1 |
https://security.radware.com/ddos-threats-attacks/threat-advisories-attack-reports/mirai-botnet/.
|
2 |
Alexander Khalimonenko, Oleg Kupreev, "DDOS attacks in Q1 2017", Securelist, 05. 2017
|
3 |
Javid Habibi, Aditi Gupa, Stephen Carlsony, Ajay Panicker, "MAVR : Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles," 2015 IEEE 35th International Conference on Distributed Computing Systems, 2015.
|
4 |
Massimo Banzi, "Arduino, Open Source Hardware Summit Speech", OSHW Summit, 09.2011.
|
5 |
http://www.atmel.com/products/microcontrollers/avr/default.aspx
|
6 |
Lucas Davi, Ahmad-Reza, "ROP defender: A detection tool to defend against return-oriented programming attacks", System Security Lab, Ruhr University Bochum, Germany, 03, 2010.
|
7 |
Ralf Hund, Carsten Willems, "Practical Timing Side Channel Attacks against Kernel Space ASLR," 2013 IEEE Symposium on Security and Privacy, pp. 191-205, 2013.
|
8 |
Martin Abadi, Mihai Budiu, "Control-Flow Integrity Principles, Implementations, and Applications," ACM Transactions on Information and System Security, Vol. 13, No. 1, Article 4, pp. 1-40, 2009.
|
9 |
H. S. Ryu, "A Study on the Security Architecture for Secure Smart Home System in IoT", Department of Computer Engineering, Ajou University, 12. 2015.
|
10 |
"The Internet of Things: The Next Growth Engine for the Semiconductor Industrt." PWC, 2015, 3. pp. 23,26.
|
11 |
https://www.arduino.cc/en/Guide/Introduction..
|
12 |
https://www.raspberrypi.org/.
|
13 |
https://beagleboard.org/.
|
14 |
Matthew Ahlmeyer, Alina M. Chircu, ,"SECURING THE INTERNET OF THINGS: A REVIEW", Issues in Information Systems, Volume 17, Issue IV, pp. 21-28, 2016
|
15 |
W. H. Lee, S. M. Kang, C. S. Lim, B. N. Noh, "Research on Memory Initialization through Using Ardunio Temporary Files," KIPS 2016, Vol 23, No 2, 2016.
|
16 |
Sergio Pastrana, "AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices", DIMVA, 07.2016.
|