When firmware modifications attack: A case study of embedded exploitation A Cui, M Costello, S Stolfo | 266 | 2013 |
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan A Cui, SJ Stolfo Proceedings of the 26th Annual Computer Security Applications Conference, 97-106, 2010 | 216 | 2010 |
Concurrency attacks J Yang, A Cui, S Stolfo, S Sethumadhavan 4th USENIX Workshop on Hot Topics in Parallelism (HotPar 12), 2012 | 77 | 2012 |
Defending embedded systems with software symbiotes A Cui, SJ Stolfo International Workshop on Recent Advances in Intrusion Detection, 358-377, 2011 | 74 | 2011 |
{BADFET}: Defeating Modern Secure Boot Using {Second-Order} Pulsed Electromagnetic Fault Injection A Cui, R Housley 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 59 | 2017 |
Brave new world: Pervasive insecurity of embedded network devices A Cui, Y Song, PV Prabhu, SJ Stolfo International Workshop on Recent Advances in Intrusion Detection, 378-380, 2009 | 40 | 2009 |
Ethics in security vulnerability research AM Matwyshyn, A Cui, AD Keromytis, SJ Stolfo IEEE Security & Privacy 8 (2), 67-72, 2010 | 35 | 2010 |
Methods, systems, and media for inhibiting attacks on embedded devices A Cui, SJ Stolfo US Patent 9,392,017, 2016 | 30 | 2016 |
Symbiotes and defensive mutualism: Moving target defense A Cui, SJ Stolfo Moving target defense, 99-108, 2011 | 30 | 2011 |
Usable, secure, private search M Raykova, A Cui, B Vo, B Liu, T Malkin, SM Bellovin, SJ Stolfo IEEE Security & Privacy 10 (5), 53-60, 2011 | 28 | 2011 |
Killing the Myth of Cisco {IOS} Diversity: Recent Advances in Reliable Shellcode Design A Cui, J Kataria, SJ Stolfo 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 20 | 2011 |
From prey to hunter: Transforming legacy embedded devices into exploitation sensor grids A Cui, J Kataria, SJ Stofo Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 19 | 2011 |
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner A Cui, SJ Stolfo Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 14 | 2011 |
Defeating Cisco Trust Anchor: A {Case-Study} of Recent Advancements in Direct {FPGA} Bitstream Manipulation J Kataria, R Housley, J Pantoga, A Cui 13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019 | 12 | 2019 |
Killing the myth of Cisco IOS diversity A Cui, J Kataria, SJ Stolfo USENIX Worshop on Offensive Technologies, 2011 | 10 | 2011 |
Utilizing electromagnetic emanations for out-of-band detection of unknown attack code in a programmable logic controller N Boggs, JC Chau, A Cui Cyber Sensing 2018 10630, 84-99, 2018 | 9 | 2018 |
Method and apparatus for securing embedded device firmware A Cui, SJ Stolfo US Patent 10,657,262, 2020 | 8 | 2020 |
Methods, systems, and media for injecting code into embedded devices A Cui, SJ Stolfo US Patent 10,055,251, 2018 | 7 | 2018 |
Killing the myth of cisco ios diversity: Towards reliable, large-scale exploitation of cisco ios A Cui, J Kataria, SJ Stolfo USENIX Workshop on Offensive Technologies (August 2011), 2011 | 6 | 2011 |
Generic rootkit detection for embedded devices using parasitic embedded machines A Cui, SJ Stolfo Columbia University, New York. cucs-009-10, 2010 | 4 | 2010 |