共 65 条
- [1] Economic Factors of Vulnerability Trade and Exploitation [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1483 - 1499
- [2] Alrawi O, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3505
- [3] SoK: Security Evaluation of Home-Based IoT Deployments [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
- [4] [Anonymous], 2015, P USENIX WORKSHOP OF
- [5] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
- [6] Anwar A, 2021, Arxiv, DOI arXiv:2103.14217
- [7] Blinowski GJ, 2020, ADV INTELL SYST COMP, V1173, P82, DOI 10.1007/978-3-030-48256-5_9
- [8] Bouwmeester Brennen, 2021, P USENIX S USABLE PR
- [9] Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
- [10] Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 326 - 339