2016 | (2016). ABAKA. Computer Communications, 85(85):1-13. | ABAKA | Dargahi | Published |
2016 | (2016). Characterizing SEAndroid policies in the wild. International Conference on Information Systems Security and Privacy, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy():482-489. | Characterizing SEAndroid policies in the wild | Reshetova | Published |
2016 | (2016). Invited - Things, trouble, trust. ACM IEEE Design Automation Conference, Proceedings of the 53rd Annual Design Automation Conference, DAC 2016, 05-09-June-2016(05-09-June-2016). | Invited - Things, trouble, trust | Abera | Published |
2016 | (2016). An SDN-based approach to enhance the end-to-end security. IEEE/IFIP Network Operations and Management Symposium, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium():281-288. | An SDN-based approach to enhance the end-to-end security | Ranjbar | Published |
2016 | (2016). Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets. International Conference on Distributed Computing Systems, IEEE 36th International Conference on Distributed Computing Systems (ICDCS)():323 - 333 . | Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets | Marchal | Published |
2016 | (2016). Fourq on FPGA. International Conference on Cryptographic Hardware and Embedded Systems, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings, 9813(9813):517-537. | Fourq on FPGA | Järvinen | Published |
2016 | (2016). User location tracking attacks for LTE networks using the interworking functionality. IFIP Networking Conference and Workshops, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016():315-322. | User location tracking attacks for LTE networks using the interworking functionality | Holtmanns | Published |
2016 | (2016). While mobile encounters with clouds. International Conference on Network and System Security, Network and System Security - 10th International Conference, NSS 2016, Proceedings, 9955 LNCS(9955 LNCS):3-18. | While mobile encounters with clouds | Au | Published |
2016 | (2016). A new transitive signature scheme. International Conference on Network and System Security, Network and System Security - 10th International Conference, NSS 2016, Proceedings, 9955 LNCS(9955 LNCS):156-167. | A new transitive signature scheme | Lin | Published |
2016 | (2016). On improving tie strength estimates by aggregating multiple communication channels. IFIP Networking Conference and Workshops, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016():530-535. | On improving tie strength estimates by aggregating multiple communication channels | Yousefnezhad | Published |
2016 | (2016). Poster. ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2016 - Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks():225-226. | Poster | Miettinen | Published |
2016 | (2016). Real-Time Client-Side Phishing Prevention Add-On. International Conference on Distributed Computing Systems, Proceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016, 2016-August(2016-August):777 - 778 . | Real-Time Client-Side Phishing Prevention Add-On | Armano | Published |
2017 | (2017). Differential-Linear Cryptanalysis Revisited. Journal of Cryptology, 30(30):859-888. | Differential-Linear Cryptanalysis Revisited | Blondeau | Published |
2016 | (2016). A data hiding approach for sensitive smartphone data. ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016 - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing():557-568. | A data hiding approach for sensitive smartphone data | Luo | Published |
2016 | (2016). C-FLAT: Control-Flow Attestation for Embedded Systems Software. ACM Conference on Computer and Communications Security, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(): 743-754. | C-FLAT: Control-Flow Attestation for Embedded Systems Software | Abera | Published |
2016 | (2016). We know where you are!. International Conference on Cyber Conflict, 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016, 2016-August(2016-August):277-293. | We know where you are! | Rao | Published |
2016 | (2016). Online/offline public-index predicate encryption for fine-grained mobile access control. European Symposium on Research in Computer Security, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings, 9879 LNCS(9879 LNCS):588-605. | Online/offline public-index predicate encryption for fine-grained mobile access control | Liu | Published |
2016 | (2016). SELint: an SEAndroid policy analysis tool. | SELint: an SEAndroid policy analysis tool | Reshetova | Published |
2016 | (2016). "Make sure DSA signing exponentiations really are constant-time". ACM Conference on Computer and Communications Security, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 24-28-October-2016(24-28-October-2016):1639-1650. | "Make sure DSA signing exponentiations really are constant-time" | García | Published |
2016 | (2016). Theft-Resilient Mobile Payments: Transparently Authenticating NFC Users with Tapping Gesture Biometrics. Annual Computer Security Applications Conference, Proceedings of the 32nd Annual Conference on Computer Security Applications():265-276. | Theft-Resilient Mobile Payments: Transparently Authenticating NFC Users with Tapping Gesture Biometrics | Shrestha | Published |
2016 | (2016). The Black Mark Beside My Name Server. International Conference on Future Internet of Things and Cloud Workshops, 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW)():264-269. | The Black Mark Beside My Name Server | Ruohonen | Published |
2016 | (2016). TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition. | TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition | Juuti | Published |
2016 | (2016). Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. Network and Distributed System Security Symposium, Network and Distributed System Security Symposium 2016 p. 1-14. | Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks | Huhta | Published |
2016 | (2016). Protecting Password Databases Using Trusted Hardware. Workshop on System Software for Trusted Execution, Proceedings of the 1st Workshop on System Software for Trusted Execution(). | Protecting Password Databases Using Trusted Hardware | Krawiecka | Published |
2016 | (2016). Exploring the Use of Intel SGX for Secure Many-Party Applications. Workshop on System Software for Trusted Execution, Proceedings of the 1st Workshop on System Software for Trusted Execution():1-6. | Exploring the Use of Intel SGX for Secure Many-Party Applications | Küçük | Published |
2016 | (2016). Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs. European Conference on Software Architecture Workshops, Proceedings of the 10th European Conference on Software Architecture Workshops | Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs | Ruohonen | Published |
2016 | (2016). Efficient Learning of Communication Profiles from IP Flow Records. Annual IEEE Conference on Local Computer Networks, 2016 IEEE 41st Conference on Local Computer Networks (LCN)():559-562. | Efficient Learning of Communication Profiles from IP Flow Records | Hammerschmidt | Published |
2017 | (2017). Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis. IACR Transactions on Symmetric Cryptology, 2016(2016):162-191. | Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis | Blondeau | Published |
2016 | (2016). Tactical CAC Profile for NATO OLP?. IEEE Military Communications Conference, MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE():533-538. | Tactical CAC Profile for NATO OLP? | Kiviharju | Published |
2017 | (2017). Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation. IEEE International Conference on Advanced and Trusted Computing, Proceedings - 13th IEEE International Conference on Ubiquitous Intelligence and Computing, 13th IEEE International Conference on Advanced and Trusted Computing, 16th IEEE International Conference on Scalable Computing and Communications, IEEE International Conference on Cloud and Big Data Computing, IEEE International Conference on Internet of People and IEEE Smart World Congress and Workshops, UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld 2016():414-422. | Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation | Ankele | Published |
2017 | (2017). Behavioral clustering of non-stationary IP flow record data. International Conference on Network and Service Management, 2016 12th International Conference on Network and Service Management (CNSM)():297-301. | Behavioral clustering of non-stationary IP flow record data | Hammerschmidt | Published |
2017 | (2017). Security in automotive networks. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 22:1-27. | Security in automotive networks | Mundhenk | Published |
2017 | (2017). Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE Transactions on Computers, 66(66):773-785. | Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things | Liu | Published |
2017 | (2017). A framework for application partitioning using trusted execution environments. CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE p. 1-23. | A framework for application partitioning using trusted execution environments | Atamli-Reineh | Published |
2017 | (2017). A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet. European Intelligence and Security Informatics Conference, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016():144-147. | A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet | Ruohonen | Published |
2017 | (2017). LO-FAT. Annual Design Automation Conference, Proceedings of the 54th Annual Design Automation Conference 2017, DAC 2017, Part 128280(Part 128280). | LO-FAT | Dessouky | Published |
2017 | (2017). The circle game. ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security():31-44. | The circle game | Tamrakar | Published |
2017 | (2017). STASH: Securing transparent authentication schemes using prover-side proximity verification. IEEE International Conference on Sensing, Communication and Networking, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA p. 1-9. | STASH: Securing transparent authentication schemes using prover-side proximity verification | Juuti | Published |
2017 | (2017). Implementing prover-side proximity verification for strengthening transparent authentication. IEEE International Conference on Sensing, Communication and Networking, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA p. 1-2. | Implementing prover-side proximity verification for strengthening transparent authentication | Juuti | Published |
2017 | (2017). Differential Attacks: Using Alternative Operations. International Workshop on Coding and Cryptography | Differential Attacks: Using Alternative Operations | Wieringa | Published |
2017 | (2017). IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. International Conference on Distributed Computing Systems, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)():2511-2514. | IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT | Miettinen | Published |
2017 | (2017). IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. International Conference on Distributed Computing Systems, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)():2177-2184. | IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT | Miettinen | Published |
2017 | (2017). Profiling Users by Modeling Web Transactions. International Conference on Distributed Computing Systems, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)():2399-2404. | Profiling Users by Modeling Web Transactions | Tomsu | Published |
2017 | (2017). Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application. IEEE Transactions on Computers, 66(66):1717-1733. | Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application | Marchal | Published |
2017 | (2017). Formal analysis of V2X revocation protocols. International Workshop on Security and Trust Management, Security and Trust Management - 13th International Workshop, STM 2017, Proceedings():147-163. | Formal analysis of V2X revocation protocols | Whitefield | Published |
2017 | (2017). CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers. International Symposium on Research in Attacks, Intrusions, and Defenses, Research in Attacks, Intrusions, and Defenses():259-284. | CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers | Nyman | Published |
2017 | (2017). Private Set Intersection for Unequal Set Sizes with Mobile Applications. Privacy Enhancing Technologies Symposium, Proceedings on Privacy Enhancing Technologies p. 177–197. | Private Set Intersection for Unequal Set Sizes with Mobile Applications | Kiss | Published |
2018 | (2018). Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving Trajectories. IEEE European Symposium on Security and Privacy, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018():199-213. | Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving Trajectories | Vaas | Published |
2017 | (2017). Security and privacy in vehicular communications. Vehicular Communications, 10:13-28. | Security and privacy in vehicular communications | Bernardini | Published |
2017 | (2017). Oblivious Neural Network Predictions via MiniONN Transformations. ACM Conference on Computer and Communications Security, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security p. 619-631. | Oblivious Neural Network Predictions via MiniONN Transformations | Liu | Published |
2017 | (2017). SynAPTIC. IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017():262-267. | SynAPTIC | Ranjbar | Published |
2018 | (2018). Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and Mitigation. International Conference on Extreme Learning Machines, Proceedings of ELM-2016():129-143. | Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and Mitigation | Kalliola | Published |
2017 | (2017). A Large-Scale Analysis of Download Portals and Freeware Installers. Nordic Conference on Secure IT Systems, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings():209-225. | A Large-Scale Analysis of Download Portals and Freeware Installers | Geniola | Published |
2017 | (2017). GPASS: A Password Manager with Group-Based Access Control. Nordic Conference on Secure IT Systems, Secure IT Systems():229-244. | GPASS: A Password Manager with Group-Based Access Control | Bui | Published |
2017 | (2017). Key Exchange with the Help of a Public Ledger. International Security Protocols Workshop, Security Protocols XXV():123-136. | Key Exchange with the Help of a Public Ledger | Bui | Published |
2016 | (2016). Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. Network and Distributed System Security Symposium | Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems | Asokan | Published |
2017 | (2017). Randomization can’t stop BPF JIT spray. International Conference on Network and System Security, Network and System Security - 11th International Conference, NSS 2017, Proceedings, 10394 LNCS(10394 LNCS):233-247. | Randomization can’t stop BPF JIT spray | Reshetova | Published |
2017 | (2017). Key exchange with the help of a public ledger (Transcript of discussion). International Workshop on Security Protocols, Security Protocols XXV - 25th International Workshop, Revised Selected Papers():137-143. | Key exchange with the help of a public ledger (Transcript of discussion) | Bui | Published |
2017 | (2017). Applications of Trusted Execution Environments (TEEs). | Applications of Trusted Execution Environments (TEEs) | Tamrakar | Published |
2017 | (2017). Advanced interest flooding attacks in named-data networking. International Symposium on Network Computing and Applications, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)(). | Advanced interest flooding attacks in named-data networking | Signorello | Published |
2018 | (2018). Stochastic Discriminant Analysis for Linear Supervised Dimension Reduction. Neurocomputing, 291(291):136-150. | Stochastic Discriminant Analysis for Linear Supervised Dimension Reduction | Juuti | Published |
2018 | (2018). OmniShare: Encrypted Cloud Storage for the Multi-Device Era. IEEE INTERNET COMPUTING, 22:27-36. | OmniShare: Encrypted Cloud Storage for the Multi-Device Era | Paverd | Published |
2018 | (2018). Stay On-Topic. European Symposium on Research in Computer Security, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings():132-151. | Stay On-Topic | Juuti | Published |
2018 | (2018). Toward Fairness of Cryptocurrency Payments. IEEE Security and Privacy, 16(16):81-89. | Toward Fairness of Cryptocurrency Payments | Liu | Published |
2018 | (2018). Migrating SGX Enclaves with Persistent State. Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) p. 195-206. | Migrating SGX Enclaves with Persistent State | Alder | Published |
2018 | (2018). SafeKeeper: Protecting Web Passwords using Trusted Execution Environments. The Web Conference, WWW '18 : Proceedings of the 2018 World Wide Web Conference():349-358. | SafeKeeper: Protecting Web Passwords using Trusted Execution Environments | Krawiecka | Published |
2018 | (2018). Using SafeKeeper to Protect Web Passwords. The Web Conference, Companion Proceedings of the The Web Conference 2018 p. 159-162 . | Using SafeKeeper to Protect Web Passwords | Kurnikov | Published |
2017 | (2017). Auditable De-anonymization in V2X Communication. Journal of ICT Standardization, 5:51-106. | Auditable De-anonymization in V2X Communication | Naderpour | Published |
2019 | (2019). Scalable Byzantine Consensus via Hardware-assisted Secret Sharing. IEEE Transactions on Computers, 68(68):139-151. | Scalable Byzantine Consensus via Hardware-assisted Secret Sharing | Liu | Published |
2018 | (2018). Network Intrusion Detection Using Flow Statistics. IEEE Statistical Signal Processing Workshop, 2018 IEEE Statistical Signal Processing Workshop, SSP 2018():70-74. | Network Intrusion Detection Using Flow Statistics | Atli | Published |
2018 | (2018). Turning Trust Around. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Proceedings -17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018():104-111. | Turning Trust Around | Ahmed | Published |
2018 | (2018). ASSURED. International Conference on Embedded Software, IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 37(37):2290-2300. | ASSURED | Asokan | Published |
2018 | (2018). Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization. Workshop on System Software for Trusted Execution, SysTEX '18():42-47. | Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization | Hosseinzadeh | Published |
2018 | (2018). Security wrapper orchestration in cloud. International Conference on Availability, Reliability and Security, ARES 2018 - 13th International Conference on Availability, Reliability and Security | Security wrapper orchestration in cloud | Kalliola | Published |
2018 | (2018). Toward Linux kernel memory safety. Software: Practice and Experience, 48:2237-2256. | Toward Linux kernel memory safety | Reshetova | Published |
2018 | (2018). On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World. USENIX Workshop on Cyber Security Experimentation and Test, 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)(). | On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World | Marchal | Published |
2018 | (2018). Automated analysis of freeware installers promoted by download portals. Computers and Security, 77(77):209-225. | Automated analysis of freeware installers promoted by download portals | Geniola | Published |
2019 | (2019). PrivICN. Computer Networks, 149(149):13-28. | PrivICN | Bernardini | Published |
2018 | (2018). Revisiting context-based authentication in IoT. Annual Design Automation Conference, Proceedings of the 55th Annual Design Automation Conference, DAC 2018, Part F137710. | Revisiting context-based authentication in IoT | Miettinen | Published |
2018 | (2018). Privacy-Preserving Cloud-Assisted Services. | Privacy-Preserving Cloud-Assisted Services | Liu | Published |
2018 | (2018). Mobile and Embedded Platform Security. | Mobile and Embedded Platform Security | Reshetova | Published |
2018 | (2018). Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer. USENIX Security Symposium, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA():1511-1525. | Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer | Bui | Published |
2018 | (2018). Application of Public Ledgers to Revocation in Distributed Access Control. International Conference on Information, Communications and Signal Processing , Information and Communications Security():781-792. | Application of Public Ledgers to Revocation in Distributed Access Control | Bui | Published |
2017 | (2017). Malware distributions and graph structure of the Web. arXiv.org, abs/1707.06071. | Malware distributions and graph structure of the Web | Scepanovic | Published |
2016 | (2016). Privacy in LTE networks. EAI International Conference on Mobile Multimedia Communications, MobiMedia '16 Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications():176-183. | Privacy in LTE networks | Rao | Published |
2018 | (2018). Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. International Conference on Availability, Reliability and Security, Proceedings of the 13th International Conference on Availability, Reliability and Security p. 40:1-40:10. | Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials | Kurnikov | Published |
2018 | (2018). Anomaly Detection in Satellite Communications Systems using LSTM Networks. Military Communications and Information Systems Conference, 2018 Military Communications and Information Systems Conference, MilCIS 2018 - Proceedings(). | Anomaly Detection in Satellite Communications Systems using LSTM Networks | Arbon | Published |
2018 | (2018). Ad-hoc key agreement. Computer Communications, 131(131):32-34. | Ad-hoc key agreement | Miettinen | Published |
2018 | (2018). All You Need Is "Love": Evading Hate Speech Detection. ACM Workshop on Artificial Intelligence and Security, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security():2-12. | All You Need Is "Love": Evading Hate Speech Detection | Gröndahl | Published |
2018 | (2018). An intelligent defense and filtration platform for network traffic. International Conference on Wired/Wireless Internet Communications, Wired/Wireless Internet Communications - 16th IFIP WG 6.2 International Conference, WWIC 2018, Proceedings():107-118. | An intelligent defense and filtration platform for network traffic | Monshizadeh | Published |
2018 | (2018). Secure deduplication of encrypted data. International Conference on Cryptographers Track, Topics in Cryptology – CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, Proceedings():374-393. | Secure deduplication of encrypted data | Liu | Published |
2019 | (2019). PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. USENIX Security Symposium, Proceedings of the 28th USENIX Security Symposium p. 177-194. [USENIX Security '19 presentation video and slides] | PAC it up: Towards Pointer Integrity using ARM Pointer Authentication | Liljestrand | Published |
2019 | (2019). HardScope: Hardening Embedded Systems Against Data-Oriented Attacks. Design Automation Conference, Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019(). [Extended version of the work.] | HardScope: Hardening Embedded Systems Against Data-Oriented Attacks | Nyman | Published |
2019 | (2019). AuDI: Towards autonomous IoT device-type identification using periodic communications. IEEE Journal on Selected Areas in Communications, 37(37):1402-1412. | AuDI: Towards autonomous IoT device-type identification using periodic communications | Marchal | Published |
2019 | (2019). Circumventing Cryptographic Deniability with Remote Attestation. Privacy Enhancing Technologies Symposium, Proceedings on Privacy Enhancing Technologies p. 350–369. | Circumventing Cryptographic Deniability with Remote Attestation | Gunn | Published |
2019 | (2019). Pitfalls of open architecture. European Workshop on Systems Security, Proceedings of the 12th European Workshop on Systems Security, EuroSec 2019 p. 6. | Pitfalls of open architecture | Bui | Published |
2019 | (2019). Performance Evaluation of a Combined Anomaly Detection Platform. IEEE Access, 7(7):100964-100978. | Performance Evaluation of a Combined Anomaly Detection Platform | Monshizadeh | Published |
2019 | (2019). Access Control and Machine Learning: Evasion and Defenses. | Access Control and Machine Learning: Evasion and Defenses | Juuti | Published |
2019 | (2019). Text analysis in adversarial settings. ACM COMPUTING SURVEYS, 52:1-36. | Text analysis in adversarial settings | Gröndahl | Published |
2019 | (2019). Misbinding attacks on secure device pairing and bootstrapping. ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security():453-464. | Misbinding attacks on secure device pairing and bootstrapping | Sethi | Published |
2019 | (2019). PRADA: Protecting Against DNN Model Stealing Attacks. IEEE European Symposium on Security and Privacy, IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019():512-527. | PRADA: Protecting Against DNN Model Stealing Attacks | Juuti | Published |
2019 | (2019). Detecting organized eCommerce fraud using scalable categorical clustering. Annual Computer Security Applications Conference, 2019 Annual Computer Security Applications Conference (ACSAC ’19), December 9–13, 2019, San Juan, PR, USA():215–228. | Detecting organized eCommerce fraud using scalable categorical clustering | Marchal | Published |
2019 | (2019). Late breaking results: Authenticated call stack. Annual Design Automation Conference, Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019(). | Late breaking results: Authenticated call stack | Liljestrand | Published |
2019 | (2019). Web-based framework for accessing native opportunistic networking applications. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 20th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2019 | Web-based framework for accessing native opportunistic networking applications | Nagy | Published |
2019 | (2019). Linear measurements from nonlinear sensors: identifying distortion with incidental noise. IEEE INSTRUMENTATION AND MEASUREMENT MAGAZINE, 23(23):50-55. | Linear measurements from nonlinear sensors: identifying distortion with incidental noise | Gunn | Published |
2019 | (2019). Game theoretical modelling of network/cyber security. IEEE Access, 7(7):154167-154179. | Game theoretical modelling of network/cyber security | Iqbal | Published |
2019 | (2019). Protecting the stack with PACed canaries. Workshop on System Software for Trusted Execution, SysTEX ’19, October 27, 2019, Huntsville, ON, Canada [Link to proceedings] | Protecting the stack with PACed canaries | Liljestrand | Published |
2019 | (2019). Exploitation Techniques and Defenses for Data-Oriented Attacks. IEEE Secure Development Conference, Proceedings - 2019 IEEE Secure Development, SecDev 2019():114-128. | Exploitation Techniques and Defenses for Data-Oriented Attacks | Cheng | Published |
2019 | (2019). DoubleEcho. IEEE International Conference on Pervasive Computing and Communications, 2019 IEEE International Conference on Pervasive Computing and Communications, PerCom 2019 | DoubleEcho | Thu Truong | Published |
2019 | (2019). Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Transactions on Mobile Computing, 18(18):444-457. | Sensor-Based Proximity Detection in the Face of Active Adversaries | Shrestha | Published |
2019 | (2019). Sustainable security & safety. International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, CERTS 2019 | Sustainable security & safety | Paverd | Published |
2017 | (2017). SELint. International Conference on Information Systems Security and Privacy, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy():47-58. | SELint | Reshetova | Published |
2019 | (2019). Watch Your Step! Detecting Stepping Stones in Programmable Networks. IEEE International Conference on Communications, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings(). | Watch Your Step! Detecting Stepping Stones in Programmable Networks | Bhattacherjee | Published |
2019 | (2019). A Scalable Software Update Service for IoT Devices in Urban Scenarios. International Conference on the Internet of Things, Proceedings of the 9th International Conference on the Internet of Things(). | A Scalable Software Update Service for IoT Devices in Urban Scenarios | Toro Betancur | Published |
2019 | (2019). Detection of threats to IoT devices using scalable VPN-forwarded honeypots. ACM Conference on Data and Application Security and Privacy, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy():85-96. | Detection of threats to IoT devices using scalable VPN-forwarded honeypots | Tambe | Published |
2019 | (2019). chowniot. International IFIP Summer School on Privacy and Identity Management, Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Revised Selected Papers():205-221. | chowniot | Khan | Published |
2019 | (2019). Analysis of topology poisoning attacks in software-defined networking. Nordic Conference on Secure IT Systems, Secure IT Systems - 24th Nordic Conference, NordSec 2019, Proceedings():87-102. | Analysis of topology poisoning attacks in software-defined networking | Bui | Published |
2019 | (2019). Client-Side Vulnerabilities in Commercial VPNs. Nordic Conference on Secure IT Systems, Secure IT Systems():103-119. | Client-Side Vulnerabilities in Commercial VPNs | Rao | Published |
2019 | (2019). Making Speculative BFT Resilient with Trusted Monotonic Counters. International Symposium on Reliable Distributed Systems, IEEE 38th International Symposium on Reliable Distributed Systems : SRDS 2019, Lyon, France 1-4 October 2019 p. 133-142. | Making Speculative BFT Resilient with Trusted Monotonic Counters | Gunn | Published |
2019 | (2019). Making targeted black-box evasion attacks effective and efficient. ACM Workshop on Artificial Intelligence and Security, AISec'19: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security(): 83–94. | Making targeted black-box evasion attacks effective and efficient | Juuti | Published |
2019 | (2019). DÏoT: A Federated Self-learning Anomaly Detection System for IoT. International Conference on Distributed Computing Systems, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)():756-767. | DÏoT: A Federated Self-learning Anomaly Detection System for IoT | Nguyen | Published |
2019 | (2019). Sok: modular and efficient private decision tree evaluation. Proceedings of Privacy Enhancing Technologies, 2019(2019):187-208. | Sok: modular and efficient private decision tree evaluation | Kiss | Published |
2019 | (2019). Extraction of Complex DNN Models: Real Threat or Boogeyman?. The AAAI-20 Workshop on Engineering Dependable and Secure Machine Learning Systems, Engineering Dependable and Secure Machine Learning Systems():42-57. | Extraction of Complex DNN Models: Real Threat or Boogeyman? | Atli | Published |
2020 | (2020). Hardware-assisted memory safety. | Hardware-assisted memory safety | Liljestrand | Published |
2019 | (2019). Hardware-assisted Trusted Execution Environments Look Back, Look Ahead. ACM Conference on Computer and Communications Security():1687-1687. | Hardware-assisted Trusted Execution Environments Look Back, Look Ahead | Asokan | Published |
2018 | (2018). Performance Characterization of Deep Learning Models for Breathing-Based Authentication on Resource-Constrained Devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2. | Performance Characterization of Deep Learning Models for Breathing-Based Authentication on Resource-Constrained Devices | Chauhan | Published |
2020 | (2020). Access Control for Implantable Medical Devices. IEEE Transactions on Emerging Topics in Computing, 9(9):1126-1138. | Access Control for Implantable Medical Devices | Camara | Published |
2020 | (2020). IoT-KEEPER. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 17(17):45-59. | IoT-KEEPER | Hafeez | Published |
2020 | (2020). Formal verification of misbinding attacks on secure device pairing and bootstrapping. Journal of Information Security and Applications, 51(51). | Formal verification of misbinding attacks on secure device pairing and bootstrapping | Peltonen | Published |
2020 | (2020). Evaluation of Out-of-Band Channels for IoT Security. SN Computer Science, 1. | Evaluation of Out-of-Band Channels for IoT Security | Latvala | Published |
2019 | (2019). S-FaaS. ACM Cloud Computing Security Workshop, CCSW 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop():185-199. | S-FaaS | Alder | Published |
2020 | (2020). Transparency of SIM profiles for the consumer remote SIM provisioning protocol. Annales des Telecommunications/Annals of Telecommunications(). | Transparency of SIM profiles for the consumer remote SIM provisioning protocol | Ahmed | Published |
2020 | (2020). XSS Vulnerabilities in cloud-application add-ons. ACM Asia Conference on Computer and Communications Security, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security():610-621. | XSS Vulnerabilities in cloud-application add-ons | Bui | Published |
2020 | (2020). PACStack: an Authenticated Call Stack. USENIX Security Symposium, Proceedings of the 30th USENIX Security Symposium(). | PACStack: an Authenticated Call Stack | Liljestrand | Published |
2020 | (2020). Toward Hardware-assisted Run-time Protection. | Toward Hardware-assisted Run-time Protection | Nyman | Published |
2020 | (2020). Enterprise security for the internet of things (IOT). Sensors (Switzerland), 20(20):1-23. | Enterprise security for the internet of things (IOT) | Peltonen | Published |
2020 | (2020). Camouflage. Annual Design Automation Conference, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020 | Camouflage | Denis-Courmont | Published |
2020 | (2020). Effective writing style transfer via combinatorial paraphrasing. Privacy Enhancing Technologies Symposium, Proceedings on Privacy Enhancing Technologies():175-195. | Effective writing style transfer via combinatorial paraphrasing | Gröndahl | Published |
2020 | (2020). A little goes a long way: Improving toxic language classification despite data scarcity. Conference on Empirical Methods in Natural Language Processing, Findings of the Association for Computational Linguistics: EMNLP 2020():2991-3009. | A little goes a long way: Improving toxic language classification despite data scarcity | Juuti | Published |
2021 | (2021). A Comprehensive Formal Analysis of 5G Handover. ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks():1-12. | A Comprehensive Formal Analysis of 5G Handover | Peltonen | Published |
2021 | (2021). Security Failures in Modern Software. | Security Failures in Modern Software | Bui | Published |
2021 | (2021). Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices. International Conference on Internet-of-Things Design and Implementation, IoTDI 2021 - Proceedings of the 2021 International Conference on Internet-of-Things Design and Implementation():15-27. | Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices | Blue | Published |
2021 | (2021). Natural Language Processing in Adversarial Settings and Beyond: Benefits and Risks of Text Classification, Transformation, and Representation. | Natural Language Processing in Adversarial Settings and Beyond: Benefits and Risks of Text Classification, Transformation, and Representation | Gröndahl | Published |
2019 | (2019). Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing. IEEE International Conference on Pervasive Computing and Communications Workshops, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019():196-201. | Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing | Hafeez | Published |
2021 | (2021). SAFELearn: Secure Aggregation for private FEderated Learning. IEEE Symposium on Security and Privacy, Proceedings - 2021 IEEE Symposium on Security and Privacy Workshops, SPW 2021():56-62. | SAFELearn: Secure Aggregation for private FEderated Learning | Fereidooni | Published |
2021 | (2021). Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Transactions on Privacy and Security, 24(24). | Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches | Cheng | Published |
2021 | (2021). Credential Provisioning and Device Configuration with EAP. ACM International Symposium on Mobility Management and Wireless Access, MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access():87–96. | Credential Provisioning and Device Configuration with EAP | Boire | Published |
2021 | (2021). Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols. IEEE Communications Standards Magazine, 5(5):34-39. | Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols | Sethi | Published |
2021 | (2021). Nimble Out-of-Band Authentication for EAP (EAP-NOOB). | Nimble Out-of-Band Authentication for EAP (EAP-NOOB) | Aura | Published |
2021 | (2021). DAWN. ACM International Conference on Multimedia, Proceedings of the 29th ACM International Conference on Multimedia, MM 2021():4417-4425. | DAWN | Szyller | Published |
2021 | (2021). WAFFLE: Watermarking in Federated Learning. International Symposium on Reliable Distributed Systems, Proceedings of 40th International Symposium on Reliable Distributed Systems, SRDS 2021():310-320. | WAFFLE: Watermarking in Federated Learning | Tekgul | Published |
2022 | (2022). Securing Machine Learning: Streamlining Attacks and Defenses Under Realistic Adversary Models. | Securing Machine Learning: Streamlining Attacks and Defenses Under Realistic Adversary Models | Atli Tekgül | Published |
2022 | (2022). Exploring How Students Solve Open-ended Assignments. Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE 2022 - Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education():75-81. | Exploring How Students Solve Open-ended Assignments | Koutcheme | Published |
2022 | (2022). Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses. European Symposium on Research in Computer Security, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings, 13556(13556):384-404. | Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses | Atli Tekgul | Published |
2022 | (2022). FLAME: Taming Backdoors in Federated Learning. USENIX Security Symposium, Proceedings of the 31st USENIX Security Symposium, Security 2022():1415-1432. | FLAME: Taming Backdoors in Federated Learning | Nguyen | Published |
2022 | (2022). On the Effectiveness of Dataset Watermarking. ACM International Workshop on Security and Privacy Analytics, IWSPA 2022 - Proceedings of the 2022 ACM International Workshop on Security and Privacy Analytics():93-99. | On the Effectiveness of Dataset Watermarking | Atli Tekgul | Published |
2022 | (2022). Threat modeling framework for mobile communication systems. Computers and Security, 125(125):1-23. | Threat modeling framework for mobile communication systems | Rao | Published |
2023 | (2023). Formal Verification and Standardization of Security Protocols. | Formal Verification and Standardization of Security Protocols | Peltonen | Published |
2023 | (2023). Ownership and Confidentiality in Machine Learning. | Ownership and Confidentiality in Machine Learning | Szyller | Published |