Andrei Costin
Andrei Costin
Assistant Professor @ JYU.FI / Independent Security Researcher @ Firmware.RE
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
A Large Scale Analysis of the Security of Embedded Firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti, S Antipolis
Proceedings of the 23rd USENIX Security Symposium (SEC), 2014
Large Scale Analysis of the Security of Embedded Firmwares
A Costin
TELECOM ParisTech, 2015
Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
A Costin, A Francillon
BlackHat USA, 1-12, 2012
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
A Costin, A Zarras, A Francillon
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
A Costin
TrustED'16: International Workshop on Trustworthy Embedded Devices Proceedings, 2016
Inside the SCAM jungle: A closer look at 419 scam email operations
J Isacenkova, O Thonnard, A Costin, D Balzarotti, A Francillon
Security and Privacy Workshops (SPW), 2013 IEEE, 143-150, 2013
The role of phone numbers in understanding cyber-crime schemes
A Costin, J Isacenkova, M Balduzzi, A Francillon, D Balzarotti
Privacy, Security and Trust (PST), 2013 Eleventh Annual International …, 2013
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
A Costin, J Zaddach
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
A Costin, A Zarras, A Francillon
IFIP International Information Security and Privacy Conference, 2017
Hacking MFPs
A Costin
The 28th Chaos Communication Congress, 2011
All Your Cluster-Grids Are Belong to Us: Monitoring the (in)Security of Infrastructure Monitoring Systems
A Costin
1st IEEE Workshop On Security and Privacy in the Cloud, 2015
Lua code: security overview and practical approaches to static analysis
A Costin
Security and Privacy Workshops (SPW), 2017 IEEE, 2017
Short Paper: A Dangerous 'Pyrotechnic Composition': Fireworks, Embedded Wireless and Insecurity-by-Design
A Costin, A Francillon
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Poor Man’s Panopticon: Mass CCTV Surveillance for the masses
A Costin
PowerOfCommunity, November, 2013
PostScript: Danger Ahead?!
A Costin
Hack in Paris, 2012
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code
S Kairajärvi, A Costin, T Hämäläinen
Proceedings of the 10th ACM Conference on Data and Application Security and …, 2020
IoT/Embedded vs. Security: Learn from the Past, Apply to the Present, Prepare for the Future
A Costin
Спуфинг в воздухе
А Костин
Хакер 1, 168, 2013
an open source C implementation of the Courtois Dark Side attack.[Electronic resource]
A Costin, MFCUK
URL: https://code. google. com/p/mfcuk, 2009
State-of-the-art object detection model for detecting CCTV and video surveillance cameras from images and videos
HT Turtiainen, A Costin
University of Jyvaskyla, 2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20