Andrei Costin
Orcid: 0000-0002-2704-9715
According to our database1,
Andrei Costin
authored at least 45 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the Business Modeling and Software Design - 14th International Symposium, 2024
Proceedings of the Business Modeling and Software Design - 14th International Symposium, 2024
Proceedings of the Business Modeling and Software Design - 14th International Symposium, 2024
2023
HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants.
IEEE Internet Things J., May, 2023
CoRR, 2023
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research.
CoRR, 2023
Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications.
CoRR, 2023
Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023
On Tools for Practical and Effective Security Policy Management and Vulnerability Scanning.
Proceedings of the Business Modeling and Software Design - 13th International Symposium, 2023
Proceedings of the Business Modeling and Software Design - 13th International Symposium, 2023
Linking Computers to the Brain: Overview of Cybersecurity Threats and Possible Solutions.
Proceedings of the Business Modeling and Software Design - 13th International Symposium, 2023
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023
2022
Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures.
IEEE Trans. Aerosp. Electron. Syst., 2022
CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version).
CoRR, 2022
GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices-A Cybersecurity Pentesting Perspective.
IEEE Access, 2022
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems-An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems.
IEEE Access, 2022
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience.
IEEE Access, 2022
On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication.
IEEE Access, 2022
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications.
Proceedings of the IEEE International Conference on Trust, 2022
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Business Modeling and Software Design - 12th International Symposium, 2022
Proceedings of the Business Modeling and Software Design - 12th International Symposium, 2022
Proceedings of the Business Modeling and Software Design - 12th International Symposium, 2022
2021
OSRM-CCTV: Open-source CCTV-aware routing and navigation system for privacy, anonymity and safety (Preprint).
CoRR, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Towards CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety - Feasibility Study in Jyväskylä.
Proceedings of the 28th Conference of Open Innovations Association, 2021
Towards Practical Cybersecurity Mapping of STRIDE and CWE - a Multi-perspective Approach.
Proceedings of the 29th Conference of Open Innovations Association, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Feasibility Study on CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety. Jyvaskyla - Case-study of the First City to Benefit from CCTV-aware Technology. (Preprint).
CoRR, 2020
Towards large-scale, automated, accurate detection of CCTV camera objects using computer vision. Applications and implications for privacy, safety, and cybersecurity. (Preprint).
CoRR, 2020
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences.
CoRR, 2019
2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Towards Automated Classification of Firmware Images and Identification of Embedded Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
2016
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
2015
All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systems.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
EURASIP J. Inf. Secur., 2014
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013