Page 229 - 《软件学报》2025年第10期
P. 229

4626                                                      软件学报  2025  年第  36  卷第  10  期


                 [27]   Keleket Goma CJY, Yi WZ, Wang J. A lightweight trusted execution environment construction method for fabric chaincode based on
                     SGX. Netinfo Security, 2022, 22(7): 73–83 (in Chinese with English abstract). [doi: 10.3969/j.issn.1671-1122.2022.07.009]
                 [28]   Hofmeyr SA, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3):
                     151–180. [doi: 10.3233/JCS-980109]
                 [29]   Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for Unix processes. In: Proc. of the 1996 IEEE Symp. on Security and
                     Privacy. Oakland: IEEE, 1996. 120–128. [doi: 10.1109/SECPRI.1996.502675]
                 [30]   Onwuzurike L, Mariconti E, Andriotis P, De Cristofaro E, Ross G, Stringhini G. MaMaDroid: Detecting android malware by building
                     Markov chains of behavioral models (extended version). ACM Trans. on Privacy and Security (TOPS), 2019, 22(2): 14. [doi: 10.1145/
                     3313391]
                 [31]   Mishra P, Khurana K, Gupta S, Sharma MK. VMAnalyzer: Malware semantic analysis using integrated CNN and bi-directional LSTM
                     for detecting VM-level attacks in cloud. In: Proc. of the 12th Int’l Conf. on Contemporary Computing (IC3). Noida: IEEE, 2019. 1–6.
                     [doi: 10.1109/IC3.2019.8844877]
                 [32]   Cai XQ, Deng Y, Zhang L, Shi JC, Chen Q, Zheng WL, Liu ZQ, Long Y, Wang K, Li C, Guo MY. The principle and core technology of
                     blockchain.  Chinese  Journal  of  Computers,  2021,  44(1):  84–131  (in  Chinese  with  English  abstract).  [doi:  10.11897/SP.J.1016.2021.
                     00084]
                 [33]   Szabo N. Formalizing and securing relationships on public networks. First Monday, 1997, 2(9). [doi: 10.5210/fm.v2i9.548]
                 [34]   Melo C, Oliveira F, Dantas J, Araujo J, Pereira P, Maciel R, Maciel P. Performance and availability evaluation of the blockchain platform
                     hyperledger fabric. The Journal of Supercomputing, 2022, 78(10): 12505–12527. [doi: 10.1007/s11227-022-04361-2]
                 [35]   Feng  DG,  Liu  JB,  Qin  Y,  Feng  W.  Trusted  computing  theory  and  technology  in  innovation-driven  development.  Scicientia  Sinica
                     Informationis, 2020, 50(8): 1127–1147 (in Chinese with English abstract). [doi: 10.1360/SSI-2020-0096]
                 [36]   TCG Group. TCG specification architecture overview. TCG Specification Revision, 2007, 1(4): 1–24.
                 [37]   Huang HX, Zhang JB, Yuan YL, Wang X. Research on trusted startup of virtual machine based on non-interference theory. Ruan Jian
                     Xue Bao/Journal of Software, 2023, 34(6): 2959–2978 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6507.htm
                     [doi: 10.13328/j.cnki.jos.006507]
                 [38]   Qu YW. Software Behavior. Beijing: Publishing House of Electronics Industry, 2004 (in Chinese).
                 [39]   Huo X, Li M, Zhou ZH. Control flow graph embedding based on multi-instance decomposition for bug localization. In: Proc. of the 34th
                     AAAI Conf. on Artificial Intelligence. New York: AAAI, 2020. 4223–4230. [doi: 10.1609/aaai.v34i04.5844]
                 [40]   Bagherzadeh M, Kahani N, Bezemer CP, Hassan AE, Dingel J, Cordy JR. Analyzing a decade of Linux system calls. Empirical Software
                     Engineering, 2018, 23(3): 1519–1551. [doi: 10.1007/s10664-017-9551-z]
                 [41]   Isohara T, Takemori K, Miyake Y, Qu N, Perrig A. LSM-based secure system monitoring using kernel protection schemes. In: Proc. of
                     the 2010 Int’l Conf. on Availability, Reliability and Security. Krakow: IEEE, 2010. 591–596. [doi: 10.1109/ARES.2010.48]

                 附中文参考文献:
                 [11]   沈昌祥. 用主动免疫可信计算    3.0  筑牢网络安全防线营造清朗的网络空间. 信息安全研究, 2018, 4(4): 282–302. [doi: 10.3969/
                     j.issn.2096-1057.2018.04.001]
                 [13]   崔展齐, 杨慧文, 陈翔, 王林章. 智能合约安全漏洞检测研究进展. 软件学报, 2024, 35(5): 2235–2267. http://www.jos.org.cn/1000-
                     9825/7046.htm [doi: 10.13328/j.cnki.jos.007046]
                 [15]   国家市场监督管理总局, 国家标准化管理委员会. GB/T 22239-2019 信息安全技术 网络安全等级保护基本要求. 北京: 中国标准出
                     版社, 2019. 92.
                 [27]   Keleket Goma CJY, 易文哲, 王鹃. 一种基于  SGX  的轻量  Fabric 链码可信执行环境构建方法. 信息网络安全, 2022, 22(7): 73–83.
                     [doi: 10.3969/j.issn.1671-1122.2022.07.009]
                 [32]   蔡晓晴, 邓尧, 张亮, 史久琛, 陈全, 郑文立, 刘志强, 龙宇, 王堃, 李超, 过敏意. 区块链原理及其核心技术. 计算机学报, 2021, 44(1):
                     84–131. [doi: 10.11897/SP.J.1016.2021.00084]
                 [35]   冯登国, 刘敬彬, 秦宇, 冯伟. 创新发展中的可信计算理论与技术. 中国科学: 信息科学, 2020, 50(8): 1127–1147. [doi: 10.1360/SSI-
                     2020-0096]
                 [37]   黄浩翔, 张建标, 袁艺林, 王晓. 基于无干扰理论的虚拟机可信启动研究. 软件学报, 2023, 34(6): 2959–2978. http://www.jos.org.cn/
                     1000-9825/6507.htm [doi: 10.13328/j.cnki.jos.006507]
                 [38]   屈延文. 软件行为学. 北京: 电子工业出版社, 2004.
   224   225   226   227   228   229   230   231   232   233   234