Computer Science ›› 2025, Vol. 52 ›› Issue (12): 411-418.doi: 10.11896/jsjkx.241200143
• Information Security • Previous Articles Next Articles
WEI Zihan1, MA Rongkuan1, LI Beibei2, YANG Yahui1, LI Zhuo1, SONG Yunkai1
CLC Number:
| [1]ANDREW L.The vulnerability of vital systems:how critical infrastructure became a security problem[M]//Securing the Homeland .Routledge,2020:17-39. [2]LI X F,DING Z G,ZHANG S K,et al.Analysis of critical cloud-native technologies and applications in the CT domain[J].Telecom Engineering Technics and Standardization,2024,37(9):83-88. [3]ZHENG Y W,WEN H,CHENG K,et al.A Survey of IoT Device Vulnerability Mining Techniques[J].Journal of Cyber Security,2019,4(5):61-75. [4]CHEN L,WANG Y,LINGHU J,et al.SaTC:Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems[J].IEEE Transactions on Dependable and Secure Computing,2024,21(4):2421-2433. [5]SHOSHITAISHVILI Y,WANG R,SALLS C,et al.Sok:(state of) the art of war:Offensive techniques in binary analysis[C]//2016 IEEESymposium on Security and Privacy(SP).IEEE,2016:138-157. [6]HAQ I U,CABALLERO J.A survey of binary code similarity[J].ACM Computing Surveys,2021,54(3):1-38. [7]FENG X,ZHU X,HAN Q L,et al.Detecting vulnerability on IoT device firmware:A survey[J].IEEE/CAA Journal of Automatica Sinica,2022,10(1):25-41. [8]SABBAGHI A,KEYVANPOUR M R.A systematic review of search strategies in dynamic symbolic execution[J].Computer Standards & Interfaces,2020,72:103444. [9]ECEIZA M,FLORES J L,ITURBE M.Fuzzing the internet of things:A review on the techniques and challenges for efficient vulnerability discovery in embedded systems[J].IEEE Internet of Things Journal,2021,8(13):10390-10411. [10]TAY H J,ZENG K,VADAYATH J M,et al.Greenhouse:Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation[C]//32nd USENIX Security Symposium(USENIX Security 23).2023:5791-5808. [11]BELLARD F.QEMU,a fast and portable dynamic translator[C]//USENIX annual technical conference,FREENIX Track.2005,41(46):10-5555. [12]KIM M,KIM D,KIM E,et al.Firmae:Towards large-scale emulation of iot firmware for dynamic analysis[C]//Proceedings of the 36th Annual Computer Security Applications Conference.2020:733-745. [13]CHEN D D,MAVERICK W,DAVID B,et al.Towards Automated Dynamic Analysis for Linux-based Embedded Firmware[C]//Network and Distributed System Security Symposium.2016:1-16. [14]JOHNSON E,BLANDM,ZHU Y,et al.Jetset:Targeted firmware rehosting for embedded systems[C]//30th USENIX Security Symposium(USENIX Security 21).2021:321-338. [15]ZADDACH J,BRUNO L,FRANCILLON A,et al.AVATAR:A Framework to Support Dynamic Security Analysis of Embedded Systems Firmwares[C]//NDSS.2014:1-16. [16]XIN M,WEN H,DENG L,et al.Firmware re-hosting through static binary-level porting[J].arXiv:2107.09856,2021. [17]The Linux Kernel.UBI FileSystem[EB/OL].[2025-01-12].https://www.kernel.org/doc/html/latest/filesystems/ubifs.html. |
| [1] | ZHUANG Yuan, CAO Wenfang, SUN Guokai, SUN Jianguo, SHEN Linshan, YOU Yang, WANG Xiaopeng, ZHANG Yunhai. Network Protocol Vulnerability Mining Method Based on the Combination of Generative AdversarialNetwork and Mutation Strategy [J]. Computer Science, 2023, 50(9): 44-51. |
| [2] | YANG Yahui, MA Rongkuan, GENG Yangyang, WEI Qiang, JIA Yan. Black-box Fuzzing Method Based on Reverse-engineering for Proprietary Industrial Control Protocol [J]. Computer Science, 2023, 50(4): 323-332. |
| [3] | HU Zhi-hao, PAN Zu-lie. Testcase Filtering Method Based on QRNN for Network Protocol Fuzzing [J]. Computer Science, 2022, 49(5): 318-324. |
| [4] | LI Yi-hao, HONG Zheng, LIN Pei-hong. Fuzzing Test Case Generation Method Based on Depth-first Search [J]. Computer Science, 2021, 48(12): 85-93. |
| [5] | ZHANG Ya-feng, HONG Zheng, WU Li-fa, ZHOU Zhen-ji and SUN He. Protocol State Based Fuzzing Method for Industrial Control Protocols [J]. Computer Science, 2017, 44(5): 132-140. |
| [6] | CHENG Cheng and ZHOU Yan-hui. Findding XSS Vulnerabilities Based on Fuzzing Test and Genetic Algorithm [J]. Computer Science, 2016, 43(Z6): 328-331. |
| [7] | . Model Based Automatic Fuzzing Script Generation [J]. Computer Science, 2013, 40(3): 206-209. |
|
||