{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:22:53Z","timestamp":1761110573734,"version":"3.37.3"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802432"],"award-info":[{"award-number":["61802432"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3017088","type":"journal-article","created":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T21:30:27Z","timestamp":1597699827000},"page":"150226-150241","source":"Crossref","is-referenced-by-count":12,"title":["Research on Security Detection Technology for Internet of Things Terminal Based on Firmware Code Genes"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-7059-6768","authenticated-orcid":false,"given":"Xinbing","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-8712-3887","authenticated-orcid":false,"given":"Qingbao","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-8901-1002","authenticated-orcid":false,"given":"Zhifeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guimin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Shan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Development Technology of Embedded Linux System Based on ARM","year":"2014","author":"lei","key":"ref39"},{"journal-title":"See MIPS Run Linux","year":"2010","author":"sweetman","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2688383"},{"journal-title":"CCF Held Seminar on Software Gene in ZhengZhou","year":"2019","key":"ref32"},{"journal-title":"Written After the Sub-Forum of &#x2018;Software Genetics Technology&#x2019; (I)","year":"2019","key":"ref31"},{"journal-title":"Written After the Sub-Forum of &#x2018;Software Genetics Technology&#x2019; (I)","year":"2019","key":"ref30"},{"journal-title":"Assembly language for x86 processors","year":"2011","author":"irvine","key":"ref37"},{"journal-title":"Machine Learning","year":"2016","author":"zhihua","key":"ref36"},{"journal-title":"Discrete Mathematics with Graph Theory","year":"2020","author":"edgar","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2009.220"},{"journal-title":"Thoughts on a Vulnerability in Industrial Control System","year":"2019","key":"ref10"},{"journal-title":"Introduction to Graph Theory (Classic)","year":"2018","author":"west","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897900"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3329786"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3125502.3125541"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134050"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523650"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"ref19","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","author":"costin","year":"2014","journal-title":"Proc Usenix Secur Symp"},{"journal-title":"The gene An intimate history","year":"2018","author":"mukherjee","key":"ref28"},{"key":"ref4","first-page":"2288","article-title":"VNDS: An algorithm for crossplatform vulnerability searching in binary firmware","volume":"53","author":"qing","year":"2016","journal-title":"J Comput Res Develop"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959089"},{"key":"ref6","first-page":"9629381:1","article-title":"Understanding security requirements and challenges in Internet of Things (IoTs): A review","volume":"2019","author":"khan","year":"2019","journal-title":"J Comput Netw Commun"},{"key":"ref29","first-page":"1813","article-title":"Detection and classification of Android malware based on malware gene","volume":"36","author":"jin","year":"2019","journal-title":"Appl Res Comput"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"article-title":"The Internet of Things in the cybercrime underground","year":"2019","author":"hilt","key":"ref8"},{"journal-title":"Talking About the Safety of Camera","year":"2019","key":"ref7"},{"journal-title":"In-depth Analysis Report on Internet of Things Security and Applications in 2018","year":"2020","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934365"},{"journal-title":"The Internet of Things White Paper","year":"2018","key":"ref1"},{"journal-title":"MATLAB from Entry to the Master","year":"2015","author":"xin","key":"ref46"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"journal-title":"The IDA Pro Book","year":"2012","author":"eagle","key":"ref45"},{"journal-title":"Using BusyBox (Digital Short Cut)","year":"2006","author":"hallinan","key":"ref48"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"journal-title":"OpenSSL and Network Information Security Foundation Structure and Instructions","year":"2007","author":"zhihai","key":"ref47"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"ref42","first-page":"120","article-title":"Combinatorial optimization: Theory and algorithms","volume":"146","author":"korte","year":"2002","journal-title":"Algorithms Combinatorics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"journal-title":"Graph Theory and Network Flow Theory","year":"2009","author":"suixiang","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-018-9435-5"},{"journal-title":"How to Think Like A Computer Scientist Learning with Python","year":"2016","author":"downey","key":"ref44"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_23"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2170414"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_14"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09169679.pdf?arnumber=9169679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:14Z","timestamp":1639770914000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9169679\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":48,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/access.2020.3017088","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}