[1] |
ZIMMER V , ROTHMAN M , MARISETTY S . Beyond BIOS:developing with the unified extensible firmware interface[M]. Intel Press, 2010.
|
[2] |
BROSSARD J , DEMETRESCU F . Hardware backdooring is prac-tical[J]. BlackHat,Las Vegas,USA, 2009,58(1).
|
[3] |
RONTTI T , JUUSO A M , TAKANEN A . Preventing DoS attacks in NGN networks with proactive specification-based fuzzing[J]. IEEE Communications Magazine, 2012,50(9): 164-170.
|
[4] |
RUI MA , DAGUANG WANG , CHANGZHEN HU , et al. Test data generation for stateful network protocol fuzzing using a rule-based state machine[J]. Tsinghua Science and Technology, 2016,21.
|
[5] |
周仕钧 . 基于二进制补丁比对技术的漏洞特征分析与研究[D]. 昆明: 云南大学, 2013.
|
|
ZHOU S J . Holes characteristics analysis and research based on binary patch[D]. Kunming: Yunnan University, 2013.
|
[6] |
KIM S , KIM R Y C , PARK Y B . Software vulnerability detection methodology combined with static and dynamic analysis[J]. Wire-less Personal Communications, 2015:1-17.
|
[7] |
郑宇军, 张蓓, 薛锦云 . 软件形式化开发关键部件选取的水波优化方法[J]. 软件学报, 2016(4): 933-942.
|
|
ZHENG Y J , ZHANG B , XUE J Y . Water ware optimization method of Software for multination development key components selection[J]. Journal of Software, 2016(4): 933-942.
|
[8] |
CALINESCU R , GHEZZI C , JOHNSON K , et al. Formal verifica-tion with confidence intervals to establish quality of service proper-ties of software systems[J]. IEEE Transactions on Reliability, 2016,65(1):107-125.
|
[9] |
KUMAR S , CHANDRA G , YADAV D . Formal verification of security protocol with B method[C]//IEEE International Confer-ence on Computer and Communication Technology. c2014:161-167.
|
[10] |
LACH J , BINGHAM S , ELKS C , et al. Accessible formal verifica-tion for safety-critical hardware design[C]//Reliability and Main-tainability Symposium,IEEE Computer Society. c2006:29-32.
|
[11] |
CHOI H , YIM M K , LEE J Y , et al. Formal verification of an in-dustrial system-on-a-chip[C]//IEEE International Conference on Computer Design. c2000:453-458.
|
[12] |
LAMPORT L . Specifying systems,the TLA+ language and tools for hardware and software engineers[J]. Software Quality Profes-sional, 2002(4):43.
|
[13] |
CHAUDHURI K , DOLIGEZ D , LAMPORT L , et al. Verifying safety properties with the TLA+ proof system[M]//Automated Reasoning. Berlin Heidelberg:Springer 2010:142-148.
|
[14] |
LU T , MERZ S , WEIDENBACH C . Towards verification of the pastry protocol using TLA+[C]//Formal Techniques for Distrib-uted Systems Proceedings. c2011:244-258.
|
[15] |
KALLENBERG C , BUTTERWORTH J , KOVAH X , et al. Defeat-ing signed BIOS enforcement[J]. EkoParty,Buenos Aires, 2013.
|
[16] |
ZHANG H , MERZ S , GU M . Specifying and verifying PLC sys-tems with TLA+:a case study[J]. Computers & Mathematics with Applications, 2010,60(3):695-705.
|
[17] |
NARAYANA P , CHEN R , ZHAO Y , et al. Automatic vulnerability checking of IEEE 802.16 WiMAX Protocols through TLA+[C]//IEEE Workshop on Secure Network Protocols. c2006:44-49.
|
[18] |
HEASMAN J . Implementing and detecting a PCI rootkit[J]. Re-trieved February, 2006,20:3.
|
[19] |
BUDRUK R , ANDERSON D , SOLARI E . PCI express system architecture[J]. Addison Wesley, 2003.
|
[20] |
YIN Y . Implementation of PCI expansion ROM mechanism[J]. Computer Engineering&Applications, 2005.
|
[21] |
WOJTCZUK R , RUTKOWSKA J . Attacking SMM memory via Intel CPU cache poisoning[J]. Invisible Things Lab, 2009.
|