[1] STANFORD C. Gartner says 6.4 billion connected "things" will be in use in 2016, up 30 percent from 2015[EB/OL].[2017-12-10]. http:www.gartner.com/newsroom/id/3165317. [2] ANTONAKAKIS M, APRIL T, BAILEY M, et al. Understanding the Mirai botnet[C]//Proceedings of the USENIX Security Symposium. Berkeley, CA:USENIX, 2017:1093-1110. [3] FERNANDES E, JUNG J, PRAKASH A. Security analysis of emerging smart home applications[C]//Proceedings of the 2016 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2016:636-654. [4] 360安全实验室.国内智能家庭摄像头安全状况评估报告[EB/OL].[2017-12-12]. http://zt.360.cn/1101061855.php?dtid=1101062370&did=1101783036. (360 Security Lab. Security status assessment report for domestic smart home cameras[EB/OL].[2017-12-12]. http://zt.360.cn/1101061855.php?dtid=1101062370&did=1101783036.) [5] 方滨兴.关于物联网的安全[J].信息通信技术,2010,4(6):4. (FANG B X. About the security of Internet of Things[J]. Information and Communications Technologies, 2010, 4(6):4) [6] MEDAGLIA C M, SERBANATI A. An overview of privacy and security issues in the internet of things[M]//The Internet of Things. New York:Springer, 2010:389-395. [7] WEBER R H. Internet of Things-new security and privacy challenges[J]. Computer Law & Security Review, 2010, 26(1):23-30. [8] RONEN E, SHAMIR A. Extended functionality attacks on IoT devices:the case of smart lights[C]//Proceedings of the 2016 IEEE European Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2016:3-12. [9] ACAR Y, BACKES M, BUGIEL S, et al. SoK:lessons learned from Android security research for appified software platforms[C]//Proceedings of the 2016 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2016:433-451. [10] WIJESEKERA P, BAOKAR A, HOSSEINI A, et al. Android permissions remystified:a field study on contextual integrity[C]//Proceedings of the 24th USENIX Security Symposium. Berkeley, CA:USENIX, 2015:499-514. [11] ROESNER F, KOHNO T, MOSHCHUK A, et al. User-driven access control:Rethinking permission granting in modern operating systems[C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2012:224-238. [12] RAHMATI A, MADHYASTHA H V. Context-specific access control:conforming permissions with user expectations[C]//Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. New York:ACM, 2015:75-80. [13] YU T, SEKAR V, SESHAN S, et al. Handling a trillion (unfixable) flaws on a billion devices:Rethinking network security for the Internet-of-Things[C]//Proceedings of the 14th ACM Workshop on Hot Topics in Networks. New York:ACM, 2015:Article No. 5. [14] FOULADI B, GHANOUN S. Honey, I'm Home!!-Hacking Z-wave home automation systems[EB/OL].[2017-12-10]. https://cybergibbons.com/wp-content/uploads/2014/11/honeyimhome-131001042426-phpapp01.pdf. [15] FERNANDES E, JUNG J, PRAKASH A. Security analysis of emerging smart home applications[C]//Proceedings of the 2016 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2016:636-654. [16] 罗军舟,杨明,凌振,等.网络空间安全体系与关键技术[J].中国科学:信息科学,2016,46(8):939-968. (LUO J Z, YANG M, LING Z, et al. Architecture and key technologies of cyberspace security[J]. SCIENTIA SINICA Informationis, 2016, 46(8):939-968.) |