[1] IDC. IDC's worldwide quarterly ethernet switch and router tracker shows record ethernet switch market size, weaker router market[EB/OL]. (2014-12-03)[2015-01-10].http://www.idc.com/getdoc.jsp?containerId=prUS25266314.[2] Linder F. Design and Software Vulnerability in Embedded System[EB/OL]. (2003-04-25)[2014-08-19]https://www.blackhat.com/presentations/bh-usa-03/bh-Fed-03-fx.pdf.[3] Lynn M. The holy grail: Cisco IOS shellcode and exploitation techn iques[EB/OL]. (2005)http://cryptome.org/lynn-cisco.pdf.[4] Muniz S, Ortega A. Fuzzing and debugging Cisco IOS[EB/OL]. (2005-11-12)[2014-10-14]. http://www.pdfpedia.com/download/13758/fuzzing-and-debugging-cisoc-ios-blackhat-europe-2011-pdf.html.[5] Li F, Zhang L, Chen D. Vulnerability mining of Cisco router based on fuzzing[C]//2nd International Conference on Systems and Informatics (ICSAI), 2014 IEEE. Shanghai:IEEE Press, 2014: 649-653.[6] Nakibly G, Sosnovich A, Menahem E, et al. OSPF vulnerability to persistent poisoning attacks: a systematic analysis[C]//Proceedings of the 30th Annual Computer Security Applications Conference. 2014 ACM. New York:ACM Press 2014: 336-345.[7] Linder F. Developments in Cisco IOS forensics [EB/OL]. (2009-08-14)[2013-03-10].http://www. blackhat.com/presentions/bn-usa-08/Linder/BH_US_08_Linder_Developments_in_IOS_Froensics.pdf.[8] 陈立根,刘胜利,高翔等. 一种基于动态污点分析的Cisco IOS漏洞攻击检测方法[J]. 小型微型计算机系统,2014,35(08):1798-1802.[9] Kaushik P, Jain A. DroidCheck: android malware detection by behavioral techniques and honeypot[J]. International Journal of Computer Science and Mobile Computing(IJCSMC), 2015, 4(4):829-834.[10] 诸葛建伟, 韩心慧, 周勇林,等. HoneyBow:一个基于高交互式蜜罐技术的恶意代码自动捕获器[J]. 通信学报, 2007, 28(12):8-13.[11] Levchenko K, Pitsillidis A, Chachra N, et al. Click trajectories: End-to-end analysis of the spam value chain[C]//2011 IEEE Symposium on Security and Privacy (SP). 2011 IEEE. Berkeley: IEEE Press, 2011: 431-446.[12] Mohammed M, Chan H A, Ventura N, et al. An automated signature generation approach for polymorphic worms using principal component analysis[J]. Int'l Journal for Information Security Research (IJISR), 2011, 1(1): 45-52.[13] Dynamips project[EB/OL]. 2007. http://www.ip flow.utc.fr/index.php/Cisco_7200_Simulator.[14] Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software[EB/OL]. 2005. http://web.eecs.umich edu/~mahlke/courses/583f12/reading/newsome-ndss05.pdf.[15] Guilfanov I. IDA fast library identification and recognition technology(FLIRT technology): in-depth[EB/OL]. (2012-02-27)[2012-03-11]. http://www.hex-rays,com/products/ida/tech/flirt/in_depth.shtml, 2012.[16] Erdélyi G. IDAPython: User scripting for a complex application[D]. EVTEK:University of Applied Sciences, 2008. |