Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (1): 150-157.doi: 10.11959/j.issn.2096-109x.2023015
• Papers • Previous Articles Next Articles
Anxiang HU1, Da XIAO2, Shichen GUO1, Shengli LIU1
Revised:
2022-05-11
Online:
2023-02-25
Published:
2023-02-01
Supported by:
CLC Number:
Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU. Hard-coded backdoor detection method based on semantic conflict[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 150-157.
[1] | PAGANINI P . Netgear,Linksys and many other wireless routers have a backdoor security affairs[EB]. |
[2] | 张雄, 李舟军 . 模糊测试技术研究综述[J]. 计算机科学, 2016,43(5): 1-26. |
ZHANG X , LI Z J . Survey of fuzz testing technology[J]. Computer Science, 2016,43(5): 1-26. | |
[3] | SZOR P . The art of computer virus research and defense[J]. Choice Reviews Online, 2005,43(3): 15-16. |
[4] | HEFFNER C . Reverse engineering a d-link backdoor[EB]. |
[5] | 忽朝俭, 薛一波, 赵粮 ,等. 无文件系统嵌入式固件后门检测[J]. 通信学报, 2013,34(8): 140-145. |
HU C J , XUE Y B , ZHAO L ,et al. Backdoor detection in embedded system firmware without file system[J]. Journal on Communications, 2013,34(8): 140-145. | |
[6] | COSTIN A , ZADDACH J , FRANCILLON A ,et al. A large scale analysis of the security of embedded firmwares[C]// Proceedings of the 23rd USENIX Security Symposium. 2014: 95-110. |
[7] | THOMAS S L , CHOTHIA T , GARCIA F D . Stringer:measuring the importance of static data comparisons to detect backdoors and undocumented functionality[M]// Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2017. |
[8] | SHOSHITAISHVILI Y , WANG R , HAUSER C ,et al. Firmaliceautomatic detection of authentication bypass vulnerabilities in binary firmware[C]// Proceedings 2015 Network and Distributed System Security Symposium. 2015: 8-11. |
[9] | ZYXEL NETWORKS . Zyxel security advisory for hardcoded credential vulnerability | Zyxel[EB]. |
[10] | MUENCH M , STIJOHANN J , KARGL F ,et al. What you corrupt is not what you crash:Challenges in fuzzing embedded devices[C]// Network and Distributed System Security Symposium. 2018. |
[11] | CHEN D D , EGELE M , WOO M ,et al. Towards automated dynamic analysis for Linux-based embedded firmware[C]// Proceedings of Network and Distributed System Security Sumposium. 2016. |
[12] | HEFFNER C . Binwalk:Firmware analysis tool[R]. 2010. |
[13] | HEMEL A , KALLEBERG K T , VERMAAS R ,et al. Finding software license violations through binary code clone detection[J]. Proceedings-International Conference on Software Engineering, 2011: 63-72. |
[14] | EAGLE C . IDA Pro[R]. 2012. |
[15] | SHOSHITAISHVILI Y , WANG R , SALLS C ,et al. SOK:(state of) the art of war:Offensive techniques in binary analysis[C]// 2016 IEEE Symposium on Security and Privacy (SP). 2016: 138-157. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|