Tài liệu tham khảo |
Loại |
Chi tiết |
[1] K. Ashton, “That ‘internet of things’ thing,” RFID J., vol. 22, no. 7, pp. 97–114, 2009 |
Sách, tạp chí |
Tiêu đề: |
That ‘internet of things’ thing,” "RFID J |
|
[2] International Telecommunication Union, “Overview of the Internet of things, Recommendation ITU-T Y.20602013.” [Online]. Available: [Online]. Available:https://www.itu.int/rec/T-REC-Y.2060-201206-I |
Sách, tạp chí |
Tiêu đề: |
Overview of the Internet of things, Recommendation ITU-T Y.20602013 |
|
[6] A L Johnson, Symantec Security Response, “IoT devices being increasingly used for DDoS attacks,” 2016. [Online]. Available |
Sách, tạp chí |
Tiêu đề: |
IoT devices being increasingly used for DDoS attacks |
|
[7] W. Zhou, Y. Jia, A. Peng, Y. Zhang, and P. Liu, “The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved,”IEEE Internet Things J., vol. 6, no. 2, pp. 1606–1616, 2018, doi:https://doi.org/10.1109/JIOT.2018.2847733 |
Sách, tạp chí |
Tiêu đề: |
The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved,” "IEEE Internet Things J |
|
[8] Andrei Costin, “Large Scale Security Analysis of Embedded Devices’ Firmware,” Thesis of Doctor, Paris Institute of Technology, France, 2016 |
Sách, tạp chí |
Tiêu đề: |
Large Scale Security Analysis of Embedded Devices’ Firmware |
|
[9] Costin, Andrei, and Jonas Zaddach, “IoT malware: Comprehensive survey, analysis framework and case studies,” presented at the BlackHat USA, 2018 |
Sách, tạp chí |
Tiêu đề: |
IoT malware: Comprehensive survey, analysis framework and case studies |
|
[10] Mikhail Kuzin, Yaroslav Shmelev, Vladimir Kuskov, “New trends in the world of IoT threats,” 2018. [Online]. Available: https://securelist.com/new-trends-in-the-world-of-iot-threats/87991/. Visited on: 15/2/2019 |
Sách, tạp chí |
Tiêu đề: |
New trends in the world of IoT threats |
|
[11] Helenius Marko, “A system to support the analysis of antivirus products’ virus detection capabilities.” Tampere University Press, 2002 |
Sách, tạp chí |
Tiêu đề: |
A system to support the analysis of antivirus products’ virus detection capabilities |
|
[12] Ed Skoudis, Lenny Zeltser, “Malware: fighting malicious code.” Prentice Hall, 2004 |
Sách, tạp chí |
Tiêu đề: |
Malware: fighting malicious code |
|
[13] Kaspersky Lab report, “IoT: a malware story,” Securelist - Kaspersky Lab’s cyberthreat research and reports. https://securelist.com/iot-a-malware-story/94451/(accessed Dec. 19, 2019) |
Sách, tạp chí |
Tiêu đề: |
IoT: a malware story,” "Securelist - Kaspersky Lab’s cyberthreat research and reports |
|
[14] P. Beltrán-García, E. Aguirre-Anaya, P. J. Escamilla-Ambrosio, and R. Acosta- Bermejo, “IoT Botnets,” in Telematics and Computing, Cham, 2019, pp. 247–257 |
Sách, tạp chí |
Tiêu đề: |
IoT Botnets,” in "Telematics and Computing |
|
[15] Angrishi Kishore, “Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets.” arXiv preprint arXiv:1702.03681, 2017 |
Sách, tạp chí |
Tiêu đề: |
Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets |
|
[16] Allix Kevin, et al., “A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?,” 2014, pp. 384–393. doi:https://doi.org/10.1109/COMPSAC.2014.61 |
Sách, tạp chí |
Tiêu đề: |
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected |
|
[17] Muhammad Junaid Bohio, “Analysis of a MIPS Malware.” SANS Institute, 2015. [Online]. Available: [Online]. Available: https://www.sans.org/reading-room/whitepapers/malicious/analyzing-backdoor-bot-mips-platform-35902. Visited on:16/7/2017 |
Sách, tạp chí |
Tiêu đề: |
Analysis of a MIPS Malware |
|
[18] De Donno Michele, et al, “DDoS-capable IoT malwares: Comparative analysis and Mirai investigation,” Secur. Commun. Netw. Hindawi, pp. 1–30, 2018, doi:https://doi.org/10.1155/2018/7178164 |
Sách, tạp chí |
Tiêu đề: |
DDoS-capable IoT malwares: Comparative analysis and Mirai investigation,” "Secur. Commun. Netw. Hindawi |
|
[19] Celeda, P., Krejci, R., & Krmicek, V., “Revealing and analysing modem malware,” |
Sách, tạp chí |
Tiêu đề: |
Revealing and analysing modem malware |
|
[20] Celeda, P., Krejcí, R., Vykopal, J., & Drasar, M., “Embedded malware-an analysis of the Chuck Norris botnet,” 2010, pp. 3–10. doi:https://doi.org/10.1109/EC2ND.2010.15 |
Sách, tạp chí |
Tiêu đề: |
Embedded malware-an analysis of the Chuck Norris botnet |
|
[21] Домът на Виерко, “lightaidra 0x2012 (aidra),” 2013. [Online]. Available: https://vierko.org/tech/lightaidra-0x2012/. Visited on: 19/9/2017 |
Sách, tạp chí |
Tiêu đề: |
lightaidra 0x2012 (aidra) |
|
[22] Symantec Official Blog, “Linux.Wifatch,” 2015. [Online]. Available: https://www.symantec.com/security_response/writeup.jsp?docid=2015-011216-2314-99&tabid=2. Visited on: 19/9/2017 |
Sách, tạp chí |
|
[23] Kolias Constantinos, et al., “DDoS in the IoT: Mirai and other botnets,” IEEE Comput., vol. 50, no. 7, pp. 80–84, 2017, doi: https://doi.org/10.1109/MC.2017.201 |
Sách, tạp chí |
Tiêu đề: |
DDoS in the IoT: Mirai and other botnets,” "IEEE Comput |
|