{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:38:59Z","timestamp":1775745539387,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T00:00:00Z","timestamp":1291593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,6]]},"DOI":"10.1145\/1920261.1920276","type":"proceedings-article","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T16:13:47Z","timestamp":1292861627000},"page":"97-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":126,"title":["A quantitative analysis of the insecurity of embedded network devices"],"prefix":"10.1145","author":[{"given":"Ang","family":"Cui","sequence":"first","affiliation":[{"name":"Columbia University"}]},{"given":"Salvatore J.","family":"Stolfo","sequence":"additional","affiliation":[{"name":"Columbia University"}]}],"member":"320","published-online":{"date-parts":[[2010,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"kaiten.c IRC DDOS Bot. http:\/\/packetstormsecurity.nl\/irc\/kaiten.c.  kaiten.c IRC DDOS Bot. http:\/\/packetstormsecurity.nl\/irc\/kaiten.c."},{"key":"e_1_3_2_1_2_1","unstructured":"MaxMind GeoIP. http:\/\/www.maxmind.com\/app\/ip-location.  MaxMind GeoIP. http:\/\/www.maxmind.com\/app\/ip-location."},{"key":"e_1_3_2_1_3_1","unstructured":"Embedded Device Vulnerability Assessment Initiative. http:\/\/www.hacktory.cs.columbia.edu.  Embedded Device Vulnerability Assessment Initiative. http:\/\/www.hacktory.cs.columbia.edu."},{"key":"e_1_3_2_1_4_1","unstructured":"IronKey Personal D200. http:\/\/www.ironkey.com\/personal-solutions.  IronKey Personal D200. http:\/\/www.ironkey.com\/personal-solutions."},{"key":"e_1_3_2_1_5_1","volume-title":"Malware for Home Routers","author":"Your Internet The End","year":"2008","unstructured":"The End of Your Internet : Malware for Home Routers , 2008 . http:\/\/data.nicenamecrew.com\/papers\/malwareforrouters\/paper.txt. The End of Your Internet: Malware for Home Routers, 2008. http:\/\/data.nicenamecrew.com\/papers\/malwareforrouters\/paper.txt."},{"key":"e_1_3_2_1_6_1","unstructured":"Network Bluepill. Dronebl.org 2008. http:\/\/www.dronebl.org\/blog\/8.  Network Bluepill. Dronebl.org 2008. http:\/\/www.dronebl.org\/blog\/8."},{"key":"e_1_3_2_1_7_1","volume-title":"ZDNET","year":"2009","unstructured":"Psyb0t' worm infects linksys, netgear home routers, modems . ZDNET , 2009 . http:\/\/blogs.zdnet.com\/BTL\/?p=15197. Psyb0t' worm infects linksys, netgear home routers, modems. ZDNET, 2009. http:\/\/blogs.zdnet.com\/BTL\/?p=15197."},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/www.wired.com\/threatlevel\/2009\/10\/vulnerable-devices\/","author":"Scan","year":"2009","unstructured":"Scan of internet uncovers thousands of vulnerable embedded devices. http:\/\/www.wired.com\/threatlevel\/2009\/10\/vulnerable-devices\/ , 2009 . Scan of internet uncovers thousands of vulnerable embedded devices. http:\/\/www.wired.com\/threatlevel\/2009\/10\/vulnerable-devices\/, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/www.wired.com\/threatlevel\/2009\/10\/time-warner-cable\/","author":"Time","year":"2009","unstructured":"Time warner cable exposes 65,000 customer routers to remote hacks. http:\/\/www.wired.com\/threatlevel\/2009\/10\/time-warner-cable\/ , 2009 . Time warner cable exposes 65,000 customer routers to remote hacks. http:\/\/www.wired.com\/threatlevel\/2009\/10\/time-warner-cable\/, 2009."},{"key":"e_1_3_2_1_10_1","first-page":"323","volume-title":"In Proceedings of the 16 th USENIX Security Symposium","author":"Akritidis P.","year":"2007","unstructured":"P. Akritidis , W. Y. Chin , V. T. Lam , S. Sidiroglou , and K. G. Anagnostakis . Proximity breeds danger: Emerging threats in metro-area wireless networks . In In Proceedings of the 16 th USENIX Security Symposium , pages 323 -- 338 , 2007 . P. Akritidis, W. Y. Chin, V. T. Lam, S. Sidiroglou, and K. G. Anagnostakis. Proximity breeds danger: Emerging threats in metro-area wireless networks. In In Proceedings of the 16 th USENIX Security Symposium, pages 323--338, 2007."},{"key":"e_1_3_2_1_11_1","first-page":"2009","author":"Bojinov Hristo","year":"2009","unstructured":"Hristo Bojinov , Elie Bursztein , Eric Lovett , and Dan Boneh . Embedded management interfaces: Emerging massive insecurity. Black Hat USA , 2009 , 2009 . Hristo Bojinov, Elie Bursztein, Eric Lovett, and Dan Boneh. Embedded management interfaces: Emerging massive insecurity. Black Hat USA, 2009, 2009.","journal-title":"Black Hat USA"},{"key":"e_1_3_2_1_12_1","volume-title":"Generic rootkit detection for embedded devices using parasitic embedded machines","author":"Cui Ang","year":"2010","unstructured":"Ang Cui and Salvatore J. Stolfo . Generic rootkit detection for embedded devices using parasitic embedded machines . Columbia University , New York . cucs-009-10., 2010 . Ang Cui and Salvatore J. Stolfo. Generic rootkit detection for embedded devices using parasitic embedded machines. Columbia University, New York. cucs-009-10., 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"BlackHat USA","author":"Linder Felix","year":"2003","unstructured":"Felix \"FX\" Linder . Cisco Vulnerabilities . In In BlackHat USA , 2003 . Felix \"FX\" Linder. Cisco Vulnerabilities. In In BlackHat USA, 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"In BlackHat USA","author":"Linder Felix","year":"2009","unstructured":"Felix \"FX\" Linder . Cisco IOS Router Exploitation . In In BlackHat USA , 2009 . Felix \"FX\" Linder. Cisco IOS Router Exploitation. In In BlackHat USA, 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.67"},{"key":"e_1_3_2_1_16_1","volume-title":"Cisco IOS Shellcode","author":"Lynn Michael","year":"2005","unstructured":"Michael Lynn . Cisco IOS Shellcode , 2005 . In BlackHat USA. Michael Lynn. Cisco IOS Shellcode, 2005. In BlackHat USA."},{"key":"e_1_3_2_1_17_1","volume-title":"Killing the myth of Cisco IOS rootkits: DIK","author":"Muniz Sebastian","year":"2008","unstructured":"Sebastian Muniz . Killing the myth of Cisco IOS rootkits: DIK , 2008 . In EUSecWest . Sebastian Muniz. Killing the myth of Cisco IOS rootkits: DIK, 2008. In EUSecWest."},{"key":"e_1_3_2_1_18_1","volume-title":"Router Hacking Challenge","author":"Petkov Petko D.","year":"2008","unstructured":"Petko D. Petkov . Router Hacking Challenge , 2008 . http:\/\/www.gnucitizen.org\/blog\/router-hacking-challenge\/. Petko D. Petkov. Router Hacking Challenge, 2008. http:\/\/www.gnucitizen.org\/blog\/router-hacking-challenge\/."},{"key":"e_1_3_2_1_19_1","volume-title":"malnets: large-scale malicious networks ia compromised wireless access points. Security and Communication Networks, 3(2--3):102--113","author":"Traynor Patrick","year":"2010","unstructured":"Patrick Traynor , Kevin R. B. Butler , William Enck , Patrick McDaniel , and Kevin Borders . malnets: large-scale malicious networks ia compromised wireless access points. Security and Communication Networks, 3(2--3):102--113 , 2010 . Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick McDaniel, and Kevin Borders. malnets: large-scale malicious networks ia compromised wireless access points. Security and Communication Networks, 3(2--3):102--113, 2010."},{"key":"e_1_3_2_1_20_1","series-title":"CEUR Workshop Proceedings","volume-title":"Phishing with consumer electronics - malicious home routers","author":"Tsow Alex","year":"2006","unstructured":"Alex Tsow . Phishing with consumer electronics - malicious home routers . In Tim Finin, Lalana Kagal, and Daniel Olmedilla, editors, MTW, volume 190 of CEUR Workshop Proceedings . CEUR-WS. org, 2006 . Alex Tsow. Phishing with consumer electronics - malicious home routers. In Tim Finin, Lalana Kagal, and Daniel Olmedilla, editors, MTW, volume 190 of CEUR Workshop Proceedings. CEUR-WS.org, 2006."}],"event":{"name":"ACSAC '10: 2010 Annual Computer Security Applications Conference","location":"Austin Texas USA","acronym":"ACSAC '10","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 26th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1920261.1920276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:43Z","timestamp":1750278163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920276"}},"subtitle":["results of a wide-area scan"],"short-title":[],"issued":{"date-parts":[[2010,12,6]]},"references-count":20,"alternative-id":["10.1145\/1920261.1920276","10.1145\/1920261"],"URL":"https:\/\/doi.org\/10.1145\/1920261.1920276","relation":{},"subject":[],"published":{"date-parts":[[2010,12,6]]},"assertion":[{"value":"2010-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}