Ang Cui
   HOME

TheInfoList



OR:

Ang Cui () is an American cybersecurity researcher and entrepreneur. He is the founder and CEO of Red Balloon Security in New York City, a cybersecurity firm that develops new technologies to defend embedded systems against exploitation.


Career

Cui was formerly a researcher with Columbia University's Intrusion Detection Systems Lab where he worked while pursuing his Ph.D. in computer science at
Columbia University Columbia University (also known as Columbia, and officially as Columbia University in the City of New York) is a private research university in New York City. Established in 1754 as King's College on the grounds of Trinity Church in Manhatt ...
. His doctoral dissertation, entitled “Embedded System Security: A Software-Based Approach,” focused on scientific inquiries concerning the exploitation and defense of embedded systems. Cui received his Ph.D. in 2015, and founded Red Balloon Security to commercialize his firmware defense technology now known as Symbiote. Cui has publicly demonstrated security vulnerabilities in widely used commercial and consumer products, including
Cisco Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
and
Avaya Avaya Holdings Corp., often shortened to Avaya (), is an American multinational technology company headquartered in Durham, North Carolina, that provides cloud communications and workstream collaboration services. The company's platform includ ...
VoIP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet t ...
phones, Cisco routers and
HP LaserJet LaserJet as a brand name identifies the line of laser printers marketed by the American computer company Hewlett-Packard (HP). The HP LaserJet was the first popular desktop laser printer. Canon supplies both mechanisms and cartridges for most HP ...
printers. He has presented his research at industry events including
Black Hat Briefings Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together a ...
, DEF CON conference,
RSA Conference The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991 as a small cryptography conference. RSA conferences take place in the United States, Europe, Asia ...
, REcon security conference and the Auto-ISAC 2018 Summit. Cui's security research has earned the 2011
Kaspersky Labs Kaspersky Lab (; Russian language, Russian: Лаборатория Касперского, Romanization of Russian, tr. ''Laboratoriya Kasperskogo'') is a Russian Multinational corporation, multinational cybersecurity and anti-virus provider head ...
American Cup Winner, 2012 Symantec Research Labs Graduate Fellowship and the 2015
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adv ...
Riser In 2017, the
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the Federal government of the United States, U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the I ...
cited his company with the “Crossing the Valley of Death” distinction for the development of a commercially available cyber defense system for critical infrastructure facilities, which was produced following a 12-month DHS funded pilot study to evaluate cyber sabotage risks to the building systems of a DHS Biosafety Level 3 facility.


Dukedom

In 2020, Cui received the noble title of
duke Duke is a male title either of a monarch ruling over a duchy, or of a member of royalty, or nobility. As rulers, dukes are ranked below emperors, kings, grand princes, grand dukes, and sovereign princes. As royalty or nobility, they are ran ...
from the
Principality of Sealand The Principality of Sealand () is an unrecognized micronation that claims HM Fort Roughs (also known as Roughs Tower), an offshore platform in the North Sea approximately off the coast of Suffolk, as its territory. Roughs Tower is a Maunsell ...
. Cui's royal title grants him an official territory, or
duchy A duchy, also called a dukedom, is a Middle Ages, medieval country, territory, fiefdom, fief, or domain ruled by a duke or duchess, a ruler hierarchically second to the king or Queen regnant, queen in Western European tradition. There once exis ...
, of one square foot within the
micronation A micronation is a political entity whose members claim that they belong to an independent nation or sovereign state, but which lacks legal recognition by world governments or major international organizations. Micronations are classified se ...
, which he has named SPACE. As a Duke of the Principality of Sealand, Cui joins the ranks of notable figures who have also received nobility titles from the micronation, including English cricketeer
Ben Stokes Benjamin Andrew Stokes (born 4 June 1991) is an English international cricketer who is the captain of the England Test team and plays for the England Twenty20 International (T20I) team. In domestic cricket, he represents Durham and has playe ...
and musician
Ed Sheeran Edward Christopher Sheeran (; born 17 February 1991) is an English singer-songwriter. Born in Halifax, West Yorkshire and raised in Framlingham, Suffolk, he began writing songs around the age of eleven. In early 2011, Sheeran independently r ...
.


Security Research


Symbiote

Cui is best known for his role in the development of Symbiote, a host-based firmware defense technology for embedded devices. Symbiote is injected into the firmware of a legacy
embedded device An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system. It is ''embedded'' as ...
where it provides
intrusion detection An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
functionality. It does so by constantly checking the integrity of static code and data at the firmware level, in order to prevent unauthorized code or commands from executing. Symbiote is
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
agnostic and is compatible with most embedded devices. Red Balloon Security has already released Symbiote for commercial printer brands like HP and other devices. On June 21, 2017, Red Balloon Security announced the launch of Symbiote for Automotive Defense, an automotive version of the standard Symbiote technology, at the Escar USA Conference in
Detroit Detroit ( , ; , ) is the largest city in the U.S. state of Michigan. It is also the largest U.S. city on the United States–Canada border, and the seat of government of Wayne County. The City of Detroit had a population of 639,111 at th ...
. In 2016,
Popular Science ''Popular Science'' (also known as ''PopSci'') is an American digital magazine carrying popular science content, which refers to articles for the general reader on science and technology subjects. ''Popular Science'' has won over 58 awards, incl ...
named Symbiote one of the “9 Most Important Security Innovations of the Year.”


HP LaserJet Printers

In 2011, Cui was part of a research effort at Columbia University, directed by Professor
Salvatore Stolfo Salvatore J. Stolfo is an academic and professor of computer science at Columbia University, specializing in computer security. Early life Born in Brooklyn, New York, Stolfo received a Bachelor of Science degree in Computer Science and Mathemat ...
, to examine security vulnerabilities in
HP LaserJet LaserJet as a brand name identifies the line of laser printers marketed by the American computer company Hewlett-Packard (HP). The HP LaserJet was the first popular desktop laser printer. Canon supplies both mechanisms and cartridges for most HP ...
printers. The project found chers announced significant security flaws in these devices which could allow for a range of remote attacks, including triggering a fire hazard by forcing the printer's fuser to continually heat up. HP released a firmware update soon after these findings were released. However, team claimed they found 201 vulnerable HP laser jet printers in the U.S. Department of Defense's network and two at HP's headquarters months after the security patch was released. In 2015, HP licensed Cui's Symbiote technology to use as a firmware defense against cyber attacks for its LaserJet Enterprise printers and multifunction printers.


Cisco IP Phones

At the 29th Chaos Communication Congress in December 2012, Cui and Solfo presented the findings of their
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adv ...
funded research study, which exposed a vulnerability in Cisco IP phones (CiscoUnified IP Phone 7900 series) that could allow an attacker to turn them into bugging devices. The exploit gained
root access In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of t ...
to the device's firmware, which could enable the interception of phone calls. It would also allow an attacker to remotely activate the phone's microphone in order to eavesdrop on nearby conversations.


Funtenna

At the 2015
Black Hat Briefings Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together a ...
cybersecurity conference, Cui unveiled a firmware exploit called “Funtenna” which manipulates the electronic processes within common devices like printers, phones, and washing machines in order to create radio signals which could secretly transmit data outside of a secure facility. The attack could even work with devices within an air-gapped system. News outlets such as
Ars Technica ''Ars Technica'' is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998. It publishes news, reviews, and guides on issues such as computer hardware and software, sci ...
and
Motherboard A motherboard (also called mainboard, main circuit board, mb, mboard, backplane board, base board, system board, logic board (only in Apple computers) or mobo) is the main printed circuit board (PCB) in general-purpose computers and other expand ...
noted Funtenna's potential for turning infected devices into covert spying tools.


Monitor Darkly

At the
DEF CON DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyer ...
24 security conference in 2016, Cui, along with his principal scientist Jatin Kataria and security researcher Francois Charbonneau, demonstrated previously unknown vulnerabilities in the
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
of widely used
computer monitor A computer monitor is an output device that displays information in pictorial or textual form. A discrete monitor comprises a visual display, support electronics, power supply, housing, electrical connectors, and external user controls. The di ...
s, which an attacker could exploit to both spy on the user's screen activity and to manipulate what the user sees and engages with on the screen. Called “Monitor Darkly,” the firmware vulnerability was reported to affect
Dell Dell is an American based technology company. It develops, sells, repairs, and supports computers and related products and services. Dell is owned by its parent company, Dell Technologies. Dell sells personal computers (PCs), servers, data ...
, HP,
Samsung The Samsung Group (or simply Samsung) ( ko, 삼성 ) is a South Korean multinational manufacturing conglomerate headquartered in Samsung Town, Seoul, South Korea. It comprises numerous affiliated businesses, most of them united under the ...
and Acer computer monitors. The vulnerability was specific to the monitors’ on-screen-display (OSD) controllers, which are used to control and adjust viewing options on the screen, such as brightness, contrast or horizontal/vertical positioning. However, as Cui, Kataria and Charbonneau noted in their talk abstract for the 2016 REcon security conference, with the Monitor Darkly exploit, the OSD can also be used to “read the content of the screen, change arbitrary pixel values, and execute arbitrary code supplied through numerous control channels.” The security news site
CSO Online International Data Group (IDG, Inc.) is a market intelligence and demand generation company focused on the technology industry. IDG, Inc.’s mission is centered around supporting the technology industry through research, data, marketing technol ...
said about the vulnerability, “By exploiting a hacked monitor, they could manipulate the pixels and add a secure-lock icon by a URL. They could make a $0
PayPal PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support online money transfers, and serves as an electronic alternative to traditional paper ...
account balance appear to be a $1 billion balance. They could change ‘the status-alert light on a power plant's control interface from green to red.’” The exploit was later used in a Season 3 episode of the
Mr. Robot ''Mr. Robot'' is an American drama thriller television series created by Sam Esmail for USA Network. It stars Rami Malek as Elliot Alderson, a cybersecurity engineer and hacker with social anxiety disorder, clinical depression and dissociati ...
show, in which the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
uses it to take screenshots of
Elliot Alderson ''Mr. Robot'' is an American drama thriller television series created by Sam Esmail for USA Network. It stars Rami Malek as Elliot Alderson, a cybersecurity engineer and hacker with social anxiety disorder, clinical depression and dissociative ...
’s computer.


BadFET

At the 2017 REcon security conference, Cui and security researcher Rick Housley demonstrated a new method for hacking processors through the use of an
electromagnetic pulse An electromagnetic pulse (EMP), also a transient electromagnetic disturbance (TED), is a brief burst of electromagnetic energy. Depending upon the source, the origin of an EMP can be natural or artificial, and can occur as an electromagnetic fie ...
, or EMP. Known as electromagnetic
fault injection In computer science, fault injection is a testing technique for understanding how computing systems behave when stressed in unusual ways. This can be achieved using physical- or software-based means, or using a hybrid approach. Widely studied phys ...
(EMFI), this class of attacks has been investigated before, but Cui and Housley’s new technique, known as “BadFET," is adapted to exploit modern computers and embedded devices, by impacting multiple components within these devices at the same time. By using a 300 volt EMP pulse from 3 millimeters away, the BadFET attack bypasses the
Secure Boot UEFI (Unified Extensible Firmware Interface) is a set of Specification (technical standard), specifications written by the UEFI Forum. They define the Software architecture, architecture of the platform firmware used for booting and its Interfa ...
protection that keeps processors from running untrusted code. Cui and Housley also introduced an open source EMFI platform that makes BadFET available to other security researchers, for further analysis, testing and development.


Thrangrycat

On May 13, 2019, Cui and his research team (composed of Jatin Kataria, Richard Housley and James Chambers) jointly announced with
Cisco Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
a critical vulnerability in Cisco's secure boot process identified as CVE-2019-1649, and referred to as “Thrangrycat” by Red Balloon Security. The vulnerability affects a key hardware security component developed by Cisco known as the Trust Anchor module (TAm). The vulnerability is considered significant, as TAm underpins the secure boot process in numerous Cisco devices, including routers and switches. As
WIRED Magazine ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online magazine, online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquar ...
explained in its reporting on the Thrangrycat vulnerability: "Known as the Trust Anchor, this Cisco security feature has been implemented in almost all of the company’s enterprise devices since 2013. The fact that the researchers have demonstrated a way to bypass it in one device indicates that it may be possible, with device-specific modifications, to defeat the Trust Anchor on hundreds of millions of Cisco units around the world. That includes everything from enterprise routers to network switches to
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
s.” Cisco describes the TAm as a “proprietary, tamper-resistant chip” that is “found in many Cisco products” and “helps verify that Cisco hardware is authentic.” The vulnerability could enable an attacker to modify the
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
of this module to gain persistent access on a network and carry out many different types of malicious activity, including data theft, importing
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
and physical destruction of equipment.
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
called Thrangrycat “super alarming,” with WIRED Magazine warning it has “massive global implications.” Thrangrycat is believed to be the first security vulnerability to be named with
emoji An emoji ( ; plural emoji or emojis) is a pictogram, logogram, ideogram or smiley embedded in text and used in electronic messages and web pages. The primary function of emoji is to fill in emotional cues otherwise missing from typed conversat ...
symbols.


References

{{DEFAULTSORT:Cui, Ang Living people American computer scientists Place of birth missing (living people) Columbia University alumni Columbia University faculty American technology company founders 1983 births