Follow
John H. Castellanos
John H. Castellanos
Cybersecurity researcher, Hitachi Energy Research
Verified email at hitachienergy.com
Title
Cited by
Cited by
Year
Twos: A dataset of malicious insider threat behavior based on a gamified competition
A Harilal, F Toffalini, J Castellanos, J Guarnizo, I Homoliak, M Ochoa
Proceedings of the 2017 international workshop on managing insider security …, 2017
582017
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
A Harilal, F Toffalini, I Homoliak, JH Castellanos, J Guarnizo, S Mondal, ...
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 54-85, 2018
452018
Legacy-compliant data authentication for industrial control system traffic
JH Castellanos, D Antonioli, NO Tippenhauer, M Ochoa
Applied Cryptography and Network Security: 15th International Conference …, 2017
392017
Finding dependencies between cyber-physical domains for security testing of industrial control systems
JH Castellanos, M Ochoa, J Zhou
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
342018
A modular hybrid learning approach for black-box security testing of CPS
JH Castellanos, J Zhou
Applied Cryptography and Network Security: 17th International Conference …, 2019
232019
Enforcing memory safety in cyber-physical systems
EG Chekole, JH Castellanos, M Ochoa, DKY Yau
International Workshop on Security and Privacy Requirements Engineering, 127-144, 2017
212017
AttkFinder: Discovering attack vectors in PLC programs using information flow analysis
JH Castellanos, M Ochoa, AA Cardenas, O Arden, J Zhou
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
132021
Q-floid: Android malware detection with quantitative data flow graphs
JH Castellanos, T Wüchner, M Ochoa, S Rueda
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 13-25, 2016
82016
Evaluating cascading impact of attacks on resilience of industrial control systems: A design-centric modeling approach
Z Hau, JH Castellanos, J Zhou
Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, 42-53, 2020
72020
Blind concealment from reconstruction-based attack detectors for industrial control systems via backdoor attacks
T Walita, A Erba, JH Castellanos, NO Tippenhauer
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 36-47, 2023
22023
Evaluating Cascading Effects of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach
Z Hau, JH Castellanos, J Zhou
arXiv preprint arXiv:1905.03156, 2019
22019
Preventing Reverse Engineering of Control Programs in Industrial Control Systems
S Banerjee, SD Galbraith, T Khan, JH Castellanos, G Russello
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 48-59, 2023
12023
Identifying near-optimal single-shot attacks on icss with limited process knowledge
H Esquivel-Vargas, JH Castellanos, M Caselli, NO Tippenhauer, A Peter
International Conference on Applied Cryptography and Network Security, 170-192, 2022
12022
Communication method and apparatus for an industrial control system
M Ochoa, NO Tippenhauer, JH Castellanos, D Antonioli
US Patent App. 16/626,843, 2020
12020
Provable Adversarial Safety in Cyber-Physical Systems
JH Castellanos, M Maghenem, AA Cárdenas, RG Sanfelice, J Zhou
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 979-1012, 2023
2023
Selective Encryption Framework for Securing Communication in Industrial Control Systems
S Banerjee, T Khan, JH Castellanos, G Russello
ICC 2023-IEEE International Conference on Communications, 4125-4130, 2023
2023
Timing Analysis of GOOSE in a Real-World Substation
J Lozano, K Koneru, JH Castellanos, AA Cardenas
2022 IEEE International Conference on Communications, Control, and Computing …, 2022
2022
Erratum to: Enforcing Memory Safety in Cyber-Physical Systems
EG Chekole, JH Castellanos, M Ochoa, DKY Yau
Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–18