共 57 条
- [41] ReFirm Labs, 2014, Binwalk: Firmware Analysis Tool
- [42] Using Logic Programming to Recover C plus plus Classes and Methods from Compiled Executables [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 426 - 441
- [43] Modelling Analysis and Auto Detection of Cryptographic Misuse in Android Applications [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 75 - +
- [44] Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [45] PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
- [46] SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [47] FirmFuzz: Automated IoT Firmware Introspection and Analysis [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19), 2019, : 15 - 21
- [48] Stack Exchange, 2011, Why should one not use the same asymmetric key for encryption as they do for signing?
- [49] Stack Exchange, 2015, Why is HMACSHA1 still considered secure?
- [50] Stack Overflow, 2011, How to generate RSA private key using OpenSSL?