Follow
Ang Cui
Ang Cui
Verified email at cs.columbia.edu
Title
Cited by
Cited by
Year
When firmware modifications attack: A case study of embedded exploitation
A Cui, M Costello, S Stolfo
3422013
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
A Cui, SJ Stolfo
Proceedings of the 26th annual computer security applications conference, 97-106, 2010
2552010
Concurrency attacks
J Yang, A Cui, S Stolfo, S Sethumadhavan
4th USENIX Workshop on Hot Topics in Parallelism (HotPar 12), 2012
882012
{BADFET}: Defeating modern secure boot using {Second-Order} pulsed electromagnetic fault injection
A Cui, R Housley
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
852017
Defending embedded systems with software symbiotes
A Cui, SJ Stolfo
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
852011
Brave new world: Pervasive insecurity of embedded network devices
A Cui, Y Song, PV Prabhu, SJ Stolfo
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
452009
Ethics in security vulnerability research
AM Matwyshyn, A Cui, AD Keromytis, SJ Stolfo
IEEE Security & Privacy 8 (2), 67-72, 2010
432010
Methods, systems, and media for inhibiting attacks on embedded devices
A Cui, SJ Stolfo
US Patent 9,392,017, 2016
402016
Symbiotes and defensive mutualism: Moving target defense
A Cui, SJ Stolfo
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 99-108, 2011
332011
Defeating cisco trust anchor: A {Case-Study} of recent advancements in direct {FPGA} bitstream manipulation
J Kataria, R Housley, J Pantoga, A Cui
13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019
312019
Usable, secure, private search
M Raykova, A Cui, B Vo, B Liu, T Malkin, SM Bellovin, SJ Stolfo
IEEE Security & Privacy 10 (5), 53-60, 2011
312011
Killing the Myth of Cisco {IOS} Diversity: Recent Advances in Reliable Shellcode Design
A Cui, J Kataria, SJ Stolfo
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
222011
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner
A Cui, SJ Stolfo
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
192011
Utilizing electromagnetic emanations for out-of-band detection of unknown attack code in a programmable logic controller
N Boggs, JC Chau, A Cui
Cyber Sensing 2018 10630, 84-99, 2018
182018
From prey to hunter: Transforming legacy embedded devices into exploitation sensor grids
A Cui, J Kataria, SJ Stofo
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
182011
Method and apparatus for securing embedded device firmware
A Cui, SJ Stolfo
US Patent 10,657,262, 2020
112020
Methods, systems, and media for injecting code into embedded devices
A Cui, SJ Stolfo
US Patent 10,055,251, 2018
112018
Killing the myth of Cisco IOS diversity
A Cui, J Kataria, SJ Stolfo
USENIX Worshop on Offensive Technologies, 2011
102011
Killing the myth of cisco ios diversity: Towards reliable, large-scale exploitation of cisco ios
A Cui, J Kataria, SJ Stolfo
USENIX Workshop on Offensive Technologies (August 2011), 2011
72011
Embedded system security: A software-based approach
A Cui
Columbia University, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20