Jabeen, Qamar, et al. “A survey: Embedded systems supporting by different operating systems.” arXiv preprint arXiv:1610.07899 (2016).Search in Google Scholar
Al-Fuqaha, Ala, et al. “Internet of things: A survey on enabling technologies, protocols, and applications.” IEEE communications surveys & tutorials 17.4 (2015): 2347-2376.10.1109/COMST.2015.2444095Search in Google Scholar
MCMILLAN R. How Hackers Attack Cars[EB/OL]. [2010-05-14]. http://www.pcworld.com/article/196320/how_hackers_attack_cars.html.Search in Google Scholar
VAMOSIZHAN R. Embedded System Security[EB/OL]. [2012-10-01]. http://www.altera.com.cn/technology/systemdesign/articles/2012/embedded-security.html.Search in Google Scholar
KIM L W, VILLASENOR J D. Dynamic function replacement for system-on-chip security in the presence of hardware-based attacks[J]. IEEE Transactions on Reliability, 2014, 63(2): 661-675. DOI:10.1109/tr.2014.231695210.1109/TR.2014.2316952Search in Google Scholar
BIDMESHKI M M, REDDY G R, ZHOU L, et al. Hardware-based Attacks to Compromise the Cryptographic Security of an Election System[C/OL]. [2017-03-02]. DOI:10.1109/iccd.2016.7753274.10.1109/ICCD.2016.7753274Search in Google Scholar
KIROVSKI D, DRINIĆ M, POTKONJAK M. Enabling Trusted Software Integrity[C/OL]. [2017-06-02]. DOI:10.1145/635508.605409.10.1145/635508.605409Search in Google Scholar
CHEN Y, VENKATESAN R, CARY M, et al. Oblivious hashing: A stealthy software integrity verification primitive[C]//Information Hiding. Heidelberg: Springer, 2003: 400-414.Search in Google Scholar
SUH G E, O'DONNELL C W, DEVADAS S. AEGIS: A single-chip secure processor[J]. Information Security Technical Report, 2005, 10(2): 63-73. DOI:10.1016/j.istr.2005.05.00210.1016/j.istr.2005.05.002Search in Google Scholar
OWUSU E, GUAJARDO J, MCCUNE J, et al. OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York: ACM, 2013: 13-24. DOI: 10.1145/2508859.2516678.10.1145/2508859.2516678Search in Google Scholar
GHOSH A K, SWAMINATHA T M. Software security and privacy risks in mobile e-commerce[J]. Communications of the ACM, 2001, 44(2): 51-57. DOI:10.1145/359205.35922710.1145/359205.359227Search in Google Scholar
CHEN P, DESMET L, HUYGENS C. A study on advanced persistent threats[C]//IFIP International Conference on Communications and Multimedia Security. Heidelberg: Springer, 2014: 63-72. DOI:10.1007/978-3-662-44885-4_5.10.1007/978-3-662-44885-4_5Search in Google Scholar
EDGAR C. Ghost Push Malware Can Root Devices and Install Unwanted Apps[EB/OL]. [2015-10-13]. https://www.androidauthority.com/ghost-push-malware-root-apps-fix-648735/.Search in Google Scholar
KOVACS E. BlackEnergy Malware Used in Ukraine Power Grid Attacks[EB/OL]. http://www.securityweek.com/blackenergy-group-uses-destructive-plugin-ukraine-attacks.Search in Google Scholar
LIU Y T, FAN R, TERZIJA V. Power system restoration: A literature review from 2006 to 2016[J]. Journal of Modern Power Systems and Clean Energy, 2016, 4(3): 332-341. DOI:10.1007/s40565-016-0219-210.1007/s40565-016-0219-2Search in Google Scholar
CVE.CVE-2016-4657[EB/OL].[2016-08-25]. https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4657.Search in Google Scholar
BUGIEL S, DAVI L, DMITRIENKO A, et al. Practical and lightweight domain isolation on Android[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. Chicago: ACM, 2011: 51-62. DOI: 10.1145/2046614.2046624.10.1145/2046614.2046624Search in Google Scholar
BALDIN D, KERSTAN T. Proteus, a hybrid virtualization platform for embedded systems[C]//Analysis, Architectures and Modelling of Embedded Systems. Berlin: Springer, 2009: 185-194.10.1007/978-3-642-04284-3_17Search in Google Scholar
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt and U. Roedig, “Securing Communication in 6LoWPAN with Compressed IPsec,” in Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference On, 2011, pp. 1-8.10.1109/DCOSS.2011.5982177Search in Google Scholar
Doraswamy, Naganand, and Dan Harkins. IPSec: the new security standard for the Internet, intranets, and virtual private networks. Prentice Hall Professional, 2003.Search in Google Scholar
Hamed, Hazem, Ehab Al-Shaer, and Will Marrero. “Modeling and verification of IPSec and VPN security policies.” 13th IEEE International Conference on Network Protocols (ICNP'05). IEEE, 2005.Search in Google Scholar
S. Raza, S. Duquennoy, J. Höglund, U. Roedig and T. Voigt, “Secure Communication for the Internet of Things—a comparison of link - layer security and IPsec for 6LoWPAN,” Security and Communication Networks, 2012.10.1002/sec.406Search in Google Scholar
Tan Xinglie, et al. “The Application of PKI Technology in IPSec Series Protocols.” Computer Science 30.5 (2003): 160-163.Search in Google Scholar
Li X.F, Zhao Y.J, Quan C.B. Application of symmetric key encryption algorithm in IPsec protocol [J]. Journal of Electronic Measurement and Instrument, 2014, 28(1): 75-83Search in Google Scholar
Wang Jian, Wang Haihang, Yang Jian. The remote attestation extension of IPsec protocol [J]. Computer Science, 2011, 38(6): 49-53Search in Google Scholar
Internet Engineering Task Force (IETF). RFC8446. The transport layer security (tls) protocol version 1.3[S]. USA: Internet Engineering Task Force (IETF), 2018.Search in Google Scholar
Internet Engineering Task Force (IETF). RFC6101. The secure sockets layer (ssl) protocol version3.0[S]. USA: Internet Engineering Task Force (IETF), 2011.Search in Google Scholar
Jia Fangshu. Research on Security Technology Issues in the Application of Ssl Protocol [J]. Digital User, 2018, 36: 18-19Search in Google Scholar
Z. Z. Wang, Y. Wang. An improvement ssl protocol application research[J]. International Conference on Electronic Mechanical Engineering and Information Technology, 2011, 12(14): 4010-4012Search in Google Scholar
Wei Junlin, Duan Haixin, Wan Tao. Overview of Security Defects in https/tls Protocol Design and Implementation [J]. Journal of Information Security, 2018, 3(2): 1Search in Google Scholar
Tang Yi, Wang Zhishuang. Handshake data analysis of personal online banking ssl/tls protocol [J]. Software Guide, 2017, 16(6): 159-162Search in Google Scholar
Q. Fang, T. Zhe. Qos-aware optimization strategy for security ranking in ssl protocol[J]. IEEE, 2009, 9: 842-847Search in Google Scholar
Wu Zhijun, Jiang Yuanchun, Niu Fangchao. SSL protocol interactive authentication scheme for wide area information management system [J]. Information Security Research, 2017, 3(8): 718-726Search in Google Scholar
THAPLIYAL H, VARUN T S S, KUMAR S D. Adiabatic computing based low-power and DPA-resistant lightweight cryptography for IoT devices[C]//VLSI (ISVLSI), 2017 IEEE Computer Society Annual Symposium on. Washington DC: IEEE, 2017: 621-626. DOI:10.1109/isvlsi.2017.115.10.1109/ISVLSI.2017.115Search in Google Scholar
Wang Kai, Chen Liyun, Wang Zengguang. Refined fingerprint attack method against https protocol website [J]. Journal of Academy of Armored Forces Engineering, 2018, 32(4): 99-104.Search in Google Scholar
Liu Peng, Chen Houwu, Fang Xiao. Research on Network Security Situation Monitoring Mechanism and Model [J]. Information Network Security, 2018, 9: 66-69.Search in Google Scholar
Ma Long, Sun Jianghui, Du Cheng. Research on Network Situation Awareness System Based on Traffic Analysis [J]. Information Technology, 2016, 9: 97-100.Search in Google Scholar
Gao Feng Zhan, Yong Jiang. Research on Network Security Situational Awareness Visualization System [N]. Global Market Information Herald, September 2018.Search in Google Scholar
Zhu Yijie, Yang Yulong, Li Shuai. Research on Network Security Situation Awareness Platform for Big Data Environment [J]. Network Security Technology and Application, 2018, 11: 52-54Search in Google Scholar
X. F. Liu. Machine learning based ddos attack detection from source side in cloud[C]. 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing, American, 2017, 114-120.Search in Google Scholar
Jiang Yibo, Wang Yuchen, Wang Wanliang. Research on Manet Network Intrusion Detection Performance Evaluation Method Based on Machine Learning [J].Computer Science, 2013, 40: 170-174.Search in Google Scholar
MITCHELL M, TIAN G, WANG Z. Systematic audit of third-party android phones[C]//Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. New York: ACM, 2014: 175-186. DOI:10.1145/2557547.2557557.10.1145/2557547.2557557Search in Google Scholar
ENCK W, GILBERT P, HAN S, et al. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones[J]. ACM Transactions on Computer Systems (TOCS), 2014, 32(2): 5. DOI:10.1145/249452210.1145/2494522Search in Google Scholar
EGELE M, KRUEGEL C, KIRDA E, et al. PiOS: Detecting privacy leaks in iOS applications[J]. Network & Distributed System Security Symposium, 2011, 1: 280-291.Search in Google Scholar
ARIAS O, SULLIVAN D, JIN Y. HA2lloc: Hardware-assisted secure allocator[C]//Proceedings of the Hardware and Architectural Support for Security and Privacy. New York: ACM, 2017: 8. DOI:10.1145/3092627.3092635.10.1145/3092627.3092635Search in Google Scholar
DAVI L, HANREICH M, PAUL D, et al. HAFIX: Hardware-assisted flow integrity extension[C]//Proceedings of the 52nd Annual Design Automation Conference. New York: ACM, 2015: 74. DOI:10.1145/2744769.2744847.10.1145/2744769.2744847Search in Google Scholar