|Boggs, Nathaniel; Cui, Ang; Kataria, Jatin; Laulheret, Philippe. "Automotive Exploitation Sandbox: A Hands-on Educational Introduction to Embedded Device Exploitation." escar USA: Embedded Security in Cars. 2018.|
|Boggs, Nathaniel, Jimmy C. Chau, and Ang Cui. "Utilizing electromagnetic emanations for
out-of-band detection of unknown attack code in a programmable logic controller." Cyber Sensing 2018. Vol. 10630. International Society for Optics and Photonics, 2018.
Copyright 2018 Society of Photo-Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited.
|Cui, Ang, and Rick Housley. "BADFET: defeating modern secure boot using second-order pulsed electromagnetic fault injection." In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, vol. 180. 2017.|
|Cui, Ang, Michael Costello, and Salvatore J. Stolfo. "When Firmware Modifications Attack: A Case Study of Embedded Exploitation." In NDSS. 2013.|
|Yang, Junfeng, Ang Cui, Salvatore J. Stolfo, and Simha Sethumadhavan. "Concurrency Attacks." HotPar 12 (2012): 15.|
|Cui, Ang, and Salvatore J. Stolfo. "Defending embedded systems with software symbiotes." In International Workshop on Recent Advances in Intrusion Detection, pp. 358-377. Springer, Berlin, Heidelberg, 2011.|
|Cui, Ang, Jatin Kataria, and Salvatore J. Stolfo. "Killing the myth of Cisco IOS diversity: recent advances in reliable shellcode design." In Proceedings of the 5th USENIX conference on Offensive technologies, pp. 3-3. USENIX Association, 2011.|
|Cui, Ang, Jatin Kataria, and Salvatore J. Stofo. "From prey to hunter: transforming legacy embedded devices into exploitation sensor grids." In Proceedings of the 27th Annual Computer Security Applications Conference, pp. 393-402. ACM, 2011.|
|Cui, Ang, and Salvatore J. Stolfo. "Symbiotes and defensive mutualism: Moving target defense." In Moving target defense, pp. 99-108. Springer, New York, NY, 2011.|
|Cui, Ang, and Salvatore J. Stolfo. "A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan." In Proceedings of the 26th Annual Computer Security Applications Conference, pp. 97-106. ACM, 2010.|
|Matwyshyn, Andrea M., et al. "Ethics in security vulnerability research." IEEE Security & Privacy 8.2 (2010).|
|Cui, Ang, Yingbo Song, Pratap V. Prabhu, and Salvatore J. Stolfo. "Brave new world: Pervasive insecurity of embedded network devices." In International Workshop on Recent Advances in Intrusion Detection, pp. 378-380. Springer, Berlin, Heidelberg, 2009.|