Back to Results
First PageMeta Content
Electronics / System software / Spider-Man / Videotelephony / Symbiote / Cisco IOS / Router / Cisco Systems / Embedded system / Computing / Networking hardware / Server appliance


From Prey To Hunter∗ Transforming Legacy Embedded Devices Into Exploitation Sensor Grids Ang Cui Jatin Kataria
Add to Reading List

Document Date: 2014-02-27 21:40:35


Open Document

File Size: 985,56 KB

Share Result on Facebook

City

Austin / Symbiote / Cambridge / /

Company

Mcafee/Intel / Kapersky / Microsoft Corporation / IPTV / Symantec / Cisco / SEM / Fixed Burst-Rate SEM / Inverse-Adaptive SEM / Rate SEMManager / /

Country

United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Computer Science Columbia University / University Computer Science Department / /

IndustryTerm

simulated honey routers / neighbor routers / offensive technologies / vulnerable embedded devices / actual embedded hardware / Internet substrate / victim device / black-box embedded devices / real-time nature / innocuous embedded devices / defense systems / time sensitive software / legacy devices / target device / power management / software symbiotes / undocumented operating systems / fixed burst-rate scheduling algorithm / embedded devices / host software / honeypot systems / embedded network devices / in embedded systems / software mechanism / victim router / software-based defense / vulnerable systems / embedded operating systems / neighbor router / anomaly detection algorithms / real-time visibility / embedded systems / native embedded hardware / shadow device / Large networks / security features to protect these devices / protected host device / protected software / value embedded devices / backbone networks / well known operating systems / honeypot-based systems / software repair / identical embedded device / time-sensitive network protocols / host-based defensive technology / real-time embedded devices / communication infrastructure / unknown black-box device / enterprise networking equipment / test routers / possible routers / black-box systems / home modem/routers / host device / host-based security technologies / inverse-adaptive scheduling algorithm / host router / diagnostic tool / implement existing anomaly detection algorithms / /

OperatingSystem

Cisco IOS / /

Organization

Columbia University Computer Science Department / U.S. Government / Prey To Hunter∗ Transforming Legacy Embedded Devices Into Exploitation Sensor Grids Ang Cui Jatin Kataria Salvatore J. Stofo Department of Computer Science Columbia University New York NY / USA Department of Computer Science Columbia University New York NY / IEEE Computer Society / /

Person

Mahmoud Mostafa / Ping Latency / Sebastian Muniz / Christopher Kr / William K. Robertson / Ryan Riley / Ari Trachtenberg / Xinyuan Wang / Issac Greenbaum / Yingbo Song / Dror-John Roecher / Simha Sethumadhavan / Dongyan Xu / Mikhail J. Atallah / Weidong Cui / Savaltore J. Stolfo / Jatin Kataria / Tarek Abbes / John P. McDermott / Richard Lippmann / Hsien-Hsin S. Lee / Ang Cui / Michael Franz / Hoi Chang / Abdallah Ghourabi / Xuxian Jiang / Engin Kirda / Vikas R. Vasisht / Michael Lynn / Gregor Maier / Adel Bouhoula / Michael Thumann / Zhi Wang / Yves Deswarte / Giovanni Vigna / Pratap V. Prahbu / Davide Balzarotti / Salvatore J. Stolfo / /

/

Position

Program Symbiote Manager / Guard / Manager 0xCFFF 0x6FFF 0xFFF 0x3FFF 0x9FF 0xCFF 0x6FF 0xFF / Manager Inverse-Adaptive / inverse-adaptive scheduler / Symbiote Manager / Shadow Sensor Deployment Network Production Router SPAN Port General / Manager 0xFFFF 0x9FFF / Emulated Sensor Deployment Network General / aggressive scheduler / inverseadaptive Symbiote scheduler / job scheduler / editor / Manager Detection DetectionLatency / Manager / Symbiotic Embedded Machine Manager / Manager 9.4 Discussion Preliminary performance results / Fixed FixedBurst-Rate Burst−Rate SEMManager Manager / entire Guard / fixed burst-rate Symbiote scheduler / Manager 3.5 3 2.5 2 1.5 1 Payload Execution Rate Figure / Symbiote scheduler / Manager / Symbiote payload and a large number / scheduler / inverse-adaptive Symbiote scheduler / Fixed FixedBurst-Rate Burst− Manager 3.5 3 2.5 2 1.5 1 Payload Execution Rate Figure / /

Product

Symbiotebased / Microsoft Corporation Portable Audio Device / Symbiote Injection / Linuxbased / Dynamips / Symbiote / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

SNMP / victim router / 2921 router / operating system / inverse-adaptive scheduling algorithm / 7200 series routers / 8.3 Shadow Sensor Deployment Network Production Router / IOS routers / production routers / production router / protected router / fixed burst-rate scheduling algorithm / Symbiote-protected router / simulated honey routers / neighbor router / existing anomaly detection algorithms / same host router / emulated 7200 series router / Linuxbased home routers / host-based security technologies / three routers / host-based defensive technology / Two neighbor routers / IOS router / quite possible routers / scheduling algorithm / Two scheduling algorithms / operating systems / host router / Symbioteprotected router / test routers / Honeypot router / 7200 series router / OSPF routers / HTTP / home modem/routers / VOIP / network protocols / /

URL

http /

SocialTag