期刊文献+

新视角下的嵌入式Linux固件模拟技术研究

下载PDF
导出
摘要 文章以实现固件模拟轻量化及降低固件模拟开发门槛为研究目的,以Linux物联网设备的固件作为研究对象,采用User Mode Linux和Qemu User Mode作为仿真技术的支撑,提出了一种新视角下的嵌入式Linux固件模拟技术,并集成开发了基于UML的固件虚拟仿真引擎,最后在固件安全研究中实现应用。实验证明,该技术能提高固件模拟便利性和研究员测试效率,并降低物联网设备模拟门槛。
作者 信心 陈焕
出处 《信息网络安全》 CSCD 北大核心 2021年第S01期227-230,共4页 Netinfo Security
  • 相关文献

参考文献4

二级参考文献15

  • 1Touch J D. Those pesky NATs [ J ]. IEEE Internet Computing, 2002 (7/ 8).
  • 2Wood D, Stoss V, Chan-Lizardo L, et al. Virtual private networks [ C ]// Private Switching Systems and Networks,Jun 1988.
  • 3Sadanori Aoyagi, Makoto Takizawa, Masato Saito, et al. ELA: A Fully Distributed VPN System over Peer-to-Peer Network [ C ]//Proceedings of the 2005 Symposium on Applications and the Internet,2005.
  • 4Ion Stoica, Robert Morris, David Karger M, et al. Chord: A Scalable Peertopeer Lookup Service for Internet Applications [ C ]//Proceedingsof the 2001 conference on Applications, technologies, architectures, and protocols for computer communications ,2001.
  • 5Hosner C. OpenVPN and the SSL VPN Revolution [ J ]. Sans Institute InfoSec Reading Room, 2004.
  • 6Bram Cohen. Incentives Build Robustness in BitTorrent [ C ]//Workshop on Economics of Peer-to-Peer systems,2003,22.
  • 7Luca Deri, Richard Andrews. N2N: A Layer Two Peer-to-Peer VPN [ C ]//Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security ,July ,2008.
  • 8M Y Maxim Krasnyansky. Universal TUN/TAP driver[ OL]. 1999. http://vtun, sourceforge, net/tun/.
  • 9Jordan Smarr, Ricky Biggers , Wenjun Zeng. Penetrating the NAT:Why and How? [ D]. 2008.
  • 10Schneier B, Kelsey J, Whiting D, et al. Twofish : A 128-Bit Block Cipher [ OL]. 1998. http ://www. counterpane, com/twofish, html.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部