Andrei Costin

Orcid: 0000-0002-2704-9715

According to our database1, Andrei Costin authored at least 40 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants.
IEEE Internet Things J., May, 2023

dump1030: open-source plug-and-play demodulator/decoder for 1030MHz uplink.
CoRR, 2023

Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research.
CoRR, 2023

Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications.
CoRR, 2023

Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

On Tools for Practical and Effective Security Policy Management and Vulnerability Scanning.
Proceedings of the Business Modeling and Software Design - 13th International Symposium, 2023

A View on Vulnerabilities Within IoT Devices in the Smart Home Environment.
Proceedings of the Business Modeling and Software Design - 13th International Symposium, 2023

Linking Computers to the Brain: Overview of Cybersecurity Threats and Possible Solutions.
Proceedings of the Business Modeling and Software Design - 13th International Symposium, 2023

Offensive Machine Learning Methods and the Cyber Kill Chain.
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023

Defensive Machine Learning Methods and the Cyber Defence Chain.
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023

2022
Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures.
IEEE Trans. Aerosp. Electron. Syst., 2022

CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version).
CoRR, 2022

GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices-A Cybersecurity Pentesting Perspective.
IEEE Access, 2022

On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems-An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems.
IEEE Access, 2022

Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience.
IEEE Access, 2022

On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication.
IEEE Access, 2022

CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications.
Proceedings of the IEEE International Conference on Trust, 2022

CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications.
Proceedings of the IEEE International Conference on Trust, 2022

CCTV-Exposure: System for Measuring User's Privacy Exposure to CCTV Cameras.
Proceedings of the Business Modeling and Software Design - 12th International Symposium, 2022

OSRM-CCTV: CCTV-Aware Routing and Navigation System for Privacy and Safety.
Proceedings of the Business Modeling and Software Design - 12th International Symposium, 2022

Trends for the DevOps Security. A Systematic Literature Review.
Proceedings of the Business Modeling and Software Design - 12th International Symposium, 2022

2021
OSRM-CCTV: Open-source CCTV-aware routing and navigation system for privacy, anonymity and safety (Preprint).
CoRR, 2021

Brima: Low-Overhead Browser-Only Image Annotation Tool (Preprint).
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Towards CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety - Feasibility Study in Jyväskylä.
Proceedings of the 28th Conference of Open Innovations Association, 2021

Towards Practical Cybersecurity Mapping of STRIDE and CWE - a Multi-perspective Approach.
Proceedings of the 29th Conference of Open Innovations Association, 2021

Finding Software Bugs in Embedded Devices.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Feasibility Study on CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety. Jyvaskyla - Case-study of the First City to Benefit from CCTV-aware Technology. (Preprint).
CoRR, 2020

Towards large-scale, automated, accurate detection of CCTV camera objects using computer vision. Applications and implications for privacy, safety, and cybersecurity. (Preprint).
CoRR, 2020

ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences.
CoRR, 2019

2017
Lua Code: Security Overview and Practical Approaches to Static Analysis.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Towards Automated Classification of Firmware Images and Identification of Embedded Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

2016
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

2015
All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systems.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations.
EURASIP J. Inf. Secur., 2014

Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

A Large-Scale Analysis of the Security of Embedded Firmwares.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
The role of phone numbers in understanding cyber-crime schemes.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013


  Loading...