2019Cesar Bernardini, Samuel Marchal, Muhammad Rizwan Asghar, Bruno Crispo (2019). PrivICN Privacy-preserving content retrieval in information-centric networking. Computer Networks, 149:13-28.PrivICN Privacy-preserving content retrieval in information-centric networkingBernardiniPublished
2018Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan (2018). Migrating SGX Enclaves with Persistent State. ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) p. 195-206.Migrating SGX Enclaves with Persistent StateAlderPublished
2018Edward Arbon, Peter Smet, Lachlan Gunn, Mark McDonnell (2018). Anomaly Detection in Satellite Communications Systems using LSTM Networks. Military Communications and Information Systems Conference, 2018 Military Communications and Information Systems Conference (MilCIS)Anomaly Detection in Satellite Communications Systems using LSTM NetworksArbonPublished
2018N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik (2018). ASSURED Architecture for Secure Software Update of Realistic Embedded Devices. International Conference on Embedded Software, IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 37(37):2290-2300.ASSURED Architecture for Secure Software Update of Realistic Embedded DevicesAsokanPublished
2018Buse Gul Atli, Yoan Miche, Alexander Jung (2018). Network Intrusion Detection Using Flow Statistics. IEEE Statistical Signal Processing Workshop, 2018 IEEE Statistical Signal Processing Workshop, SSP 2018 p. 70-74.Network Intrusion Detection Using Flow StatisticsAtliPublished
2018Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan (2018). All You Need Is "Love": Evading Hate Speech Detection. ACM Workshop on Artificial Intelligence and Security, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security p. 2-12.All You Need Is "Love": Evading Hate Speech DetectionGröndahlPublished
2018Shohreh Hosseinzadeh, Hans Liljestrand, Ville Leppanen, Andrew Paverd (2018). Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization. Workshop on System Software for Trusted Execution, SysTEX '18 Proceedings of the 3rd Workshop on System Software for Trusted Execution p. 42-47.Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow RandomizationHosseinzadehPublished
2018Mika Juuti, Francesco Corona, Juha Karhunen (2018). Stochastic Discriminant Analysis for Linear Supervised Dimension Reduction. NEUROCOMPUTING, 291:136-150.Stochastic Discriminant Analysis for Linear Supervised Dimension ReductionJuutiPublished
2018Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan (2018). Stay On-Topic Generating Context-specific Fake Restaurant Reviews. European Symposium on Research in Computer Security, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings, 11098 LNCS:132-151.Stay On-Topic Generating Context-specific Fake Restaurant ReviewsJuutiPublished
2018Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohmmad Mannan, N. Asokan (2018). SafeKeeper: Protecting Web Passwords using Trusted Execution Environments. INTERNATIONAL WORLD WIDE WEB CONFERENCE, WWW '18 : Proceedings of the 2018 World Wide Web Conference p. 349-358.SafeKeeper: Protecting Web Passwords using Trusted Execution EnvironmentsKrawieckaPublished
2018Arseny Kurnikov, Klaudia Krawiecka, Andrew Paverd, Mohmmad Mannan, N. Asokan (2018). Using SafeKeeper to Protect Web Passwords. INTERNATIONAL WORLD WIDE WEB CONFERENCE, Companion Proceedings of the The Web Conference 2018 p. 159-162 .Using SafeKeeper to Protect Web PasswordsKurnikovPublished
2018Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan (2018). Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. International Conference on Availability, Reliability and Security, ARES 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security p. 40:1-40:10.Keys in the Clouds: Auditable Multi-device Access to Cryptographic CredentialsKurnikovPublished
2018Jian Liu, Li Duan, Yong Li, N. Asokan (2018). Secure deduplication of encrypted data Refined model and new constructions. International Conference on Cryptographers Track, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Topics in Cryptology – CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, Proceedings, 10808 LNCS:374-393.Secure deduplication of encrypted data Refined model and new constructionsLiuPublished
2018Jian Liu (2018). Privacy-Preserving Cloud-Assisted Services. Privacy-Preserving Cloud-Assisted ServicesLiuPublished
2018Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan (2018). Toward Fairness of Cryptocurrency Payments. IEEE SECURITY AND PRIVACY, 16(16):81-89.Toward Fairness of Cryptocurrency PaymentsLiuPublished
2018Samuel Marchal, N. Asokan (2018). On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World. USENIX Workshop on Cyber Security Experimentation and Test, 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)On Designing and Evaluating Phishing Webpage Detection Techniques for the Real WorldMarchalPublished
2018Markus Miettinen, Thien Duc Nguyen, Ahmad Reza Sadeghi, N. Asokan (2018). Revisiting context-based authentication in IoT. Annual Design Automation Conference, Proceedings of the 55th Annual Design Automation Conference, DAC 2018, Part F137710.Revisiting context-based authentication in IoTMiettinenPublished
2018Markus Miettinen, N. Asokan (2018). Ad-hoc key agreement A brief history and the challenges ahead. COMPUTER COMMUNICATIONS, 131:32-34.Ad-hoc key agreement A brief history and the challenges aheadMiettinenPublished
2018Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Gröndahl, N. Asokan, Ahmad-Reza Sadeghi (2018). OmniShare: Encrypted Cloud Storage for the Multi-Device Era. IEEE INTERNET COMPUTING, 22(22):27-36.OmniShare: Encrypted Cloud Storage for the Multi-Device EraPaverdPublished
2018Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan (2018). Toward Linux kernel memory safety. SOFTWARE-PRACTICE AND EXPERIENCE, 48(48):2237-2256.Toward Linux kernel memory safetyReshetovaPublished
2018Elena Reshetova (2018). Mobile and Embedded Platform Security. Mobile and Embedded Platform SecurityReshetovaPublished
2018Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic (2018). Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving Trajectories. European Symposium on Security and Privacy, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018 p. 199-213.Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving TrajectoriesVaasPublished
2017Robin Ankele, Kubilay A. Kucuk, Andrew Martin, Andrew Simpson, Andrew Paverd (2017). Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation Requirements and Criteria for Large-Scale Applications. IEEE International Conference on Advanced and Trusted Computing, Proceedings - 13th IEEE International Conference on Ubiquitous Intelligence and Computing, 13th IEEE International Conference on Advanced and Trusted Computing, 16th IEEE International Conference on Scalable Computing and Communications, IEEE International Conference on Cloud and Big Data Computing, IEEE International Conference on Internet of People and IEEE Smart World Congress and Workshops, UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld 2016 p. 414-422.Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation Requirements and Criteria for Large-Scale ApplicationsAnkelePublished
2017Ahmad Atamli-Reineh, Andrew Paverd, Giuseppe Petracca, Andrew Martin (2017). A framework for application partitioning using trusted execution environments. CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE p. 1-23.A framework for application partitioning using trusted execution environmentsAtamli-ReinehPublished
2017Celine Blondeau, Kaisa Nyberg (2017). Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis. IACR Transactions on Symmetric Cryptology, 2016(2016):162-191.Improved Parameter Estimates for Correlation and Capacity Deviates in Linear CryptanalysisBlondeauPublished
2017Celine Blondeau, Gregor Leander, Kaisa Nyberg (2017). Differential-Linear Cryptanalysis Revisited. JOURNAL OF CRYPTOLOGY, 30(30):859-888.Differential-Linear Cryptanalysis RevisitedBlondeauPublished
2017Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi (2017). LO-FAT Low-Overhead Control Flow ATtestation in Hardware. Design Automation Conference, Proceedings of the 54th Annual Design Automation Conference 2017, DAC 2017, Part 128280.LO-FAT Low-Overhead Control Flow ATtestation in HardwareDessoukyPublished
2017Christian Hammerschmidt, Samuel Marchal, Radu State, Sicco Verwer (2017). Behavioral clustering of non-stationary IP flow record data. International Conference on Network and Service Management, International Conference on Network and Service Management, 2016 12th International Conference on Network and Service Management (CNSM) p. 297-301.Behavioral clustering of non-stationary IP flow record dataHammerschmidtPublished
2017Mika Juuti, Christian Vaas, Hans Liljestrand, Ivo Sluganovic, N Asokan, Ivan Martinovic (2017). Implementing prover-side proximity verification for strengthening transparent authentication. IEEE International Conference on Sensing, Communication and Networking, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA Demo Session p. 1-2.Implementing prover-side proximity verification for strengthening transparent authenticationJuutiPublished
2017Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N Asokan, Ivan Martinovic (2017). STASH: Securing transparent authentication schemes using prover-side proximity verification. IEEE International Conference on Sensing, Communication and Networking, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA p. 1-9.STASH: Securing transparent authentication schemes using prover-side proximity verificationJuutiPublished
2017Ágnes Kiss, Jian Liu, Thomas Schneider, N Asokan, Benny Pinkas (2017). Private Set Intersection for Unequal Set Sizes with Mobile Applications. PRIVACY ENHANCING TECHNOLOGIES SYMPOSIUM, Proceedings on Privacy Enhancing Technologies, Proceedings on Privacy Enhancing Technologies, 2017:177–197.Private Set Intersection for Unequal Set Sizes with Mobile ApplicationsKissPublished
2017Zhe Liu, Johann Großschädl, Zhi Hu, Kimmo Järvinen, Husen Wang, Ingrid Verbauwhede (2017). Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE TRANSACTIONS ON COMPUTERS, 66(66):773-785.Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of ThingsLiuPublished
2017Jian Liu, Mika Juuti, Yao Lu, N. Asokan (2017). Oblivious Neural Network Predictions via MiniONN Transformations. ACM Conference on Computer and Communications Security, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security p. 619-631.Oblivious Neural Network Predictions via MiniONN TransformationsLiuPublished
2017S. Marchal, G. Armano, T. Gröndahl, K. Saari, Nidhi Singh, N. Asokan (2017). Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application. IEEE TRANSACTIONS ON COMPUTERS, 66(66):1717-1733.Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention ApplicationMarchalPublished
2017M. Miettinen, S. Marchal, I. Hafeez, T. Frassetto, N. Asokan, Ahmad-Reza Sadeghi, S. Tarkoma (2017). IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. International Conference on Distributed Computing Systems, International Conference on Distributed Computing Systems. Proceedings, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 37:2511-2514.IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoTMiettinenPublished
2017M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, Ahmad-Reza Sadeghi, S. Tarkoma (2017). IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. International Conference on Distributed Computing Systems, International Conference on Distributed Computing Systems. Proceedings, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 37:2177-2184.IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoTMiettinenPublished
2017Philipp Mundhenk, Andrew Paverd, Artur Mrowca, Sebastian Steinhorst, Martin Lukasiewycz, Suhaib A. Fahmy, Samarjit Chakraborty (2017). Security in automotive networks Lightweight authentication and authorization. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 22(22):1-27.Security in automotive networks Lightweight authentication and authorizationMundhenkPublished
2017Masoud Naderpour, Tommi Meskanen, Andrew Paverd, Valtteri Niemi (2017). Auditable De-anonymization in V2X Communication. Journal of ICT Standardisation, 5(5):51-106.Auditable De-anonymization in V2X CommunicationNaderpourPublished
2017Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N Asokan (2017). CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers. International Symposium on Research in Attacks, Intrusions, and Defenses, Lecture Notes in Computer Science, Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings, 10453:259-284.CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial MicrocontrollersNymanPublished
2017Elena Reshetova, Filippo Bonazzi, N. Asokan (2017). Randomization can’t stop BPF JIT spray. International Conference on Network and System Security, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Network and System Security - 11th International Conference, NSS 2017, Proceedings, 10394 LNCS:233-247.Randomization can’t stop BPF JIT sprayReshetovaPublished
2017S. Signorello, S. Marchal, J. François, O. Festor, R. State (2017). Advanced interest flooding attacks in named-data networking. International Symposium on Network Computing and Applications, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)Advanced interest flooding attacks in named-data networkingSignorelloPublished
2017Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan (2017). The circle game Scalable private membership test using trusted hardware. ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security p. 31-44.The circle game Scalable private membership test using trusted hardwareTamrakarPublished
2017Sandeep Tamrakar (2017). Applications of Trusted Execution Environments (TEEs). Applications of Trusted Execution Environments (TEEs)TamrakarPublished
2017Radek Tomsu, S. Marchal, N. Asokan (2017). Profiling Users by Modeling Web Transactions. International Conference on Distributed Computing Systems, International Conference on Distributed Computing Systems. Proceedings, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 37:2399-2404.Profiling Users by Modeling Web TransactionsTomsuPublished
2017Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, Stephan Wesemeyer (2017). Formal analysis of V2X revocation protocols. International Workshop on Security and Trust Management, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Security and Trust Management - 13th International Workshop, STM 2017, Proceedings, 10547 LNCS:147-163.Formal analysis of V2X revocation protocolsWhitefieldPublished
2017Celine Wieringa, Roberto Civino, Massimiliano Sala (2017). Differential Attacks: Using Alternative Operations. International Workshop on Coding and CryptographyDifferential Attacks: Using Alternative OperationsWieringaPublished
2016Tigist Abera, N. Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Paverd, Ahmad Reza Sadeghi, Gene Tsudik (2016). Invited - Things, trouble, trust On building trust in IoT systems. ACM IEEE Design Automation Conference, Proceedings : ACM IEEE Design Automation Conference, Proceedings of the 53rd Annual Design Automation Conference, DAC 2016, 05-09-June-2016.Invited - Things, trouble, trust On building trust in IoT systemsAberaPublished
2016Tigist Abera, N Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik (2016). C-FLAT: Control-Flow Attestation for Embedded Systems Software. ACM Conference on Computer and Communications Security, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security p. 743-754.C-FLAT: Control-Flow Attestation for Embedded Systems SoftwareAberaPublished
2016Giovanni Armano, Samuel Marchal, N Asokan (2016). Real-Time Client-Side Phishing Prevention Add-On. International Conference on Distributed Computing Systems, Proceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016, 2016-August:777 - 778 .Real-Time Client-Side Phishing Prevention Add-OnArmanoPublished
2016N. Asokan (2016). Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. Network and Distributed System Security SymposiumPractical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication SystemsAsokanPublished
2016Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu (2016). While mobile encounters with clouds. International Conference on Network and System Security, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Network and System Security - 10th International Conference, NSS 2016, Proceedings, 9955 LNCS:3-18.While mobile encounters with cloudsAuPublished
2016Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan (2016). ABAKA A novel attribute-based k-anonymous collaborative solution for LBSs. COMPUTER COMMUNICATIONS, 85:1-13.ABAKA A novel attribute-based k-anonymous collaborative solution for LBSsDargahiPublished
2016Cesar Pereida García, Billy Bob Brumley, Yuval Yarom (2016). "Make sure DSA signing exponentiations really are constant-time". ACM Conference on Computer and Communications Security, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 24-28-October-2016:1639-1650."Make sure DSA signing exponentiations really are constant-time"GarcíaPublished
2016Christian Hammerschmidt, Samuel Marchal, Radu State, Gaetano Pellegrino, Sicco Verwer (2016). Efficient Learning of Communication Profiles from IP Flow Records. Conference on Local Computer Networks, Conference on Local Computer Networks, 2016 IEEE 41st Conference on Local Computer Networks (LCN) p. 559-562.Efficient Learning of Communication Profiles from IP Flow RecordsHammerschmidtPublished
2016Otto Huhta, Prakash Shrestha, Swapnil Udar, Mika Juuti, Nitesh Saxena, N Asokan (2016). Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM, Network and Distributed System Security Symposium 2016 p. 1-14.Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation AttacksHuhtaPublished
2016Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, Ivan Martinovic, N Asokan (2016). TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition. TRec: Relay-Resilient Transparent Authentication using Trajectory RecognitionJuutiPublished
2016Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa (2016). Fourq on FPGA New hardware speed records for elliptic curve cryptography over large prime characteristic fields. International Conference on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings, 9813:517-537.Fourq on FPGA New hardware speed records for elliptic curve cryptography over large prime characteristic fieldsJärvinenPublished
2016Mikko Kiviharju, Arseny Kurnikov (2016). Tactical CAC Profile for NATO OLP? Performance Estimations for NATO OLP Cryptographic Evolution Stage. IEEE Military Communications Conference, IEEE Military Communications Conference proceedings, MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE p. 533-538.Tactical CAC Profile for NATO OLP? Performance Estimations for NATO OLP Cryptographic Evolution StageKiviharjuPublished
2016Klaudia Krawiecka, Andrew Paverd, N. Asokan (2016). Protecting Password Databases Using Trusted Hardware. Workshop on System Software for Trusted Execution, Proceedings of the 1st Workshop on System Software for Trusted ExecutionProtecting Password Databases Using Trusted HardwareKrawieckaPublished
2016Kubilay Ahmet Küçük, Andrew Paverd, Andrew Martin, N. Asokan, Andrew Simpson, Robin Ankele (2016). Exploring the Use of Intel SGX for Secure Many-Party Applications. Workshop on System Software for Trusted Execution, Proceedings of the 1st Workshop on System Software for Trusted Execution p. 1-6.Exploring the Use of Intel SGX for Secure Many-Party ApplicationsKüçükPublished
2016Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim Kwang Raymond Choo (2016). A new transitive signature scheme. International Conference on Network and System Security, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Network and System Security - 10th International Conference, NSS 2016, Proceedings, 9955 LNCS:156-167.A new transitive signature schemeLinPublished
2016Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang (2016). Online/offline public-index predicate encryption for fine-grained mobile access control. European Symposium on Research in Computer Security, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings, 9879 LNCS:588-605.Online/offline public-index predicate encryption for fine-grained mobile access controlLiuPublished
2016Chu Luo, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Goncalves, Kaitai Liang, Tapio Seppänen, Vassilis Kostakos (2016). A data hiding approach for sensitive smartphone data. ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016 - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing p. 557-568.A data hiding approach for sensitive smartphone dataLuoPublished
2016Samuel Marchal, Kalle Saari, Nidhi Singh, N Asokan (2016). Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets. International Conference on Distributed Computing Systems, International Conference on Distributed Computing Systems. Proceedings, IEEE 36th International Conference on Distributed Computing Systems (ICDCS) p. 323 - 333 .Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their TargetsMarchalPublished
2016Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan, Ahmad Reza Sadeghi (2016). Poster Friend or foe? Context authentication for trust domain separation in IoT environments. ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2016 - Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks p. 225-226.Poster Friend or foe? Context authentication for trust domain separation in IoT environmentsMiettinenPublished
2016Elena Reshetova, Filippo Bonazzi, N Asokan (2016). SELint: an SEAndroid policy analysis tool. SELint: an SEAndroid policy analysis toolReshetovaPublished
2016Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan (2016). Characterizing SEAndroid policies in the wild. International Conference on Information Systems Security and Privacy, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy p. 482-489.Characterizing SEAndroid policies in the wildReshetovaPublished
2016Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena (2016). Theft-Resilient Mobile Payments: Transparently Authenticating NFC Users with Tapping Gesture Biometrics. ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, Proceedings of the 32nd Annual Conference on Computer Security Applications ACSAC '16 p. 265-276.Theft-Resilient Mobile Payments: Transparently Authenticating NFC Users with Tapping Gesture BiometricsShresthaPublished
2016Narges Yousefnezhad, Marcin Nagy, N. Asokan (2016). On improving tie strength estimates by aggregating multiple communication channels. IFIP Networking Conference (IFIP Networking) and Workshops, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016 p. 530-535.On improving tie strength estimates by aggregating multiple communication channelsYousefnezhadPublished
2018Abu Shohel Ahmed, Tuomas Aura (2018). Turning Trust Around Smart Contract-Assisted Public Key Infrastructure. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Proceedings -17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018 p. 104-111.Turning Trust Around Smart Contract-Assisted Public Key InfrastructureAhmedPublished
2018Thanh Bui, Tuomas Aura (2018). Application of Public Ledgers to Revocation in Distributed Access Control. International Conference on Information, Communications and Signal Processing
, Security and Cryptology, Information and Communications Security
, 11149:781-792.
Application of Public Ledgers to Revocation in Distributed Access ControlBuiPublished
2018Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura (2018). Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer. USENIX Security Symposium, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA p. 1511-1525.Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the ComputerBuiPublished
2018Alberto Geniola, Markku Antikainen, Tuomas Aura (2018). Automated analysis of freeware installers promoted by download portals. COMPUTERS AND SECURITY, 77:209-225.Automated analysis of freeware installers promoted by download portalsGeniolaPublished
2018Aapo Kalliola, Yoan Miche, Ian Oliver, Silke Holtmanns, Buse Atli, Amaury Lendasse, Kaj-Mikael Bjork, Anton Akusok, Tuomas Aura (2018). Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and Mitigation. International Conference on Extreme Learning Machines, Proceedings in Adaptation, Learning and Optimization, Proceedings of ELM-2016, 9:129-143.Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and MitigationKalliolaPublished
2018Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Tuomas Aura (2018). Security wrapper orchestration in cloud. International Conference on Availability, Reliability and Security, ARES 2018 - 13th International Conference on Availability, Reliability and SecuritySecurity wrapper orchestration in cloudKalliolaPublished
2017Cesar Bernardini, Muhammad Rizwan Asghar, Bruno Crispo (2017). Security and privacy in vehicular communications Challenges and opportunities. Vehicular Communications, 10:13-28.Security and privacy in vehicular communications Challenges and opportunitiesBernardiniPublished
2017Thanh Bui (2017). Key exchange with the help of a public ledger (Transcript of discussion). International Workshop on Security Protocols, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Security Protocols XXV - 25th International Workshop, Revised Selected Papers, 10476 LNCS:137-143.Key exchange with the help of a public ledger (Transcript of discussion)BuiPublished
2017Thanh Bui, Tuomas Aura (2017). GPASS: A Password Manager with Group-Based Access Control. NORDIC CONFERENCE ON SECURE IT SYSTEMS, Lecture Notes in Computer Science, Secure IT Systems 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings, 10674:229-244.GPASS: A Password Manager with Group-Based Access ControlBuiPublished
2017Thanh Bui, Tuomas Aura (2017). Key Exchange with the Help of a Public Ledger. International Security Protocols Workshop, Lecture Notes in Computer Science, Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers, 10476:123-136.Key Exchange with the Help of a Public LedgerBuiPublished
2017Alberto Geniola, Markku Antikainen, Tuomas Aura (2017). A Large-Scale Analysis of Download Portals and Freeware Installers. NORDIC CONFERENCE ON SECURE IT SYSTEMS, Lecture Notes in Computer Science, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings, 10674:209-225.A Large-Scale Analysis of Download Portals and Freeware InstallersGeniolaPublished
2017Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura (2017). SynAPTIC Secure and persistent connectivity for containers. IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing,, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017 p. 262-267.SynAPTIC Secure and persistent connectivity for containersRanjbarPublished
2017Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppanen (2017). A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet. European Intelligence and Security Informatics Conference, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016 p. 144-147.A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internetRuohonenPublished
2017Sanja Scepanovic, Igor Mishkovski, Jukka Ruohonen, Frederick Ayala-Gómez, Tuomas Aura, Sami Hyrynsalmi (2017). Malware distributions and graph structure of the Web. CoRR, abs/1707.06071.Malware distributions and graph structure of the WebScepanovicPublished
2016Tien Bui, Tuomas Aura (2016). Application of Public Ledgers to Revocation in Distributed Access Control. Application of Public Ledgers to Revocation in Distributed Access ControlBuiPublished
2016Silke Holtmanns, Siddharth Prakash Rao, Ian Oliver (2016). User location tracking attacks for LTE networks using the interworking functionality. IFIP Networking Conference and Workshops, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016 p. 315-322.User location tracking attacks for LTE networks using the interworking functionalityHoltmannsPublished
2016Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura (2016). An SDN-based approach to enhance the end-to-end security SSL/TLS case study. IEEE/IFIP Network Operations and Management Symposium, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium p. 281-288.An SDN-based approach to enhance the end-to-end security SSL/TLS case studyRanjbarPublished
2016Siddharth Prakash Rao, Ian Oliver, Silke Holtmanns, Tuomas Aura (2016). We know where you are!. International Conference on Cyber Conflict, 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016, 2016-August:277-293.We know where you are!RaoPublished
2016Siddharth Rao, Bhanu Teja Kotte, Silke Holtmanns (2016). Privacy in LTE networks. EAI International Conference on Mobile Multimedia Communications, MobiMedia '16 Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications p. 176-183.Privacy in LTE networksRaoPublished
2016Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppanen (2016). Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs. European Conference on Software Architecture Workshops, Proceedings of the 10th European Conference on Software Architecture WorkshopsCorrelating File-based Malware Graphs Against the Empirical Ground Truth of DNS GraphsRuohonenPublished
2016Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen (2016). The Black Mark Beside My Name Server Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs. International Conference on Future Internet of Things and Cloud Workshops, 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW) p. 264-269.The Black Mark Beside My Name Server Exploring the Importance of Name Server IP Addresses in Malware DNS GraphsRuohonenPublished