View Document Preview and Link
Document Date: 2011-09-04 10:44:35 Open Document File Size: 1,81 MB Share Result on Facebook
City Austin / / Company Polycom / Linksys SPA / Sipura SPA / Team Cymru / Google / Cisco / Time Warner / Time warner cable / / Continent Europe / Asia / North America / / Country United States / South Korea / / Currency USD / / / Facility Columbia University / University NOC / / IndustryTerm experimental protocol / home networking devices / exploitable embedded devices / clear experimental protocol / university network / vulnerable embedded devices / networks / Vulnerable devices / enterprise networking devices / web browser / large-scale malicious networks / enterprise devices / backbone routers / similar consumer routers / vulnerable wireless routers / metro-area wireless networks / wireless access points / accessible embedded devices / energy / ia compromised wireless access points / target networks / camera surveillance systems / satellite / legacy devices / wide open embedded devices / large network / lite provider networks / embedded devices / consumer electronics / ethical experimental protocol / compromised embedded devices / vulnerable device / accessible devices / netgear home routers / carrier networking equipment / accessible vulnerable devices / Internet Service Provider / enterprise networking device / reachable embedded devices / embedded device / embedded products / unix-based consumer routers / residential network / embedded device exploitation tools / remote network / consumer electronics malicious home routers / in-path networking devices / heterogeneous operating systems / victim devices / communication infrastructure / purpose operating systems / residential networks / unix-like operating systems / search engine queries / exploitable network / vulnerable embedded device / responsible experimental protocol / data-center power management devices / individual embedded devices / consumer routers / / OperatingSystem Cisco IOS / / Organization Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science / MaxMind GeoIP Organization / Columbia University / office of Naval Research / Columbia University / New York / Team Cmyru / ded / Columbia Intrusion Detection Systems Lab / / Person Sebastian Muniz / Andrea M. Matwyshyn / William Enck / Patrick McDaniel / Kevin Borders / Elie Bursztein / W. Y. Chin / V / Angelos D. Keromytis Ang Cui / Lalana Kagal / Dan Boneh / Ang Cui / Patrick Traynor / Eric Lovett / Alex Tsow / Michael Lynn / Hristo Bojinov / Kevin R. B. Butler / Daniel Olmedilla / Salvatore J. Stolfo / / Position Private / Butler / / Product Nikon D200 Digital Camera / / ProgrammingLanguage SQL / HTML / / ProvinceOrState New York / / Region North America / South America / / Technology 24 / 000 routers / specific consumer routers / netgear home routers / HTML / responsible experimental protocol / ethical experimental protocol / exploiting consumer routers / 65 / 000 customer routers / wireless access / ISP / unix-based consumer routers / experimental protocol / clear experimental protocol / flash / cable modem / vulnerable wireless routers / consumer electronics malicious home routers / unix / VPN / search engine / operating systems / backbone routers / firewall / video conferencing / HTTP / caching / IPv4 / home networking / VOIP / similar consumer routers / WRT routers / home routers / / URL http / SocialTag