參考文獻 |
[1] Arm trustzone technology. [Online]. Available: https://developer.arm.com/ipproducts/
securityip/
trustzone
[2] Aws iot device management. [Online]. Available: https://aws.amazon.com/tw/iotdevicemanagement/
[3] Azure iot 中心. [Online]. Available: https://azure.microsoft.com/zhtw/
services/iothub/
[4] Broadband forum. [Online]. Available: https://www.broadbandforum.
org/
[5] Certificate revocation lists. [Online]. Available: https://tools.ietf.org/html/rfc3280
[6] 什麼是惡意程式、病毒、間諜程式與cookie? [Online].
Available: https://www.websecurity.digicert.com/zh/hk/securitytopics/
whataremalwarevirusesspywareandcookiesandwhatdifferentiatesthem
[7] Global platform. [Online]. Available: https://globalplatform.org
[8] Heap overflow. [Online]. Available: https://resources.infosecinstitute.com/heapoverflowvulnerabilityandheapinternalsexplained/
[9] Libtomcrypt. [Online]. Available: https://www.libtom.net/LibTomCrypt/
[10] Mbedtls. [Online]. Available: https://tls.mbed.org
[11] mosquitto api. [Online]. Available: https://mosquitto.org/api/files/mosquittoh.
html
[12] Online certificate status protocol. [Online]. Available: https://tools.ietf.org/html/
rfc6960
34
[13] Optee.
[Online]. Available: https://www.optee.
org
[14] Opkg package manager. [Online]. Available: https://oldwiki.archive.openwrt.org/
doc/techref/opkg
[15] Software updates for internet of things. [Online]. Available: https://datatracker.ietf.
org/doc/draftietfsuitarchitecture/
[16] Stack overflow. [Online]. Available: https://www.gnu.org/software/guile/manual/
html_node/StackOverflow.
html
[17] Tee management framework: Open trust protocol (otrp) profile v1.0. [Online]. Available:
https://globalplatform.org/specslibrary/
teemanagementframeworkopentrustprotocol/
[18] Teep protocol. [Online]. Available: https://datatracker.ietf.org/doc/draftietfteepprotocol/
[19] Trusty tee. [Online]. Available: https://source.android.com/security/trusty
[20] (2007, apr) Simple object access protocol (soap) 1.2. [Online]. Available:
https://www.w3.org/TR/soap12/
[21] (2007, dec) Tr069
cpe wan management protocol v1.1. [Online]. Available:
https://www.broadbandforum.
org/download/TR069_
Amendment2.
pdf
[22] (2019, mar) Mqtt version 5.0. [Online]. Available: https://docs.oasisopen.
org/mqtt/
mqtt/v5.0/mqttv5.0.
html
[23] N. AYEB, E. RUTTEN, S. BOLLE, T. COUPAYE, and M. DOUET, “Towards
an autonomic and distributed device management for the internet of things,” 2019
IEEE 4th International Workshops on Foundations and Applications of Self* Systems
(FAS*W), 2019.
[24] D. Beattie. (2018, sep) What are subordinate cas and why would you want
your own? [Online]. Available: https://www.globalsign.com/en/blog/whatisanintermediateorsubordinatecertificateauthority
[25] R. Dhobi, S. Gajjar, D. Parmar, and T. Vaghela, “Secure firmware update over the air
using trustzone,” 2019 Innovations in Power and Advanced Computing Technologies
(iPACT),
vol. 1, pp. 1–4, 2019.
[26] A. K. Einav Zilberstein. (2017, jul) A detailed overview of the different
security methods one can use in an e.mmc storage device. [Online]. Available:
https://documents.westerndigital.com/content/dam/doclibrary/
en_us/assets/
public/westerndigital/
collateral/whitepaper/
whitepaperemmcsecurity.
pdf
[27] L. Encrypt. (2020, feb) Chain of trust. [Online]. Available: https://letsencrypt.org/
certificates/#rootcertificates
[28] I. Ijaz, “Design and implementation of pki (for multi domain environment),” International
Journal of Computer Theory and Engineering, pp. 505–509, 2012.
[29] S. Jansen and M. Cusumano, “Defining software ecosystems: A survey of software
platforms and business network governance,” Software Ecosystems: Analyzing and
Managing Business Networks in the Software Industry, vol. 879, 01 2013.
[30] I. JSON. [Online]. Available: https://www.json.org/jsonen.
html
[31] A. Kolehmainen, “Secure firmware updates for iot: A survey,” 2018 IEEE International
Conference on Internet of Things (iThings) and IEEE Green Computing
and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing
(CPSCom) and IEEE Smart Data (SmartData), pp. 112–117, 2018.
[32] O. Limited. (2009, may) Open mobile terminal platform (omtp) in the
advanced trusted environment: Omtp tr1 version 1.1 standard. [Online].
Available: https://www.gsma.com/newsroom/wpcontent/
uploads/2012/03/
omtpadvancedtrustedenvironmentomtptr1v11.pdf
[33] D. K. Nilsson, L. Sun, and T. Nakajima, “A framework for selfverification
of
firmware updates over the air in vehicle ecus,” 2008 IEEE Globecom Workshops,
2008.
[34] A. Rosiello. The basics of shellcoding. [Online]. Available: http:
//www.infosecwriters.com/text_resources/pdf/basics_of_shellcoding.pdf
[35] C. S. C. Services. (2019, feb) Cisco root ca 2048 certificate policy. [Online].
Available: https://www.cisco.com/security/pki/policies/CiscoRootCA2048CP.
pdf
[36] N. Tarate, “Using arm trustzone to implement downloadable cas framework and secure
media pipeline in iptv client devices,” 2018 IEEE International Symposium on
Broadband Multimedia Systems and Broadcasting (BMSB), pp. 1–11, 2018.
[37] C. Teng, J. Gong, Y. Wang, C. Chuang, and M. Chen, “Firmware over the air for
home cybersecurity in the internet of things,” 2017 19th AsiaPacific
Network Operations
and Management Symposium (APNOMS), pp. 123–128, 2017.
[38] P. Thakur, V. Bodade, A. Achary, M. Addagatla, N. Kumar, and Y. Pingle, “Universal
firmware upgrade overtheair
for iot devices with security,” 2019 6th International
Conference on Computing for Sustainable Global Development (INDIACom), pp.
27–30, 2019.
[39] Y. Yang, J. Moon, K. Jung, and J. Kim, “Downloadable trusted applications on tizen
™ tv: Trustware™extension: As a downloadable application framework,” 2018
IEEE International Conference on Consumer Electronics (ICCE), pp. 1–4, 2018. |