Author of the publication

When Firmware Modifications Attack: A Case Study of Embedded Exploitation.

, , and . NDSS, The Internet Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan., and . ACSAC, page 97-106. ACM, (2010)Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design., , and . WOOT, page 19-27. USENIX Association, (2011)Defending Embedded Systems with Software Symbiotes., and . RAID, volume 6961 of Lecture Notes in Computer Science, page 358-377. Springer, (2011)BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection., and . WOOT, USENIX Association, (2017)Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner., and . BADGERS@EuroSys, page 8-18. ACM, (2011)Brave New World: Pervasive Insecurity of Embedded Network Devices., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 378-380. Springer, (2009)Usable, Secure, Private Search., , , , , , and . IEEE Secur. Priv., 10 (5): 53-60 (2012)Embedded System Security: A Software-based Approach.. Columbia University, USA, (2015)Uprooting Trust: Learnings from an Unpatchable Hardware Root-of-Trust Vulnerability in Siemens S7-1500 PLCs., , and . HOST, page 179-190. IEEE, (2023)Cryo-Mechanical RAM Content Extraction Against Modern Embedded Systems., , and . SP (Workshops), page 273-284. IEEE, (2023)