[1]
A. Goswami, T. Bezboruah and K.C. Sarma, Design of an Embedded System For Monitoring and Controlling Temperature and Light, International journal of electronic engineering research, 2009, 1(1): 27–36.
Google Scholar
[2]
Krzyszt, Design of Embedded System, Department of Computer Science Lund Institute of Technology Sweden (2013).
Google Scholar
[3]
Z. Basnight, J. Butts, J. Lopez Jr, and T. Dube, Firmware modi_cation attacks on programmable logic controllers, International Journal of Critical Infrastructure Protection (2013).
DOI: 10.1016/j.ijcip.2013.04.004
Google Scholar
[4]
V. Chipounov and G. Candea, Reverse engineering of binary device drivers with revnic, In Proceedings of the 5th European conference on Computer systems, 2010: 167-180.
DOI: 10.1145/1755913.1755932
Google Scholar
[5]
A. Cui, M. Costello, and S. J. Stolfo, When _rmware modi_cations attack: A case study of embedded exploitation, In Proceedings of the Symposium on Network and Distributed System Security (NDSS) (2013).
Google Scholar
[6]
L. R. McMinn, External veri_cation of scada system embedded controller _rmware, Technical report, DTIC Document (2012).
Google Scholar
[7]
A. Cui and S. J. Stolfo, A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010: 97-106.
DOI: 10.1145/1920261.1920276
Google Scholar