Back to Results
First PageMeta Content
Computer network security / Malware / Firmware / Rootkit / Binary blob / Denial-of-service attack / Vulnerability / DD-WRT / Threat / Cyberwarfare / Computer security / Computing


When Firmware Modifications Attack: A Case Study of Embedded Exploitation Ang Cui, Michael Costello and Salvatore J. Stolfo Department of Computer Science Columbia University New York, US
Add to Reading List

Document Date: 2014-02-27 21:40:02


Open Document

File Size: 3,69 MB

Share Result on Facebook

Company

Hewlett-Packard / Cisco / SPANSION / Lexmark / Vodafone / /

Continent

North America / /

Country

Greece / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Computer Science Columbia University / Reverse IP tunnel / /

IndustryTerm

software system / compression algorithm / Internet service providers / cross-site / Internet Routing Registry / pattern-matching tool / vulnerable device / embedded systems / fail-safe device / vulnerable embedded devices / host-based defense technologies / sensationalized media coverage / victim network / printer web / remote software attestation techniques / vulnerable embedded systems / Web Jetadmin / vulnerable devices / victim device / secured internal network / remote software attestation / raw-printing port / network monitoring systems / software reverse engineering methods / printing subsystem / protected software / boot device / reconnaissance tool / integrity checking algorithm / open source tools / wireless access points / raw-printing processing subsystem / raw-printing protocol / boot flash chip / print job processing / cleartext protocol / proper software / software repair / wellknown algorithms / command protocol / embedded device hardware / flash chip / ubiquitous embedded systems / enterprise printing management tool / target device / printing / purpose operating systems / large-scale distribution networks / software implementation / victim software / Network-printing / telecommunication infrastructure / target hardware / techniques to embedded devices / raw-print protocol / embedded devices / encryption algorithms / host software / insecure protocols / software vulnerabilities / legitimate carrier document / network transceiver hardware / energy-intensive exercise / embedded software / real-time operating systems / stop-theworld algorithms / compression algorithms / private networks / software operations / embedded operating systems / challenge-response protocol / /

Movie

Fail-Safe / /

OperatingSystem

Linux / Cisco IOS / DOS / VxWorks / Microsoft Windows / /

Organization

MIT / Salvatore J. Stolfo Department of Computer Science Columbia University New York / United States Department of Defense / /

Person

ASE S TUDY / Salvatore J. Stolfo / Michael Costello / /

Position

guard / teller / General / IRC-based bot controller / FL064P ELPIDA E1116AL Formatter Board Marvell 88PA2AL2-TAH1 ARM SoC Engine Controller / controller / /

Product

LaserJet / P2055DN / Firmware patch / /

ProgrammingLanguage

Python / SQL / PostScript / /

ProvinceOrState

Manitoba / /

Technology

SNMP / challenge-response protocol / encryption algorithms / boot flash chip / Linux / API / compression algorithms / VxWorks / 85 / 000 DD-WRT home routers / SPI boot flash chip / ATM / host-based defense technologies / stop-theworld algorithms / operating system / ssl / nonvolatile memory / operating systems / cellular telephone / raw-printing protocol / wireless access / command protocol / Firewall / compression algorithm / ASCII / video conferencing / raw-print protocol / IOS routers / ISP / HTTP / SPI flash chip / flash chip / IPv4 / integrity checking algorithm / enterprise routers / cleartext protocol / flash / PBX / UART / Gigabit Ethernet / /

SocialTag