1 |
GARTNER. Gartner identifies top 10 strategic IoT technologies and trends[EB/OL].(2018-11-07)[2020-01-10].https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends.
|
2 |
GEEKPWN.年度盘点:2018物联网安全大事件[EB/OL].(2018-12-28)[2020-01-10].https://mp.weixin.qq.com/s/lC4F2PXoXo920av1UYYrzg.
|
3 |
ANTONAKAKIS M, APRIL T, BAILEY M, et al. Understanding the Mirai Botnet[C]//26th Usenix Security Symposium. Vancouver, BC, Canada :USENIX Association ,2017: 1093-1110.
|
4 |
HEFFNER C. Exploiting network surveillance cameras like a Hollywood hacker[EB/OL].(2013-02-25)[2020-01-10].https://media.blackhat.com/us-13/US-13-Heffner-Exploit-ing-Network-Surveillance-Cameras-Like-A-Hollywood-Hacker-WP.pdf.
|
5 |
THOMAS S L, CHOTHIA T, GARCIA F D, et al. Stringer: measuring the importance of static data comparisons to detect backdoors and undocumented functionality[C]//22nd European Symposium on Research in Computer Security. Oslo, Norway:ESORICS Organizing Committee, 2017: 513-531.
doi: 10.1007/978-3-319-66399-9_28
|
6 |
THOMAS S L, GARCIA F D, CHOTHIA T, et al. HumIDIFy: a tool for hidden functionality detection in firmware[C]//14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Bonn, Germany :Springer,2017: 279-300.
|
7 |
DAVIDSON D, MOENCH B, JHA S, et al. FIE on firmware: finding vulnerabilities in embedded systems using symbolic ution[C]//22th USENIX Security Symposium. Washington, DC, USA: USENIX Association, 2013: 463-478.
|
8 |
CADAR C, DUNBAR D, ENGLER D, et al. KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs[C]// USENIX Conference on Operating Systems Design and Implementation. San Diego,USA:USENIX Association, 2009:209-224.
|
9 |
PIERREKIM. Multiple vulnerabilities found in wireless IP camera (P2P) WIFICAM cameras and vulnerabilities in custom http server[EB/OL].(2017-03-08)[2020-01-10].https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#rsa-lulz.
|
10 |
VASILE S, OSWALD D, CHOTHIA T, et al. Breaking all the things:a systematic survey of firmware extraction techniques for iot devices[C]// 17th International Conference on Smart Card Research and Advanced Application Conference, Cham,FRA: Springer, 2018: 171-185.
|
11 |
CHEN D D, WOO M, BRUMLEY D, et al. Towards automated dynamic analysis for Linux-based embedded firmware[C]// Network and Distributed System Security Symposium, San Diego, CA, USA: Internet Society, 2016,110-116 DOI:10.14722/ndss.2016.23415
|
12 |
HEFFNER C. BINWALK:The #1 open source firmware extraction tool[EB/OL].(2019-04-13)[2020-01-10].https://www.refirmlabs.com/binwalk/.
|
13 |
COLLAKE J,HEFFNER C. Firmware modification kit[EB/OL].(2014-06-09)[2020-01-10].https://bitsum.com/firmware_mod_kit.htm.
|