Publications

pnt Boggs, Nathaniel; Cui, Ang; Kataria, Jatin; Laulheret, Philippe. "Automotive Exploitation Sandbox: A Hands-on Educational Introduction to Embedded Device Exploitation." escar USA: Embedded Security in Cars. 2018.
pnt Boggs, Nathaniel, Jimmy C. Chau, and Ang Cui. "Utilizing electromagnetic emanations for out-of-band detection of unknown attack code in a programmable logic controller." Cyber Sensing 2018. Vol. 10630. International Society for Optics and Photonics, 2018.

Copyright 2018 Society of Photo-Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited.

pnt Cui, Ang, and Rick Housley. "BADFET: defeating modern secure boot using second-order pulsed electromagnetic fault injection." In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, vol. 180. 2017.
pnt Cui, Ang, Michael Costello, and Salvatore J. Stolfo. "When Firmware Modifications Attack: A Case Study of Embedded Exploitation." In NDSS. 2013.
pnt Yang, Junfeng, Ang Cui, Salvatore J. Stolfo, and Simha Sethumadhavan. "Concurrency Attacks." HotPar 12 (2012): 15.
pnt Cui, Ang, and Salvatore J. Stolfo. "Defending embedded systems with software symbiotes." In International Workshop on Recent Advances in Intrusion Detection, pp. 358-377. Springer, Berlin, Heidelberg, 2011.
pnt Cui, Ang, Jatin Kataria, and Salvatore J. Stolfo. "Killing the myth of Cisco IOS diversity: recent advances in reliable shellcode design." In Proceedings of the 5th USENIX conference on Offensive technologies, pp. 3-3. USENIX Association, 2011.
pnt Cui, Ang, Jatin Kataria, and Salvatore J. Stofo. "From prey to hunter: transforming legacy embedded devices into exploitation sensor grids." In Proceedings of the 27th Annual Computer Security Applications Conference, pp. 393-402. ACM, 2011.
pnt Cui, Ang, and Salvatore J. Stolfo. "Symbiotes and defensive mutualism: Moving target defense." In Moving target defense, pp. 99-108. Springer, New York, NY, 2011.
pnt Cui, Ang, and Salvatore J. Stolfo. "A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan." In Proceedings of the 26th Annual Computer Security Applications Conference, pp. 97-106. ACM, 2010.
pnt Matwyshyn, Andrea M., et al. "Ethics in security vulnerability research." IEEE Security & Privacy 8.2 (2010).
pnt Cui, Ang, Yingbo Song, Pratap V. Prabhu, and Salvatore J. Stolfo. "Brave new world: Pervasive insecurity of embedded network devices." In International Workshop on Recent Advances in Intrusion Detection, pp. 378-380. Springer, Berlin, Heidelberg, 2009.