John H. Castellanos

Orcid: 0000-0003-3368-400X

According to our database1, John H. Castellanos authored at least 18 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
ConfuSense: Sensor Reconfiguration Attacks for Stealthy UAV Manipulation.
Proceedings of the 3rd USENIX Symposium on Vehicle Security and Privacy, 2025

2024
Sensor Deprivation Attacks for Stealthy UAV Manipulation.
CoRR, 2024

2023
Selective Encryption Framework for Securing Communication in Industrial Control Systems.
Proceedings of the IEEE International Conference on Communications, 2023

Provable Adversarial Safety in Cyber-Physical Systems.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

Preventing Reverse Engineering of Control Programs in Industrial Control Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

2022
Timing Analysis of GOOSE in a Real-World Substation.
Proceedings of the IEEE International Conference on Communications, 2022

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

2019
Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach.
CoRR, 2019

A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Enforcing Memory Safety in Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Legacy-Compliant Data Authentication for Industrial Control System Traffic.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Q-Floid: Android Malware detection with Quantitative Data Flow Graphs.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016


  Loading...