期刊文献+

基于多属性决策的嵌入式操作系统识别技术 被引量:4

Embedded systems recognition based on multi-attribute decision making
在线阅读 下载PDF
导出
摘要 针对嵌入式固件逆向解析过程中操作系统类型识别困难的问题,提出了一种基于多属性决策的嵌入式操作系统识别技术。对固件映像中反映出的嵌入式操作系统的多种特征进行综合分析并构建了相关的识别模型,利用向量夹角余弦计算与标准系统之间的相似度,最后阐述了识别的基本思想和具体实现流程。实验结果表明,该方法在某些特征缺失的情况下仍能得到较准确的识别结果。 Concerning the problem that it is difficult to recognize operating system type in embedded firmware reversing analysis,a recognition technology based on Multi-Attribute Decision Making(MADM) was proposed.The paper comprehensively analyzed the multiple features in the firmware,built a recognition model,and calculated the similarity using the vector included angle cosine method.The basic idea of recognition and the concrete realization of the process were described.The experimental results show that this method can get more accurate recognition results in the cases with some features missing.
出处 《计算机应用》 CSCD 北大核心 2012年第4期1060-1063,共4页 journal of Computer Applications
关键词 嵌入式 固件 逆向解析 操作系统 多属性决策 向量夹角余弦 相似度 embedded firmware reverse analysis operating system Multi-Attribute Decision Making(MADM) vector included angle cosine similarity
  • 相关文献

参考文献9

  • 1EILAM E.Reversing:Secrets of reverse engineering[M].Trade-marks:Wiley Publishing,Inc,2005.
  • 2The gzip home page[EB/OL].[2011-07-27].http://www.gz-ip.org.
  • 3Bzip2[EB/OL].[2011-06-10].http://www.bzip.org/1.0.5/bzip2-manual-1.0.5.html.
  • 4蒋烈辉.固件代码逆向分析研究与系统设计[D].郑州:信息工程大学,2007.
  • 5BREEUWSMA M,de JONGH M,KLAVER C,et al.Forensic datarecovery from flash memory[J].Small Scale Digital Device ForensicsJournal,2007,1(1):1-16.
  • 6BREEUWSMA I M F.Forensic imaging of embedded systems usingJTAG[J].Digital Investigation,2006,3(1):32-42.
  • 7Linksys WRT54G series[EB/OL].[2011-10-29].http://en.wikipedia.org/wiki/Linksys_WRT54G_series.
  • 8WRTrouters.[EB/OL].[2011-10-01].http://wrt54g.net/.
  • 9μClinux小型化的做法-可执行文件格式[EB/OL].[2008-08-02].http://linux.chinaunix.net/techdoc/system/2008/08/02/1022247.shtml.

共引文献1

同被引文献20

  • 1王博,曾温特.一种基于轨迹分布模式的网络机器人用户意图识别方法[J].微型电脑应用,2011(12):51-52. 被引量:1
  • 2马少霞,孟晓风,钟波.基于边界扫描技术的测试系统设计[J].电子技术应用,2006,32(1):95-97. 被引量:6
  • 3沙超,陈云芳.一种基于TCP/IP协议栈的操作系统识别技术[J].计算机技术与发展,2006,16(10):125-127. 被引量:11
  • 4冯晓飞.基于WINCE的主机安全测试系统设计与关键技术研究[D].国防科学技术大学,2010.
  • 5Gao H, Li Q, Zhu Y. Research on the working mechanism of Bootkit[ C] //Sth International Conference on Information Science and Digital Content Technology. IEEE, 2012: 476-479.
  • 6Cooper D, Polk W, Regenscheid A, et al. BIOS protection guidelines [J]. NIST Special Publication, 2011, 800: 147.
  • 7Li X, Wen Y, Huang M H, et al. An overview of Bootkit at- tacking approaches [C] //Seventh International Conference onMobile Ad-boc and Sensor Networks. IEEE, 2011: 428-431.
  • 8BH13US Workshop. Embedded devices security and firmware reverse engineering [C] //BLACKHAT, 2013.
  • 9Bellard F. Qemu: Open source processor emulator [EB/OL]. http://savannah, nongnu, org/projects/qemu,2009.
  • 10Yiu J. The definitive guide to the ARM Cortex-M3[M]. Ac- cess Online via Elsevier, 2009.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部