Page 229 - 《软件学报》2025年第10期
P. 229
4626 软件学报 2025 年第 36 卷第 10 期
[27] Keleket Goma CJY, Yi WZ, Wang J. A lightweight trusted execution environment construction method for fabric chaincode based on
SGX. Netinfo Security, 2022, 22(7): 73–83 (in Chinese with English abstract). [doi: 10.3969/j.issn.1671-1122.2022.07.009]
[28] Hofmeyr SA, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3):
151–180. [doi: 10.3233/JCS-980109]
[29] Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for Unix processes. In: Proc. of the 1996 IEEE Symp. on Security and
Privacy. Oakland: IEEE, 1996. 120–128. [doi: 10.1109/SECPRI.1996.502675]
[30] Onwuzurike L, Mariconti E, Andriotis P, De Cristofaro E, Ross G, Stringhini G. MaMaDroid: Detecting android malware by building
Markov chains of behavioral models (extended version). ACM Trans. on Privacy and Security (TOPS), 2019, 22(2): 14. [doi: 10.1145/
3313391]
[31] Mishra P, Khurana K, Gupta S, Sharma MK. VMAnalyzer: Malware semantic analysis using integrated CNN and bi-directional LSTM
for detecting VM-level attacks in cloud. In: Proc. of the 12th Int’l Conf. on Contemporary Computing (IC3). Noida: IEEE, 2019. 1–6.
[doi: 10.1109/IC3.2019.8844877]
[32] Cai XQ, Deng Y, Zhang L, Shi JC, Chen Q, Zheng WL, Liu ZQ, Long Y, Wang K, Li C, Guo MY. The principle and core technology of
blockchain. Chinese Journal of Computers, 2021, 44(1): 84–131 (in Chinese with English abstract). [doi: 10.11897/SP.J.1016.2021.
00084]
[33] Szabo N. Formalizing and securing relationships on public networks. First Monday, 1997, 2(9). [doi: 10.5210/fm.v2i9.548]
[34] Melo C, Oliveira F, Dantas J, Araujo J, Pereira P, Maciel R, Maciel P. Performance and availability evaluation of the blockchain platform
hyperledger fabric. The Journal of Supercomputing, 2022, 78(10): 12505–12527. [doi: 10.1007/s11227-022-04361-2]
[35] Feng DG, Liu JB, Qin Y, Feng W. Trusted computing theory and technology in innovation-driven development. Scicientia Sinica
Informationis, 2020, 50(8): 1127–1147 (in Chinese with English abstract). [doi: 10.1360/SSI-2020-0096]
[36] TCG Group. TCG specification architecture overview. TCG Specification Revision, 2007, 1(4): 1–24.
[37] Huang HX, Zhang JB, Yuan YL, Wang X. Research on trusted startup of virtual machine based on non-interference theory. Ruan Jian
Xue Bao/Journal of Software, 2023, 34(6): 2959–2978 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6507.htm
[doi: 10.13328/j.cnki.jos.006507]
[38] Qu YW. Software Behavior. Beijing: Publishing House of Electronics Industry, 2004 (in Chinese).
[39] Huo X, Li M, Zhou ZH. Control flow graph embedding based on multi-instance decomposition for bug localization. In: Proc. of the 34th
AAAI Conf. on Artificial Intelligence. New York: AAAI, 2020. 4223–4230. [doi: 10.1609/aaai.v34i04.5844]
[40] Bagherzadeh M, Kahani N, Bezemer CP, Hassan AE, Dingel J, Cordy JR. Analyzing a decade of Linux system calls. Empirical Software
Engineering, 2018, 23(3): 1519–1551. [doi: 10.1007/s10664-017-9551-z]
[41] Isohara T, Takemori K, Miyake Y, Qu N, Perrig A. LSM-based secure system monitoring using kernel protection schemes. In: Proc. of
the 2010 Int’l Conf. on Availability, Reliability and Security. Krakow: IEEE, 2010. 591–596. [doi: 10.1109/ARES.2010.48]
附中文参考文献:
[11] 沈昌祥. 用主动免疫可信计算 3.0 筑牢网络安全防线营造清朗的网络空间. 信息安全研究, 2018, 4(4): 282–302. [doi: 10.3969/
j.issn.2096-1057.2018.04.001]
[13] 崔展齐, 杨慧文, 陈翔, 王林章. 智能合约安全漏洞检测研究进展. 软件学报, 2024, 35(5): 2235–2267. http://www.jos.org.cn/1000-
9825/7046.htm [doi: 10.13328/j.cnki.jos.007046]
[15] 国家市场监督管理总局, 国家标准化管理委员会. GB/T 22239-2019 信息安全技术 网络安全等级保护基本要求. 北京: 中国标准出
版社, 2019. 92.
[27] Keleket Goma CJY, 易文哲, 王鹃. 一种基于 SGX 的轻量 Fabric 链码可信执行环境构建方法. 信息网络安全, 2022, 22(7): 73–83.
[doi: 10.3969/j.issn.1671-1122.2022.07.009]
[32] 蔡晓晴, 邓尧, 张亮, 史久琛, 陈全, 郑文立, 刘志强, 龙宇, 王堃, 李超, 过敏意. 区块链原理及其核心技术. 计算机学报, 2021, 44(1):
84–131. [doi: 10.11897/SP.J.1016.2021.00084]
[35] 冯登国, 刘敬彬, 秦宇, 冯伟. 创新发展中的可信计算理论与技术. 中国科学: 信息科学, 2020, 50(8): 1127–1147. [doi: 10.1360/SSI-
2020-0096]
[37] 黄浩翔, 张建标, 袁艺林, 王晓. 基于无干扰理论的虚拟机可信启动研究. 软件学报, 2023, 34(6): 2959–2978. http://www.jos.org.cn/
1000-9825/6507.htm [doi: 10.13328/j.cnki.jos.006507]
[38] 屈延文. 软件行为学. 北京: 电子工业出版社, 2004.

