[1] |
张海藩 . 软件工程导论[M]. 北京: 清华大学出版社, 1998.
|
|
ZHANG H F . Introduction to software engineering[M]. Beijing: Tsinghua University PressPress, 1998.
|
[2] |
彭先觉, 胡勇 . 利用软件在线升级的攻击[J]. 通信技术, 2015(10): 1183-1186.
|
|
PENG X J , HU Y . Attacks using online software upgrade[J]. Communications Technology, 2015(10): 1183-1186.
|
[3] |
傅建明, 刘高, 李鹏伟 . 一种杀毒软件升级流程的安全性分析方法[J]. 武汉大学学报(理学版), 2015(6): 509-516.
|
|
FU J M , LIU G , LI P W . A security analysis method of antivirus software upgrade process[J]. Journal of Wuhan University (Natrual Science Edition), 2015(6): 509-516.
|
[4] |
周振飞 . 软件供应链污染机理与防御研究[D]. 北京:北京邮电大学, 2018.
|
|
ZHOU Z F . Research on software supply chain pollution mechanism and defense[D]. Beijing:Beijing University of Posts and Telecommunications, 2018.
|
[5] |
CATUOGNO L , GALDI C , PERSIANO G . Guaranteeing dependency enforcement in software updates[M]. Secure IT Systems. Springer International Publishing, 2015.
|
[6] |
赵作鹏, 尹志民, 王潜平 ,等. 一种改进的编辑距离算法及其在数据处理中的应用[J]. 计算机应用, 2009,29(2): 424-426.
|
|
ZHAO Z P , YIN Z M , WANG Q P ,et al. An improved edit distance algorithm and its application in data processing[J]. Journal of Computer Applications, 2009,29(2): 424-426.
|
[7] |
刘倩 . 基于 Kali Linux 的网络安全技术探讨与研究[D]. 长春:吉林大学, 2018.
|
|
LIU Q . Discussion and research on network security technology based on Kali Linux[D]. Changchun:Jilin University, 2018.
|
[8] |
王乾 . 基于动态二进制分析的关键函数定位技术研究[D]. 郑州:信息工程大学, 2012.
|
|
WANG Q . Research on key function location technology based on dynamic binary analysis[D]. Zhengzhou:Information Engineering University, 2012.
|