[1] |
ZHANG Y , PAXSON V . Detecting backdoors[A]. USENIX Security Symposium[C]. Denver,Canada, 2000.12.
|
[2] |
HORNG S J , SU M Y , TSAI J G . A dynamic backdoor detection system based on dynamic link libraries[J]. International Journal of Business and Systems Research, 2008,2(3): 244-257.
|
[3] |
WYSOPAL C , ENG C , SHIELDOS T . Static detection of application backdoors[J]. Datenschutz und Datenschutz-DuD, 2010,34(3): 149-155.
|
[4] |
DAI S F , WEI T , ZHANG C ,et al. A framework to eliminate backdoors from response computable authentication[A]. IEEE Symposium on Security and Privacy[C]. San Francisco,USA, 2012. 3-17.
|
[5] |
ELHAM S , NARGES A . Backdoor detection system using artificial neural network and genetic algorithm[A]. International Conference on Computational and Information Sciences[C]. Chengdu,China, 2011. 817-820.
|
[6] |
HOMMES S , STATE R , ENGEL T . Detecting stealthy backdoors with association rule mining[A]. International IFIP TC 6 Conference on Networking[C]. 2012. 161-171.
|
[7] |
GUILFANOV I . FLIRT[EB/OL]. .
|
[8] |
SCHWARZ B , DEBRAY S , ANDREWS G . Disassembly of executable code revisited[A]. IEEE Working Conference on Reverse Engineering[C]. Richmond,USA, 2002. 45-54.
|
[9] |
KRUEGEL C , ROBERTSON W , VALEUR F ,et al. Static disassembly of obfuscated binaries[A]. USENIX Security Symposium[C]. San Diego,USA, 2004. 255-270.
|
[10] |
Modbus IDA[EB/OL]. .
|
[11] |
TAKANEN A , DEMOTT J , MILLER C . Fuzzing for Software Security Testing and Quality Assurance[M]. Artech House Inc, 2008. 22-32.
|
[12] |
DURAN J , NTAFOS S . An evaluation of random testing[J]. IEEE Transactions on Software Engineering, 1984,10(4): 438-444.
|