“…Some relay protection devices are deployed in the open environment or user side, lacking physical access control or insufficient control, which makes the devices easy to be directly contacted by attackers. At the same time, due to the diversity and difference of software and hardware of relay protection equipment, and more and more embedded terminal firmware are exposed with weak password, backdoor and other defects, the information security of relay protection equipment is facing great challenges [1][2][3].…”