Abstract:
本设计原则是根据对固件不同的攻击需求和目标选择合适的攻击工具,例如想达到占用内存资源,截屏,监听鼠标键盘,文件访问控制权限,破坏内存数据,使操作系统引导文件被破坏,远程监控并操作计算机,窃取系统中存储的机密信息,攻击硬盘使系统崩溃等目的.
Keyword:
Reprint Author's Address:
Email:
Source :
数字化用户
ISSN: 1009-0843
Year: 2016
Issue: 43
Page: 21
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count: -1
Chinese Cited Count:
30 Days PV: 5
Affiliated Colleges: