5Ahmad-Reza S, Marcel S, Christian S, et al. TCG Inside: A Note on TPM Specification Compliance[C]//Proceedings of the First ACM Workshop on Scalable Trusted Computing. New York : ACM Press, 2006 : 47-56.
6Danilo B, Lorenzo C, Andrea L, et al. Replay Attack in TCG Specification and Solution [ C]//21th Annual Computer Security Application Conference (ACSAC' 05). Tucson: IEEE Press, 2005 : 127-137.
7Beizer B. Black-Box Testing : Techniques for Functional Testing of Software and Systems [M]. New York:John Wiley & Sons Press, 1995.
8Beizer B. Software Testing Techniques [M]. New York: International Thomson Computer Press, 1990.
9Cheng K T Using the Automatic Generation of Functional Vectors Extended Finite StateMachine Model[ C ]// ACM Transactions oil Design Automation of Electronic Systems. New York: ACM Press, 1996:57-79.