[1] Gartner报告. Gartner Says Worldwide IoT Security Spending to Reach $348 Million in 2016.By 2020, More Than 25 Percent of Identified Attacks in Enterprises Will Involve IoT[EB/OL]. Tweet, http://www.gartner.com/newsroom/id/3291817
[2] Binwalk installation guide[J/OL].
[3]Zhao Kai , Ge Lina. A survey on the Internet of things security[C]//Proc of the 9th Int Conf on Computational Intelligence and Security. Los Alamitos , CA:IEEE Computer Society,2013:663-667
[4] Liu Xiangyu , Zhou Zhe , Diao Wenrui . When good becomes evil:Keystroke inference with smartwatch [C] //Proc of the 22nd ACM SIGSAC Conf on Computer and Communications Security . New York : ACM , 2015:1273-1285
[5] Das A , Borisov N , Caesar M. Do you hear what I hear?:Fingerprinting smart devices through embedded acoustic components[C] // Proc of the 21st ACM SIGSAC Conf on Computer and Communications Security. New York : ACM, 2014:441-452
[6]彭安妮,周威,贾严,等. 物联网操作系统安全研究综述[J]. 通信学报,2018(3) :22-34
[7] Zaddach J, Costin A. Embedded devices security and firmware reverse engineering[J]. Black-Hat USA, 2013
[8]D’EXPLOITATION S. RIOT-the friendly operating system for the Internet of Things-VIDEO[J] .Genomics & Informatics, 2012, 10(4):249-55
[9]TOULSON R, WILMSHURST T. Fast and effective embedded systems design: Applying the ARM mbed[M]. 北京:机械工业出版社, 2014
[10] 卿勇. 智能家居发展及关键技术综述[J]. 软件导刊,2017(1) :180-182
[11]金先涛. 智能家居系统信息安全状况分析[J]. 电子质量,2015(12) :12-15
[12]王玉 刘丽娟.基于物联网的智能家居安全问题研究[J].山西电子技术,2017,(5) :84-86
[13]Lin Hui ,Slagell A ,Kalbarczyk Z ,et al .Semantic security analysis of SCADA networks to detect malicious control commands in power grids [C]//Proc of ACM Workshop on SEGS'13 .New York:ACM,2013:29-34