. New York:IEEE, 2013:1-3.
|
[10] |
COSTIN A,ZARRAS A.Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces[C]//ACM. Asia Conference on Computer and Communications Security,May 30-June 3, 2016, Xi'an, China. New York:ACM, 2016:437-448.
|
[11] |
TAN Quanfu, JI Guozhen.Security Analysis of Access Router Firmware[J].Communications Technology,2018(1):200-204.
|
|
谭全福,姬国珍. 接入路由器固件安全分析[J]. 通信技术,2018(1):200-204.
|
[12] |
DA Xiaowen,MAO Liwen,WU Mingjie,et al.Research on a Vulnerability Location Technology Based on Patch Matching and Static Taint Analysis[J].Netinfo Security,2017, 17(9):5-9.
|
|
达小文,毛俐旻,吴明杰,等.一种基于补丁对比和静态污点分析的漏洞定位技术研究[J].信息网络安全,2017,17(9):5-9.
|
[13] |
XU Weiyang, LI Yao, TANG Yong, WANG Baosheng.Research on Cross-architecture Vulnerabilities Searching in Binary Executables[J].Netinfo Security,2017,17(9):21-25.
|
|
徐威扬,李尧,唐勇,等.一种跨指令架构二进制漏洞搜索技术研究[J].信息网络安全,2017,17(9):21-25.
|
[14] |
WANG Minghao.The Security Analysis and Attacks Detection of OSPF Routing Protocol[C]//IEEE.International Conference on Intelligent Computation Technology and Automation,October 25-26, 2014,Changsha, China.New York:IEEE, 2015:836-839.
|
[15] |
VENTRE G.Experimental Analysis of Attacks Against Intradomain Routing Protocols[M]. Nieuwe Hemweg:IOS Press, 2005.
|
[16] |
SMITH B R, GARCIA-LUNA-ACEVES J J. Securing the Border Gateway Routing Protocol[C]//IEEE.Global Telecommunications Conference,November 18-28,London, UK.New York:IEEE, 1996:81-85.
|
[17] |
KENT S, LYNN C, SEO K.Secure Border Gateway Protocol (S-BGP)[J].IEEE Journal on Selected Areas in Communications, 2000, 18(4) :582-592.
|
[18] |
COSTIN A,ZARRAS A.Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces[C]// ACM.ACM on Asia Conference on Computer and Communications Security,May 30-June 3, 2016,Xi'an,China.New York:ACM, 2016:437-448.
|
[19] |
CUI A,COSTELLO M,STOLFO S J. When Firmware Modifications Attack: A Case Study of Embedded Exploitation[EB/OL].,2017-7-15.
|
[20] |
ZADDACH J,BRUNO L,BALZAROTTI D, et al. Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares[EB/OL]..
|
[21] |
COSTIN A, ZADDACH J,FRANCILLON A, et al.A Large-scale Analysis of the Security of Embedded Firmwares[C]//USENIX. 23rd USENIX conference on Security Symposium ,August 20 - 22, 2014,San Diego,USA.Berkeley: USENIX,2014:95-110.
|
[22] |
YAN S,WANG R,HAUSER C, et al. Firmalice-Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware[EB/OL].,2017-7-15.
|
[23] |
HU Chaojian, XUE Yibo, ZHAO Liang, et al.Backdoor Detection in Embedded System Firmware without File System[J].Journal on Communications, 2013(8):140-145.
|
|
忽朝俭, 薛一波, 赵粮,等. 无文件系统嵌入式固件后门检测[J]. 通信学报, 2013(8):140-145.
|
[24] |
WANG Xiajing,HU Changzhen,MA Rui, et al.A Survey of the Key Technology of Binary Program Vulnerability Discovery[J].Netinfo Security, 2017,17(8):1-13.
|
|
王夏菁, 胡昌振, 马锐,等. 二进制程序漏洞挖掘关键技术研究综述[J]. 信息网络安全, 2017,17(8):1-13.
|
[25] |
LI Deng,YIN Qing,LIN Jian,et al.Firmware Vulnerability Detection in Embedded Device Based on Homology Analysis[J].Computer Engineering,2017, 43(1):72-78.
|
|
李登, 尹青, 林键,等. 基于同源性分析的嵌入式设备固件漏洞检测[J]. 计算机工程, 2017, 43(1):72-78.
|
[26] |
SHI Ji, ZENG Zhaolong, YANG Congbao,et al.The Summary of Fuzzing Testing Technology[J].Netinfo Security,2014, 14(3):87-91.
|
|
史记, 曾昭龙, 杨从保,等. Fuzzing测试技术综述[J]. 信息网络安全, 2014,14(3):87-91.
|
[27] |
ZHOU Yan.Extensible Framework for Static Vulnerability Detection Based on Taint Analysis[D].Nanjing:Nanjing University,2017.
|
|
周严. 基于污点分析的静态漏洞检测可扩展框架[D].南京:南京大学, 2017
|
[28] |
CUI Hualiang,LAN Yun,CUI Baojiang.Application of Dynamic Taints Analysis Technology in Vulnerability Detection of ActiveX Controls[J].Netinfo Security,2013, 13(12):16-19.
|
|
崔化良, 兰芸, 崔宝江.动态污点分析技术在ActiveX控件漏洞挖掘上的应用[J]. 信息网络安全, 2013,13(12):16-19.
|