[1] Kaspersky Lab.Equation:The Death Star of Malware Galaxy[EB/OL].https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/,2015.
[2] Kaspersky Lab.A Fanny Equation:"I am your father,Stuxnet"[EB/OL].https://securelist.com/blog/research/68787/a-fanny-equation-i-am-your-father-stuxnet/,2015.
[3] Langner R.Stuxnet:Dissecting a cyberwarfare weapon[J].IEEE Security & Privacy,2011,9(3):49-51.
[4] Falliere N,Murchu L O,Chien E.W32.Stuxnet Dossier[R].USA:Symantec Corp,2011.9.
[5] Trend Micro.Netis Routers Leave Wide Open Backdoor[EB/OL].http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/,2015.
[6] Craig Heffner.Reverse Engineering a D-Link Backdoor[EB/OL].http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/,2015.
[7] Zach Cutlip.Netgear Root Compromise via Command Injection[EB/OL].http://shadow-file.blogspot.lt/2013/10/netgear-root-compromise-via-command.html,2015.
[8] Craig Heffner.From China,With Love[EB/OL].http://www.devttys0.com/2013/10/from-china-with-love/,2015.
[9] Hex-Rays SA.The IDA Pro Disassembler and Debugger[EB/OL].https://www.hex-rays.com/products/ida/index.shtml,2016.
[10] Schuett C,Butts J,Dunlap S.An evaluation of modification attacks on programmable logic controllers[J].International Journal of Critical Infrastructure Protection,2014,7(1):61-68.
[11] Basnight Z,Butts J,Lopez Jr J,et al.Firmware modification attacks on programmable logic controllers[J].International Journal of Critical Infrastructure Protection,2013,6(2):76-84.
[12] Skochinsky I.Intro to embedded reverse engineering for PC reversers[R].Montreal,Canada:RECON,2010.
[13] Basnight Z H.Firmware Counterfeiting and Modification Attacks on Programmable Logic Controllers[D].Ohio:Air Force Institute of Technology,2013.
[14] Dacosta I,Mehta N,Metrock E,et al.Security analysis of an IP phone:Cisco 7960G[A].Principles,Systems and Applications of IP Telecommunications[C].Berlin:Springer-Verlag,2008.236-255.
[15] Santamarta R.Reverse Mode-Reversing Industrial Firmware for Fun and Backdoors I[EB/OL].http://www.reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1,2015.
[16] Viehbock S.Reverse engineering an obfuscated firmware image E02-analysis[EB/OL].https://sviehb.wordpress.com/2011/09/09/reverse-engineering-an-obfuscated-firmware-image-e02-analysis/,2015.
[17] Costin,A,et al.A large-scale analysis of the security of embedded firmwares[A].Proceedings of the 23rd USENIX Conference on Security Symposium[C].San Diego,California:USENIX Association,2014.95-110.
[18] ARM Limited.ARM Architecture Reference Manual[M].Cambridge,England:ARM Limited,2014. |