Ang Cui

According to our database1, Ang Cui authored at least 17 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cryo-Mechanical RAM Content Extraction Against Modern Embedded Systems.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Uprooting Trust: Learnings from an Unpatchable Hardware Root-of-Trust Vulnerability in Siemens S7-1500 PLCs.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

2019
Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

2017
BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2015
Embedded System Security: A Software-based Approach.
PhD thesis, 2015

2013
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design.
Inf. Manag. Comput. Secur., 2013

When Firmware Modifications Attack: A Case Study of Embedded Exploitation.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Usable, Secure, Private Search.
IEEE Secur. Priv., 2012

Concurrency Attacks.
Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism, 2012

2011
Symbiotes and defensive Mutualism: Moving Target Defense.
Proceedings of the Moving Target Defense, 2011

Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Defending Embedded Systems with Software Symbiotes.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

From prey to hunter: transforming legacy embedded devices into exploitation sensor grids.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Ethics in Security Vulnerability Research.
IEEE Secur. Priv., 2010

A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Brave New World: Pervasive Insecurity of Embedded Network Devices.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009


  Loading...