[1]彭长根. 人工智能安全治理挑战与对策[J]. 信息安全研究, 2022, 8(4): 318325[2]陈亮, 李峰, 任保全, 等. 软件定义物联网研究综述[J]. 电子学报, 2021, 49(5): 10191032[3]杨毅宇, 周威, 赵尚儒, 等. 联网安全研究综述: 威胁, 检测与防御[J]. 通信学报, 2021, 42(8): 188205[4]Ahmed D. Iran’s largest sSteel producer hit by crippling cyberattack[EBOL]. (20220628) [20230430]. https:www.hackread.comiranlargeststeelproducerhitbycyber attack[5]杨婷, 张嘉元, 黄在起,等. 工业控制系统安全综述[J]. 计算机研究与发展, 2022, 59(5): 10351053[6]Shekari T, Beyah R. IoTskimmer: Energy market manipulation through highwattage IoT botnets[COL] Proc of BlackHat. 2020 [20230523]. https:crossweb.pleneventsiotskimmerenergymarketmanipulationthroughhighwattageiotbotnetswrzesien2021[7]Kuang B, Fu A, Susilo W, et al. A survey of remote attestation in Internet ofthings: Attacks, countermeasures, and prospects[J]. Computers & Security, 2022, 112: 102498[8]张玉清, 周威, 彭安妮, 等. 物联网安全综述[J]. 计算机研究与发展, 2017, 54(10): 21302143[9]樊琳娜, 李城龙, 吴毅超, 等. 物联网设备识别及异常检测研究综述[JOL]. 软件学报, 2023 [20230523]. https:www.jos.org.cnjosarticleabstract6818 [10]Asokan N, Brasser F, Ibrahim A, et al. Seda: Scalable embedded device attestation[C] Proc of ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2015: 964975[11]Ambrosin M, Conti M, Ibrahim A, et al. SANA:Secure and scalable aggregate network attestation[C] Proc of the ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 731742[12]Ibrahim A, Sadeghi A R, Zeitouni S. SeED:Secure noninteractive attestation for embedded devices[C] Proc of ACM Conf on Security and Privacy in wireless and Mobile Networks. New York: ACM, 2017: 6474[13]Kuang B, Fu A, Yu S, et al. ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms[J]. IEEE Internet of Things Journal, 2019, 6(5): 83728383[14]Kuang B, Fu A, Zhou L, et al. DORA: Dataoriented runtime attestation for IoT devices[J]. Computers & Security, 2020, 97: 101945[15]Dushku E, Rabbani M M, Conti M, et al. SARA: Secure asynchronous remote attestation for IoT systems[J]. IEEE Trans on Information Forensics and Security, 2020, 15: 31233136[16]Kumar S, Eugster P, Santini S. Softwarebased remote network attestation[J]. IEEE Trans on Dependable and Secure Computing, 2021, 19(5): 29202933[17]王冠, 高壮. 基于群体认证的远程证明方案研究[J]. 信息安全研究, 2022, 8(11): 11211128[18]Cao J, Zhu T, Ma R, et al. A Softwarebased remote attestation scheme for Internet of things devices[JOL]. IEEE Trans on Dependable and Secure Computing, 2022 [20230523]. https:www.computer.orgcsdljournaltq202302097229841BmTz640pfW[19]Kuang B, Fu A, Gao Y, et al. FeSA: Automaticfederated swarm attestation on dynamic largescale IoT devices[JOL]. IEEE Trans on Dependable and Secure Computing, 2022 [20230523]. https:ieeexplore.ieee.orgdocument9837456[20]Petzi L, Yahya A E B, Dmitrienko A, et al. SCRAPS: Scalablecollective remote attestation for pubsub IoT networks with untrusted proxy verifier[C] Proc of USENIX Security Symp. Berkeley,CA: USENIX Association, 2022: 34853501[21]Eldefrawy K, Rattanavipanon N, Tsudik G. HYDRA: Hybrid design for remote attestation (using a formally verified microkernel)[C] Proc of ACM Conf on Security and Privacy in Wireless and Mobile Networks. New York: ACM, 2017: 99110 |