@article{LI Ji-yuan:46, author = {[LI Ji-yuan, SHI Zhi-qiang, YANG Shou-guo, YING Huan, ZHANG Guo-dong]}, title = {Automatic Identification and Cracking Method for Vulnerable Hash Functions of Embedded Firmwares}, publisher = {Journal of Beijing University of Posts and Telecommunications}, year = {2020}, journal = {Journal of Beijing University of Posts and Telecommunications}, volume = {43}, number = {1}, eid = {46}, pages = {46-53}, keywords = {embedded device firmware;feature extraction;machine learning;identification and cracking of vulnerable Hash functions;constraint solution}, doi = https://journal.bupt.edu.cn/EN/10.13190/j.jbupt.2019-085 }