When firmware modifications attack: A case study of embedded exploitation A Cui, M Costello, S Stolfo | 342 | 2013 |
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan A Cui, SJ Stolfo Proceedings of the 26th annual computer security applications conference, 97-106, 2010 | 255 | 2010 |
Concurrency attacks J Yang, A Cui, S Stolfo, S Sethumadhavan 4th USENIX Workshop on Hot Topics in Parallelism (HotPar 12), 2012 | 88 | 2012 |
{BADFET}: Defeating modern secure boot using {Second-Order} pulsed electromagnetic fault injection A Cui, R Housley 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 85 | 2017 |
Defending embedded systems with software symbiotes A Cui, SJ Stolfo Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 85 | 2011 |
Brave new world: Pervasive insecurity of embedded network devices A Cui, Y Song, PV Prabhu, SJ Stolfo Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 45 | 2009 |
Ethics in security vulnerability research AM Matwyshyn, A Cui, AD Keromytis, SJ Stolfo IEEE Security & Privacy 8 (2), 67-72, 2010 | 43 | 2010 |
Methods, systems, and media for inhibiting attacks on embedded devices A Cui, SJ Stolfo US Patent 9,392,017, 2016 | 40 | 2016 |
Symbiotes and defensive mutualism: Moving target defense A Cui, SJ Stolfo Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 99-108, 2011 | 33 | 2011 |
Defeating cisco trust anchor: A {Case-Study} of recent advancements in direct {FPGA} bitstream manipulation J Kataria, R Housley, J Pantoga, A Cui 13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019 | 31 | 2019 |
Usable, secure, private search M Raykova, A Cui, B Vo, B Liu, T Malkin, SM Bellovin, SJ Stolfo IEEE Security & Privacy 10 (5), 53-60, 2011 | 31 | 2011 |
Killing the Myth of Cisco {IOS} Diversity: Recent Advances in Reliable Shellcode Design A Cui, J Kataria, SJ Stolfo 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 22 | 2011 |
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner A Cui, SJ Stolfo Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 19 | 2011 |
Utilizing electromagnetic emanations for out-of-band detection of unknown attack code in a programmable logic controller N Boggs, JC Chau, A Cui Cyber Sensing 2018 10630, 84-99, 2018 | 18 | 2018 |
From prey to hunter: Transforming legacy embedded devices into exploitation sensor grids A Cui, J Kataria, SJ Stofo Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 18 | 2011 |
Method and apparatus for securing embedded device firmware A Cui, SJ Stolfo US Patent 10,657,262, 2020 | 11 | 2020 |
Methods, systems, and media for injecting code into embedded devices A Cui, SJ Stolfo US Patent 10,055,251, 2018 | 11 | 2018 |
Killing the myth of Cisco IOS diversity A Cui, J Kataria, SJ Stolfo USENIX Worshop on Offensive Technologies, 2011 | 10 | 2011 |
Killing the myth of cisco ios diversity: Towards reliable, large-scale exploitation of cisco ios A Cui, J Kataria, SJ Stolfo USENIX Workshop on Offensive Technologies (August 2011), 2011 | 7 | 2011 |
Embedded system security: A software-based approach A Cui Columbia University, 2015 | 5 | 2015 |