Folgen
Ang Cui
Ang Cui
Bestätigte E-Mail-Adresse bei cs.columbia.edu
Titel
Zitiert von
Zitiert von
Jahr
When firmware modifications attack: A case study of embedded exploitation
A Cui, M Costello, S Stolfo
2662013
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
A Cui, SJ Stolfo
Proceedings of the 26th Annual Computer Security Applications Conference, 97-106, 2010
2162010
Concurrency attacks
J Yang, A Cui, S Stolfo, S Sethumadhavan
4th USENIX Workshop on Hot Topics in Parallelism (HotPar 12), 2012
772012
Defending embedded systems with software symbiotes
A Cui, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 358-377, 2011
742011
{BADFET}: Defeating Modern Secure Boot Using {Second-Order} Pulsed Electromagnetic Fault Injection
A Cui, R Housley
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
592017
Brave new world: Pervasive insecurity of embedded network devices
A Cui, Y Song, PV Prabhu, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 378-380, 2009
402009
Ethics in security vulnerability research
AM Matwyshyn, A Cui, AD Keromytis, SJ Stolfo
IEEE Security & Privacy 8 (2), 67-72, 2010
352010
Methods, systems, and media for inhibiting attacks on embedded devices
A Cui, SJ Stolfo
US Patent 9,392,017, 2016
302016
Symbiotes and defensive mutualism: Moving target defense
A Cui, SJ Stolfo
Moving target defense, 99-108, 2011
302011
Usable, secure, private search
M Raykova, A Cui, B Vo, B Liu, T Malkin, SM Bellovin, SJ Stolfo
IEEE Security & Privacy 10 (5), 53-60, 2011
282011
Killing the Myth of Cisco {IOS} Diversity: Recent Advances in Reliable Shellcode Design
A Cui, J Kataria, SJ Stolfo
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
202011
From prey to hunter: Transforming legacy embedded devices into exploitation sensor grids
A Cui, J Kataria, SJ Stofo
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
192011
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner
A Cui, SJ Stolfo
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
142011
Defeating Cisco Trust Anchor: A {Case-Study} of Recent Advancements in Direct {FPGA} Bitstream Manipulation
J Kataria, R Housley, J Pantoga, A Cui
13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019
122019
Killing the myth of Cisco IOS diversity
A Cui, J Kataria, SJ Stolfo
USENIX Worshop on Offensive Technologies, 2011
102011
Utilizing electromagnetic emanations for out-of-band detection of unknown attack code in a programmable logic controller
N Boggs, JC Chau, A Cui
Cyber Sensing 2018 10630, 84-99, 2018
92018
Method and apparatus for securing embedded device firmware
A Cui, SJ Stolfo
US Patent 10,657,262, 2020
82020
Methods, systems, and media for injecting code into embedded devices
A Cui, SJ Stolfo
US Patent 10,055,251, 2018
72018
Killing the myth of cisco ios diversity: Towards reliable, large-scale exploitation of cisco ios
A Cui, J Kataria, SJ Stolfo
USENIX Workshop on Offensive Technologies (August 2011), 2011
62011
Generic rootkit detection for embedded devices using parasitic embedded machines
A Cui, SJ Stolfo
Columbia University, New York. cucs-009-10, 2010
42010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20