 |
Boggs, Nathaniel, Brenda So, and Ang Cui. "Remote attestation of host-based defense via optical channel." Cyber Sensing 2020. Vol. 11417. International Society for Optics and Photonics, 2020.
Copyright 2020 Society of PhotoOptical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution,
duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. |
 |
Boggs, Nathaniel; Cui, Ang; Kataria, Jatin; Laulheret, Philippe.
"Automotive Exploitation Sandbox: A Hands-on Educational Introduction to Embedded Device Exploitation." escar USA: Embedded Security in Cars. 2018. |
 |
Boggs, Nathaniel, Jimmy C. Chau, and Ang Cui. "Utilizing electromagnetic emanations for
out-of-band detection of unknown attack code in a programmable logic controller." Cyber Sensing 2018. Vol. 10630. International Society for Optics and Photonics, 2018.
Copyright 2018 Society of Photo-Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution,
duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. |
 |
Cui, Ang, and Rick Housley. "BADFET: defeating modern secure boot using second-order pulsed electromagnetic fault
injection." In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, vol. 180. 2017. |
 |
Cui, Ang, Michael Costello, and Salvatore J. Stolfo. "When Firmware Modifications Attack: A Case Study of Embedded
Exploitation." In NDSS. 2013. |
 |
Yang, Junfeng, Ang Cui, Salvatore J. Stolfo, and Simha Sethumadhavan. "Concurrency Attacks." HotPar 12 (2012): 15. |
 |
Cui, Ang, and Salvatore J. Stolfo. "Defending embedded systems with software symbiotes." In
International Workshop on Recent Advances in Intrusion Detection, pp. 358-377. Springer, Berlin, Heidelberg, 2011. |
 |
Cui, Ang, Jatin Kataria, and Salvatore J. Stolfo. "Killing the myth of Cisco IOS diversity: recent advances in reliable
shellcode design." In Proceedings of the 5th USENIX conference on Offensive technologies, pp. 3-3. USENIX Association, 2011. |
 |
Cui, Ang, Jatin Kataria, and Salvatore J. Stofo. "From prey to hunter: transforming legacy embedded devices into
exploitation sensor grids." In Proceedings of the 27th Annual Computer Security Applications Conference, pp. 393-402. ACM, 2011. |
 |
Cui, Ang, and Salvatore J. Stolfo. "Symbiotes and defensive mutualism: Moving target defense."
In Moving target defense, pp. 99-108. Springer, New York, NY, 2011. |
 |
Cui, Ang, and Salvatore J. Stolfo. "A quantitative analysis of the insecurity of embedded network
devices: results of a wide-area scan." In Proceedings of the 26th Annual Computer Security Applications Conference, pp. 97-106. ACM, 2010. |
 |
Matwyshyn, Andrea M., et al. "Ethics in security vulnerability research." IEEE Security & Privacy 8.2 (2010). |
 |
Cui, Ang, Yingbo Song, Pratap V. Prabhu, and Salvatore J. Stolfo. "Brave new world: Pervasive insecurity of embedded network
devices." In International Workshop on Recent Advances in Intrusion Detection, pp. 378-380. Springer, Berlin, Heidelberg, 2009. |