default search action
Andrei Costin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil, Narges Yousefnezhad:
A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems. BMSD 2024: 166-185 - [c27]Narges Yousefnezhad, Andrei Costin:
Reproducibility of Firmware Analysis: An Empirical Study. BMSD 2024: 207-225 - [c26]Narges Yousefnezhad, Andrei Costin:
Understanding SBOMs in Real-World Systems - A Practical DevOps/SecOps Perspective. BMSD 2024: 293-304 - [c25]Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil:
Position: On Potential Malware & New Attack Vectors for Internet-of-Brains (IoB). EuroS&P Workshops 2024: 545-553 - [c24]Hannu Turtiainen, Andrei Costin:
VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP. EuroS&P Workshops 2024: 618-625 - 2023
- [j7]Javier Carrillo Mondéjar, Hannu Turtiainen, Andrei Costin, José Luis Martínez, Guillermo Suarez-Tangil:
HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants. IEEE Internet Things J. 10(10): 8371-8394 (2023) - [c23]Annika Nykänen, Andrei Costin:
A View on Vulnerabilities Within IoT Devices in the Smart Home Environment. BMSD 2023: 365-374 - [c22]Ilkka Urtamo, Andrei Costin:
On Tools for Practical and Effective Security Policy Management and Vulnerability Scanning. BMSD 2023: 375-382 - [c21]Tuomo Lahtinen, Andrei Costin:
Linking Computers to the Brain: Overview of Cybersecurity Threats and Possible Solutions. BMSD 2023: 383-392 - [c20]Andrei Costin, Hannu Turtiainen, Syed Khandkher, Timo Hämäläinen:
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. SpaceSec 2023 - [c19]Andrei Costin, Hannu Turtiainen, Syed Khandkher, Timo Hämäläinen:
Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications. SpaceSec 2023 - [p3]Hannu Turtiainen, Andrei Costin, Alex Polyakov, Timo Hämäläinen:
Offensive Machine Learning Methods and the Cyber Kill Chain. Artificial Intelligence and Cybersecurity 2023: 125-145 - [p2]Hannu Turtiainen, Andrei Costin, Timo Hämäläinen:
Defensive Machine Learning Methods and the Cyber Defence Chain. Artificial Intelligence and Cybersecurity 2023: 147-163 - [i10]Andrei Costin, Hannu Turtiainen, Syed Khandker, Timo Hämäläinen:
Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications. CoRR abs/2302.08359 (2023) - [i9]Andrei Costin, Syed Khandker, Hannu Turtiainen, Timo Hämäläinen:
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. CoRR abs/2302.08361 (2023) - [i8]Lassi Laaksosaari, Hannu Turtiainen, Syed Khandker, Andrei Costin:
dump1030: open-source plug-and-play demodulator/decoder for 1030MHz uplink. CoRR abs/2302.08368 (2023) - 2022
- [j6]Hannu Turtiainen, Andrei Costin, Syed Khandker, Timo Hämäläinen:
GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices-A Cybersecurity Pentesting Perspective. IEEE Access 10: 21554-21562 (2022) - [j5]Syed Khandker, Hannu Turtiainen, Andrei Costin, Timo Hämäläinen:
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience. IEEE Access 10: 29493-29505 (2022) - [j4]Syed Khandker, Hannu Turtiainen, Andrei Costin, Timo Hämäläinen:
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems-An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems. IEEE Access 10: 37718-37730 (2022) - [j3]Artturi Juvonen, Andrei Costin, Hannu Turtiainen, Timo Hämäläinen:
On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication. IEEE Access 10: 86542-86557 (2022) - [j2]Syed Khandker, Hannu Turtiainen, Andrei Costin, Timo Hämäläinen:
Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures. IEEE Trans. Aerosp. Electron. Syst. 58(4): 2702-2719 (2022) - [c18]Tiina Leppänen, Anne Honkaranta, Andrei Costin:
Trends for the DevOps Security. A Systematic Literature Review. BMSD 2022: 200-217 - [c17]Lauri Sintonen, Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen:
OSRM-CCTV: CCTV-Aware Routing and Navigation System for Privacy and Safety. BMSD 2022: 279-288 - [c16]Hannu Turtiainen, Andrei Costin, Timo Hämäläinen:
CCTV-Exposure: System for Measuring User's Privacy Exposure to CCTV Cameras. BMSD 2022: 289-298 - [c15]Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen, Lauri Sintonen:
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications. TrustCom 2022: 1219-1226 - [c14]Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen, Lauri Sintonen:
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications. TrustCom 2022: 1227-1234 - [i7]Hannu Turtiainen, Andrei Costin, Timo Hämäläinen:
CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version). CoRR abs/2208.02159 (2022) - 2021
- [c13]Anne Honkaranta, Tiina Leppänen, Andrei Costin:
Towards Practical Cybersecurity Mapping of STRIDE and CWE - a Multi-perspective Approach. FRUCT 2021: 150-159 - [c12]Tuomo Lahtinen, Lauri Sintonen, Hannu Turtiainen, Andrei Costin:
Towards CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety - Feasibility Study in Jyväskylä. FRUCT 2021: 252-263 - [c11]Tuomo Lahtinen, Hannu Turtiainen, Andrei Costin:
Brima: Low-Overhead Browser-Only Image Annotation Tool (Preprint). ICIP 2021: 2633-2637 - [p1]Aurélien Francillon, Sam L. Thomas, Andrei Costin:
Finding Software Bugs in Embedded Devices. Security of Ubiquitous Computing Systems 2021: 183-197 - [i6]Tuomo Lahtinen, Hannu Turtiainen, Andrei Costin:
BRIMA: low-overhead BRowser-only IMage Annotation tool (Preprint). CoRR abs/2107.06351 (2021) - [i5]Lauri Sintonen, Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen:
OSRM-CCTV: Open-source CCTV-aware routing and navigation system for privacy, anonymity and safety (Preprint). CoRR abs/2108.09369 (2021) - 2020
- [c10]Sami Kairajärvi, Andrei Costin, Timo Hämäläinen:
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code. CODASPY 2020: 376-380 - [i4]Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen:
Towards large-scale, automated, accurate detection of CCTV camera objects using computer vision. Applications and implications for privacy, safety, and cybersecurity. (Preprint). CoRR abs/2006.03870 (2020) - [i3]Tuomo Lahtinen, Lauri Sintonen, Hannu Turtiainen, Andrei Costin:
Feasibility Study on CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety. Jyvaskyla - Case-study of the First City to Benefit from CCTV-aware Technology. (Preprint). CoRR abs/2011.08598 (2020)
2010 – 2019
- 2019
- [i2]Sami Kairajärvi, Andrei Costin, Timo Hämäläinen:
Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences. CoRR abs/1908.05459 (2019) - 2017
- [c9]Andrei Costin, Apostolis Zarras, Aurélien Francillon:
Towards Automated Classification of Firmware Images and Identification of Embedded Devices. SEC 2017: 233-247 - [c8]Andrei Costin:
Lua Code: Security Overview and Practical Approaches to Static Analysis. IEEE Symposium on Security and Privacy Workshops 2017: 132-142 - 2016
- [c7]Andrei Costin:
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations. TrustED@CCS 2016: 45-54 - [c6]Andrei Costin, Apostolis Zarras, Aurélien Francillon:
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces. AsiaCCS 2016: 437-448 - 2015
- [c5]Andrei Costin:
All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systems. CNS 2015: 550-558 - [i1]Andrei Costin, Apostolis Zarras, Aurélien Francillon:
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces. CoRR abs/1511.03609 (2015) - 2014
- [j1]Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon, Davide Balzarotti:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. EURASIP J. Inf. Secur. 2014: 4 (2014) - [c4]Andrei Costin, Jonas Zaddach, Aurélien Francillon, Davide Balzarotti:
A Large-Scale Analysis of the Security of Embedded Firmwares. USENIX Security Symposium 2014: 95-110 - [c3]Andrei Costin, Aurélien Francillon:
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design. WISEC 2014: 57-62 - 2013
- [c2]Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti:
The role of phone numbers in understanding cyber-crime schemes. PST 2013: 213-220 - [c1]Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Davide Balzarotti, Aurélien Francillon:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. IEEE Symposium on Security and Privacy Workshops 2013: 143-150
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint