关注
Andrei Costin
Andrei Costin
Assistant Professor CyberSecurity 🧑‍🏫 JYU.FI | binare.io 🚀 Co-Founder/CEO | Firmware.RE ⚗️ Creator
在 jyu.fi 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A Large Scale Analysis of the Security of Embedded Firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti, S Antipolis
Proceedings of the 23rd USENIX Security Symposium (SEC), 2014
6072014
Large Scale Analysis of the Security of Embedded Firmwares
A Costin
TELECOM ParisTech, 2015
6032015
Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
A Costin, A Francillon
BlackHat USA, 1-12, 2012
3352012
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces
A Costin, A Zarras, A Francillon
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
2772016
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
A Costin, A Zarras, A Francillon
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
2772016
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
A Costin, J Zaddach
1322018
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
A Costin
TrustED'16: International Workshop on Trustworthy Embedded Devices Proceedings, 2016
1302016
Embedded devices security and firmware reverse engineering
J Zaddach, A Costin
Black-Hat USA, 2013
692013
Inside the SCAM jungle: A closer look at 419 scam email operations
J Isacenkova, O Thonnard, A Costin, D Balzarotti, A Francillon
Security and Privacy Workshops (SPW), 2013 IEEE, 143-150, 2013
682013
The role of phone numbers in understanding cyber-crime schemes
A Costin, J Isacenkova, M Balduzzi, A Francillon, D Balzarotti
Privacy, Security and Trust (PST), 2013 Eleventh Annual International …, 2013
432013
Security and resilience of smart home environments: Good practices and recommendations
C Lévy-Bencheton, E Darra, G Tétu, G Dufay, M Alattar, A Costin
Publications Office of the European Union, 2015
372015
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
A Costin, A Zarras, A Francillon
IFIP International Information Security and Privacy Conference, 2017
342017
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications
H Turtiainen, A Costin, T Hämäläinen, T Lahtinen, L Sintonen
2022 IEEE International Conference on Trust, Security and Privacy in …, 2022
24*2022
Cybersecurity attacks on software logic and error handling within ADS-B implementations: Systematic testing of resilience and countermeasures
S Khandker, H Turtiainen, A Costin, T Hämäläinen
IEEE Transactions on Aerospace and Electronic Systems 58 (4), 2702-2719, 2022
242022
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
S Khandker, H Turtiainen, A Costin, T Hämäläinen
IEEE Access 10, 29493-29505, 2022
222022
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems – An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems
S Khandker, H Turtiainen, A Costin, T Hamalainen
IEEE Access, 2022
162022
Toward Practical Cybersecurity Mapping of STRIDE and CWE - a Multi-perspective Approach
A Honkaranta, T Leppänen, A Costin
Proceedings of Conference of Open Innovations Association FRUCT, 2021
152021
Hacking MFPs
A Costin
The 28th Chaos Communication Congress, 2011
15*2011
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code
S Kairajärvi, A Costin, T Hämäläinen
Proceedings of the 10th ACM Conference on Data and Application Security and …, 2020
14*2020
All Your Cluster-Grids Are Belong to Us: Monitoring the (in)Security of Infrastructure Monitoring Systems
A Costin
1st IEEE Workshop On Security and Privacy in the Cloud, 2015
142015
系统目前无法执行此操作,请稍后再试。
文章 1–20