{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:22:01Z","timestamp":1742959321621,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_52","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"713-724","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Firmware Vulnerability Mining Model of Power Internet of Things"],"prefix":"10.1007","author":[{"given":"Chao","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ziying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yajuan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Haitao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhimin","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"issue":"8","key":"52_CR1","first-page":"2302","volume":"39","author":"Y Ren","year":"2019","unstructured":"Ren, Y., Zhang, Y., Ai, C.: Survey on taint analysis technology. Comput. Appl. 39(8), 2302\u20132309 (2019)","journal-title":"Comput. Appl."},{"issue":"04","key":"52_CR2","first-page":"860","volume":"28","author":"L Wang","year":"2017","unstructured":"Wang, L., Li, F., Li, L., Feng, X.: Principle and practice of taint analysis. J. Softw. 28(04), 860\u2013882 (2017)","journal-title":"J. Softw."},{"issue":"1","key":"52_CR3","first-page":"135","volume":"28","author":"Z Wu","year":"2017","unstructured":"Wu, Z., Chen, X., Yang, Z., Du, X.: Survey on information flow control. J. Softw. 28(1), 135\u2013159 (2017)","journal-title":"J. Softw."},{"issue":"01","key":"52_CR4","first-page":"45","volume":"2020","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Zhang, K., Sang, H., Zhang, H., Wei, P., Zhou, H.: IoT security annual report. Inf. Secur. Commun. Priv. 2020(01), 45\u201362 (2019)","journal-title":"Inf. Secur. Commun. Priv."},{"unstructured":"Zheng, Y., Davanian, A., Yin, H.: FIRM-AFL: high-throughput grey box fuzzing of IoT firmware via augmented process emulation. In: Proceedings of the 28th USENIX Conference on Security Symposium (SEC 2019), pp. 1099\u20131114 (2019)","key":"52_CR5"},{"doi-asserted-by":"crossref","unstructured":"Pereira, J.D.: Techniques and tools for advanced software vulnerability detection. In: 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 123\u2013126 (2020)","key":"52_CR6","DOI":"10.1109\/ISSREW51248.2020.00049"},{"doi-asserted-by":"crossref","unstructured":"Mera, A., Feng, B., Lu, L., Kirda, E. DICE: automatic emulation of DMA input channels for dynamic firmware analysis. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1938\u20131954 (2021)","key":"52_CR7","DOI":"10.1109\/SP40001.2021.00018"},{"key":"52_CR8","doi-asserted-by":"publisher","first-page":"14171","DOI":"10.1109\/ACCESS.2019.2893733","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Shen, J., Lin, J., Lou, R.: Staged method of code similarity analysis for firmware vulnerability detection. IEEE Access 7, 14171\u201314185 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Sun, Y., Sun, L., Shi, Z., Yu, W., Ying, H.: Vulnerability finding and firmware association in power grid. In: 2019 Fifth Conference on Mobile and Secure Services (MobiSecServ), pp. 1\u20135 (2019)","key":"52_CR9","DOI":"10.1109\/MOBISECSERV.2019.8686515"},{"doi-asserted-by":"crossref","unstructured":"Zhang, B., Xi, Z., Gao, K.: Fuzzy test guidance technology for power internet of things firmware vulnerability detection. In: 2021 IEEE International Conference on Energy Internet (ICEI), pp. 157\u2013163 (2021)","key":"52_CR10","DOI":"10.1109\/ICEI52466.2021.00033"},{"key":"52_CR11","doi-asserted-by":"publisher","first-page":"22434","DOI":"10.1109\/ACCESS.2019.2894178","volume":"7","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Zhou, A., Jia, P., Liu, L., Ma, J., Liu, L.: InsFuzz: fuzzing binaries with location sensitivity. IEEE Access 7, 22434\u201322444 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"52_CR12","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TSE.2017.2785841","volume":"45","author":"M B\u00f6hme","year":"2019","unstructured":"B\u00f6hme, M., Pham, V., Roychoudhury, A.: Coverage-based greybox fuzzing as Markov chain. IEEE Trans. Softw. Eng. 45(5), 489\u2013506 (2019)","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"crossref","unstructured":"Cheng, K., et al.: DTaint: detecting the taint-style vulnerability in embedded device firmware. In: 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 430\u2013441 (2018)","key":"52_CR13","DOI":"10.1109\/DSN.2018.00052"},{"doi-asserted-by":"crossref","unstructured":"Nicho, M., Girija, S.: IoTVT model: a model mapping IoT sensors to IoT vulnerabilities and threats. In: 2021 20th International Conference on Ubiquitous Computing and Communications (IUCC\/CIT\/DSCI\/SmartCNS), pp. 123\u2013129 (2021)","key":"52_CR14","DOI":"10.1109\/IUCC-CIT-DSCI-SmartCNS55181.2021.00032"},{"doi-asserted-by":"crossref","unstructured":"Chen, Y., Tao, Y., Zhai, S., Sui, S.: Design and implementation of a universal offline reading system for embedded device firmware. In: 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), pp. 1307\u20131310 (2022)","key":"52_CR15","DOI":"10.1109\/ICSP54964.2022.9778558"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:13:32Z","timestamp":1685459612000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_52","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}