A Large Scale Analysis of the Security of Embedded Firmwares A Costin, J Zaddach, A Francillon, D Balzarotti, S Antipolis Proceedings of the 23rd USENIX Security Symposium (SEC), 2014 | 607 | 2014 |
Large Scale Analysis of the Security of Embedded Firmwares A Costin TELECOM ParisTech, 2015 | 603 | 2015 |
Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices A Costin, A Francillon BlackHat USA, 1-12, 2012 | 335 | 2012 |
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces A Costin, A Zarras, A Francillon Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 277 | 2016 |
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces A Costin, A Zarras, A Francillon Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 277 | 2016 |
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies A Costin, J Zaddach | 132 | 2018 |
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations A Costin TrustED'16: International Workshop on Trustworthy Embedded Devices Proceedings, 2016 | 130 | 2016 |
Embedded devices security and firmware reverse engineering J Zaddach, A Costin Black-Hat USA, 2013 | 69 | 2013 |
Inside the SCAM jungle: A closer look at 419 scam email operations J Isacenkova, O Thonnard, A Costin, D Balzarotti, A Francillon Security and Privacy Workshops (SPW), 2013 IEEE, 143-150, 2013 | 68 | 2013 |
The role of phone numbers in understanding cyber-crime schemes A Costin, J Isacenkova, M Balduzzi, A Francillon, D Balzarotti Privacy, Security and Trust (PST), 2013 Eleventh Annual International …, 2013 | 43 | 2013 |
Security and resilience of smart home environments: Good practices and recommendations C Lévy-Bencheton, E Darra, G Tétu, G Dufay, M Alattar, A Costin Publications Office of the European Union, 2015 | 37 | 2015 |
Towards Automated Classification of Firmware Images and Identification of Embedded Devices A Costin, A Zarras, A Francillon IFIP International Information Security and Privacy Conference, 2017 | 34 | 2017 |
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications H Turtiainen, A Costin, T Hämäläinen, T Lahtinen, L Sintonen 2022 IEEE International Conference on Trust, Security and Privacy in …, 2022 | 24* | 2022 |
Cybersecurity attacks on software logic and error handling within ADS-B implementations: Systematic testing of resilience and countermeasures S Khandker, H Turtiainen, A Costin, T Hämäläinen IEEE Transactions on Aerospace and Electronic Systems 58 (4), 2702-2719, 2022 | 24 | 2022 |
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience S Khandker, H Turtiainen, A Costin, T Hämäläinen IEEE Access 10, 29493-29505, 2022 | 22 | 2022 |
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems – An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems S Khandker, H Turtiainen, A Costin, T Hamalainen IEEE Access, 2022 | 16 | 2022 |
Toward Practical Cybersecurity Mapping of STRIDE and CWE - a Multi-perspective Approach A Honkaranta, T Leppänen, A Costin Proceedings of Conference of Open Innovations Association FRUCT, 2021 | 15 | 2021 |
Hacking MFPs A Costin The 28th Chaos Communication Congress, 2011 | 15* | 2011 |
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code S Kairajärvi, A Costin, T Hämäläinen Proceedings of the 10th ACM Conference on Data and Application Security and …, 2020 | 14* | 2020 |
All Your Cluster-Grids Are Belong to Us: Monitoring the (in)Security of Infrastructure Monitoring Systems A Costin 1st IEEE Workshop On Security and Privacy in the Cloud, 2015 | 14 | 2015 |