[1]Paloalto Networks. 2020 unit 42 IoT threat report[EBOL]. 2021 [20230905]. https:iotbusinessnews.comdownloadwhitepapersUNIT42IoTThreatReport.pdf[2]王蕾, 李丰, 李炼, 等. 污点分析技术的原理和实践应用[J]. 软件学报, 2017, 28(4): 860882[3]Chen S, Lin Z, Zhang Y. Selectivetaint: Efficient data flow tracking with static binary rewriting [C] Proc of the 30th USENIX Security Symp. Berkeley, CA: USENIX Association, 2021: 16651682[4]Chua Z L, Wang Y, Baluta T, et al. Inferring taint rules without architectural semantics [C] Proc of the 26th Annual Network and Distributed System Security Symp. San Diego, CA: NDSS, 2019[5]Gotovchits I, van Tonder R, Brumley D. Saluki: Finding taintstyle vulnerabilities with static property checking [C] Proc of the NDSS Workshop on Binary Anal Res. San Diego, CA: NDSS, 2018[6]Zhang X, Wang X, Slavin R, et al. Condysta: Contextaware dynamic supplement to static taint analysis [C] Proc of the 42nd IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2021: 796812[7]Caballero J, Yin H, Liang Z, et al. Polyglot: Automatic extraction of protocol message format using dynamic binary analysis [C] Proc of the 2007 ACM Conf on Computer and Communications Security. New York: ACM, 2007: 317329[8]Cui W, Peinado M, Chen K, et al. Tupni: Automatic reverse engineering of input formats [C] Proc of the 15th ACM Conf on Computer and Communications Security. New York: ACM, 2008: 391402[9]Lin Z, Jiang X, Xu D, et al. Automatic protocol format reverse engineering through contextaware monitored execution [C] Proc of the Network and Distributed System Security Symp. San Diego, CA: NDSS, 2008[10]Redini N, Machiry A, Wang R, et al. Karonte: Detecting insecure multibinary interactions in embedded firmware[C] Proc of the 2020 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2020: 15441561[11]Chen L, Wang Y, Cai Q, et al. Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems[C] Proc of the 30th USENIX Security Symp. Berkeley, CA: USENIX Association, 2021: 303319[12]Cheng K, Li Q, Wang L, et al. Dtaint: Detecting the taintstyle vulnerability in embedded device firmware[C] Proc of the 48th Annual IEEEIFIP Int Conf on Dependable Systems and Network. Piscataway, NJ: IEEE, 2018: 430441[13]Cheng K, Liu T, Guan L, et al. Finding taintstyle vulnerabilities in linuxbased embedded firmware with SSEbased alias analysis[J]. arXiv preprint, arXir:2109.12209, 2021[14]周建华, 李丰, 许丽丽, 等. 一种基于隐式污点源识别的嵌入式设备漏洞检测方法[JOL]. 信息安全学报, 2022 [20230905]. http:jcs.iie.ac.cnxxaqxbchreaderview_abstract.aspx?doi=10.19363J.cnki.cn101380tn.2023.08.30[15]李涛, 田迎军, 葛阳晨, 等. 物联网固件漏洞安全检测综述[J]. 信息安全研究, 2022, 8(12): 11461155
|