Back to Results
First PageMeta Content
Computing / Data security / Embedded system / Universal Serial Bus / Router / Computer security / Firewall / Security appliance / Server appliance / Computer network security / Computer hardware


A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science, Columbia University {ang,sal}@cs.columbia.edu
Add to Reading List

Document Date: 2014-02-27 21:40:35


Open Document

File Size: 1,81 MB

Share Result on Facebook

City

Austin / /

Company

Polycom / Linksys SPA / Sipura SPA / Team Cymru / Google / Cisco / Time Warner / Time warner cable / /

Continent

Europe / Asia / North America / /

Country

United States / South Korea / /

Currency

USD / /

/

Facility

Columbia University / University NOC / /

IndustryTerm

experimental protocol / home networking devices / exploitable embedded devices / clear experimental protocol / university network / vulnerable embedded devices / networks / Vulnerable devices / enterprise networking devices / web browser / large-scale malicious networks / enterprise devices / backbone routers / similar consumer routers / vulnerable wireless routers / metro-area wireless networks / wireless access points / accessible embedded devices / energy / ia compromised wireless access points / target networks / camera surveillance systems / satellite / legacy devices / wide open embedded devices / large network / lite provider networks / embedded devices / consumer electronics / ethical experimental protocol / compromised embedded devices / vulnerable device / accessible devices / netgear home routers / carrier networking equipment / accessible vulnerable devices / Internet Service Provider / enterprise networking device / reachable embedded devices / embedded device / embedded products / unix-based consumer routers / residential network / embedded device exploitation tools / remote network / consumer electronics malicious home routers / in-path networking devices / heterogeneous operating systems / victim devices / communication infrastructure / purpose operating systems / residential networks / unix-like operating systems / search engine queries / exploitable network / vulnerable embedded device / responsible experimental protocol / data-center power management devices / individual embedded devices / consumer routers / /

OperatingSystem

Cisco IOS / /

Organization

Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science / MaxMind GeoIP Organization / Columbia University / office of Naval Research / Columbia University / New York / Team Cmyru / ded / Columbia Intrusion Detection Systems Lab / /

Person

Sebastian Muniz / Andrea M. Matwyshyn / William Enck / Patrick McDaniel / Kevin Borders / Elie Bursztein / W. Y. Chin / V / Angelos D. Keromytis Ang Cui / Lalana Kagal / Dan Boneh / Ang Cui / Patrick Traynor / Eric Lovett / Alex Tsow / Michael Lynn / Hristo Bojinov / Kevin R. B. Butler / Daniel Olmedilla / Salvatore J. Stolfo / /

Position

Private / Butler / /

Product

Nikon D200 Digital Camera / /

ProgrammingLanguage

SQL / HTML / /

ProvinceOrState

New York / /

Region

North America / South America / /

Technology

24 / 000 routers / specific consumer routers / netgear home routers / HTML / responsible experimental protocol / ethical experimental protocol / exploiting consumer routers / 65 / 000 customer routers / wireless access / ISP / unix-based consumer routers / experimental protocol / clear experimental protocol / flash / cable modem / vulnerable wireless routers / consumer electronics malicious home routers / unix / VPN / search engine / operating systems / backbone routers / firewall / video conferencing / HTTP / caching / IPv4 / home networking / VOIP / similar consumer routers / WRT routers / home routers / /

URL

http /

SocialTag