2016Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan (2016). ABAKA. Computer Communications, 85(85):1-13.ABAKADargahiPublished
2016Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan (2016). Characterizing SEAndroid policies in the wild. International Conference on Information Systems Security and Privacy, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy():482-489.Characterizing SEAndroid policies in the wildReshetovaPublished
2016Tigist Abera, N. Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Paverd, Ahmad Reza Sadeghi, Gene Tsudik (2016). Invited - Things, trouble, trust. ACM IEEE Design Automation Conference, Proceedings of the 53rd Annual Design Automation Conference, DAC 2016, 05-09-June-2016(05-09-June-2016).Invited - Things, trouble, trustAberaPublished
2016Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura (2016). An SDN-based approach to enhance the end-to-end security. IEEE/IFIP Network Operations and Management Symposium, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium():281-288.An SDN-based approach to enhance the end-to-end securityRanjbarPublished
2016Samuel Marchal, Kalle Saari, Nidhi Singh, N Asokan (2016). Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets. International Conference on Distributed Computing Systems, IEEE 36th International Conference on Distributed Computing Systems (ICDCS)():323 - 333 .Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their TargetsMarchalPublished
2016Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa (2016). Fourq on FPGA. International Conference on Cryptographic Hardware and Embedded Systems, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings, 9813(9813):517-537.Fourq on FPGAJärvinenPublished
2016Silke Holtmanns, Siddharth Prakash Rao, Ian Oliver (2016). User location tracking attacks for LTE networks using the interworking functionality. IFIP Networking Conference and Workshops, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016():315-322.User location tracking attacks for LTE networks using the interworking functionalityHoltmannsPublished
2016Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu (2016). While mobile encounters with clouds. International Conference on Network and System Security, Network and System Security - 10th International Conference, NSS 2016, Proceedings, 9955 LNCS(9955 LNCS):3-18.While mobile encounters with cloudsAuPublished
2016Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim Kwang Raymond Choo (2016). A new transitive signature scheme. International Conference on Network and System Security, Network and System Security - 10th International Conference, NSS 2016, Proceedings, 9955 LNCS(9955 LNCS):156-167.A new transitive signature schemeLinPublished
2016Narges Yousefnezhad, Marcin Nagy, N. Asokan (2016). On improving tie strength estimates by aggregating multiple communication channels. IFIP Networking Conference and Workshops, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016():530-535.On improving tie strength estimates by aggregating multiple communication channelsYousefnezhadPublished
2016Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan, Ahmad Reza Sadeghi (2016). Poster. ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2016 - Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks():225-226.PosterMiettinenPublished
2016Giovanni Armano, Samuel Marchal, N Asokan (2016). Real-Time Client-Side Phishing Prevention Add-On. International Conference on Distributed Computing Systems, Proceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016, 2016-August(2016-August):777 - 778 .Real-Time Client-Side Phishing Prevention Add-OnArmanoPublished
2017Celine Blondeau, Gregor Leander, Kaisa Nyberg (2017). Differential-Linear Cryptanalysis Revisited. Journal of Cryptology, 30(30):859-888.Differential-Linear Cryptanalysis RevisitedBlondeauPublished
2016Chu Luo, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Goncalves, Kaitai Liang, Tapio Seppänen, Vassilis Kostakos (2016). A data hiding approach for sensitive smartphone data. ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016 - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing():557-568.A data hiding approach for sensitive smartphone dataLuoPublished
2016Tigist Abera, N Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik (2016). C-FLAT: Control-Flow Attestation for Embedded Systems Software. ACM Conference on Computer and Communications Security, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(): 743-754.C-FLAT: Control-Flow Attestation for Embedded Systems SoftwareAberaPublished
2016Siddharth Prakash Rao, Ian Oliver, Silke Holtmanns, Tuomas Aura (2016). We know where you are!. International Conference on Cyber Conflict, 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016, 2016-August(2016-August):277-293.We know where you are!RaoPublished
2016Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang (2016). Online/offline public-index predicate encryption for fine-grained mobile access control. European Symposium on Research in Computer Security, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings, 9879 LNCS(9879 LNCS):588-605.Online/offline public-index predicate encryption for fine-grained mobile access controlLiuPublished
2016Elena Reshetova, Filippo Bonazzi, N Asokan (2016). SELint: an SEAndroid policy analysis tool. SELint: an SEAndroid policy analysis toolReshetovaPublished
2016Cesar Pereida García, Billy Bob Brumley, Yuval Yarom (2016). "Make sure DSA signing exponentiations really are constant-time". ACM Conference on Computer and Communications Security, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 24-28-October-2016(24-28-October-2016):1639-1650."Make sure DSA signing exponentiations really are constant-time"GarcíaPublished
2016Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena (2016). Theft-Resilient Mobile Payments: Transparently Authenticating NFC Users with Tapping Gesture Biometrics. Annual Computer Security Applications Conference, Proceedings of the 32nd Annual Conference on Computer Security Applications():265-276.Theft-Resilient Mobile Payments: Transparently Authenticating NFC Users with Tapping Gesture BiometricsShresthaPublished
2016Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen (2016). The Black Mark Beside My Name Server. International Conference on Future Internet of Things and Cloud Workshops, 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW)():264-269.The Black Mark Beside My Name ServerRuohonenPublished
2016Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, Ivan Martinovic, N Asokan (2016). TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition. TRec: Relay-Resilient Transparent Authentication using Trajectory RecognitionJuutiPublished
2016Otto Huhta, Prakash Shrestha, Swapnil Udar, Mika Juuti, Nitesh Saxena, N Asokan (2016). Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. Network and Distributed System Security Symposium, Network and Distributed System Security Symposium 2016 p. 1-14.Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation AttacksHuhtaPublished
2016Klaudia Krawiecka, Andrew Paverd, N. Asokan (2016). Protecting Password Databases Using Trusted Hardware. Workshop on System Software for Trusted Execution, Proceedings of the 1st Workshop on System Software for Trusted Execution().Protecting Password Databases Using Trusted HardwareKrawieckaPublished
2016Kubilay Ahmet Küçük, Andrew Paverd, Andrew Martin, N. Asokan, Andrew Simpson, Robin Ankele (2016). Exploring the Use of Intel SGX for Secure Many-Party Applications. Workshop on System Software for Trusted Execution, Proceedings of the 1st Workshop on System Software for Trusted Execution():1-6.Exploring the Use of Intel SGX for Secure Many-Party ApplicationsKüçükPublished
2016Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppanen (2016). Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs. European Conference on Software Architecture Workshops, Proceedings of the 10th European Conference on Software Architecture WorkshopsCorrelating File-based Malware Graphs Against the Empirical Ground Truth of DNS GraphsRuohonenPublished
2016Christian Hammerschmidt, Samuel Marchal, Radu State, Gaetano Pellegrino, Sicco Verwer (2016). Efficient Learning of Communication Profiles from IP Flow Records. Annual IEEE Conference on Local Computer Networks, 2016 IEEE 41st Conference on Local Computer Networks (LCN)():559-562.Efficient Learning of Communication Profiles from IP Flow RecordsHammerschmidtPublished
2017Celine Blondeau, Kaisa Nyberg (2017). Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis. IACR Transactions on Symmetric Cryptology, 2016(2016):162-191.Improved Parameter Estimates for Correlation and Capacity Deviates in Linear CryptanalysisBlondeauPublished
2016Mikko Kiviharju, Arseny Kurnikov (2016). Tactical CAC Profile for NATO OLP?. IEEE Military Communications Conference, MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE():533-538.Tactical CAC Profile for NATO OLP?KiviharjuPublished
2017Robin Ankele, Kubilay A. Kucuk, Andrew Martin, Andrew Simpson, Andrew Paverd (2017). Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation. IEEE International Conference on Advanced and Trusted Computing, Proceedings - 13th IEEE International Conference on Ubiquitous Intelligence and Computing, 13th IEEE International Conference on Advanced and Trusted Computing, 16th IEEE International Conference on Scalable Computing and Communications, IEEE International Conference on Cloud and Big Data Computing, IEEE International Conference on Internet of People and IEEE Smart World Congress and Workshops, UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld 2016():414-422.Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty ComputationAnkelePublished
2017Christian Hammerschmidt, Samuel Marchal, Radu State, Sicco Verwer (2017). Behavioral clustering of non-stationary IP flow record data. International Conference on Network and Service Management, 2016 12th International Conference on Network and Service Management (CNSM)():297-301.Behavioral clustering of non-stationary IP flow record dataHammerschmidtPublished
2017Philipp Mundhenk, Andrew Paverd, Artur Mrowca, Sebastian Steinhorst, Martin Lukasiewycz, Suhaib A. Fahmy, Samarjit Chakraborty (2017). Security in automotive networks. ACM Transactions on Design Automation of Electronic Systems, 22:1-27.Security in automotive networksMundhenkPublished
2017Zhe Liu, Johann Großschädl, Zhi Hu, Kimmo Järvinen, Husen Wang, Ingrid Verbauwhede (2017). Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE Transactions on Computers, 66(66):773-785.Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of ThingsLiuPublished
2017Ahmad Atamli-Reineh, Andrew Paverd, Giuseppe Petracca, Andrew Martin (2017). A framework for application partitioning using trusted execution environments. Concurrency and Computation: Practice and Experience p. 1-23.A framework for application partitioning using trusted execution environmentsAtamli-ReinehPublished
2017Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppanen (2017). A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet. European Intelligence and Security Informatics Conference, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016():144-147.A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internetRuohonenPublished
2017Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi (2017). LO-FAT. Annual Design Automation Conference, Proceedings of the 54th Annual Design Automation Conference 2017, DAC 2017, Part 128280(Part 128280).LO-FATDessoukyPublished
2017Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan (2017). The circle game. ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security():31-44.The circle gameTamrakarPublished
2017Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N Asokan, Ivan Martinovic (2017). STASH: Securing transparent authentication schemes using prover-side proximity verification. IEEE International Conference on Sensing, Communication and Networking, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA p. 1-9.STASH: Securing transparent authentication schemes using prover-side proximity verificationJuutiPublished
2017Mika Juuti, Christian Vaas, Hans Liljestrand, Ivo Sluganovic, N Asokan, Ivan Martinovic (2017). Implementing prover-side proximity verification for strengthening transparent authentication. IEEE International Conference on Sensing, Communication and Networking, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA p. 1-2.Implementing prover-side proximity verification for strengthening transparent authenticationJuutiPublished
2017Celine Wieringa, Roberto Civino, Massimiliano Sala (2017). Differential Attacks: Using Alternative Operations. International Workshop on Coding and CryptographyDifferential Attacks: Using Alternative OperationsWieringaPublished
2017M. Miettinen, S. Marchal, I. Hafeez, T. Frassetto, N. Asokan, Ahmad-Reza Sadeghi, S. Tarkoma (2017). IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. International Conference on Distributed Computing Systems, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)():2511-2514.IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoTMiettinenPublished
2017M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, Ahmad-Reza Sadeghi, S. Tarkoma (2017). IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. International Conference on Distributed Computing Systems, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)():2177-2184.IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoTMiettinenPublished
2017Radek Tomsu, S. Marchal, N. Asokan (2017). Profiling Users by Modeling Web Transactions. International Conference on Distributed Computing Systems, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)():2399-2404.Profiling Users by Modeling Web TransactionsTomsuPublished
2017S. Marchal, G. Armano, T. Gröndahl, Kalle Saari, Nidhi Singh, N. Asokan (2017). Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application. IEEE Transactions on Computers, 66(66):1717-1733.Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention ApplicationMarchalPublished
2017Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, Stephan Wesemeyer (2017). Formal analysis of V2X revocation protocols. International Workshop on Security and Trust Management, Security and Trust Management - 13th International Workshop, STM 2017, Proceedings():147-163.Formal analysis of V2X revocation protocolsWhitefieldPublished
2017Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N Asokan (2017). CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers. International Symposium on Research in Attacks, Intrusions, and Defenses, Research in Attacks, Intrusions, and Defenses():259-284.CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial MicrocontrollersNymanPublished
2017Ágnes Kiss, Jian Liu, Thomas Schneider, N Asokan, Benny Pinkas (2017). Private Set Intersection for Unequal Set Sizes with Mobile Applications. Privacy Enhancing Technologies Symposium, Proceedings on Privacy Enhancing Technologies p. 177–197.Private Set Intersection for Unequal Set Sizes with Mobile ApplicationsKissPublished
2018Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic (2018). Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving Trajectories. IEEE European Symposium on Security and Privacy, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018():199-213.Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving TrajectoriesVaasPublished
2017Cesar Bernardini, Muhammad Rizwan Asghar, Bruno Crispo (2017). Security and privacy in vehicular communications. Vehicular Communications, 10:13-28.Security and privacy in vehicular communicationsBernardiniPublished
2017Jian Liu, Mika Juuti, Yao Lu, N. Asokan (2017). Oblivious Neural Network Predictions via MiniONN Transformations. ACM Conference on Computer and Communications Security, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security p. 619-631.Oblivious Neural Network Predictions via MiniONN TransformationsLiuPublished
2017Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura (2017). SynAPTIC. IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017():262-267.SynAPTICRanjbarPublished
2018Aapo Kalliola, Yoan Miche, Ian Oliver, Silke Holtmanns, Buse Atli, Amaury Lendasse, Kaj-Mikael Bjork, Anton Akusok, Tuomas Aura (2018). Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and Mitigation. International Conference on Extreme Learning Machines, Proceedings of ELM-2016():129-143.Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and MitigationKalliolaPublished
2017Alberto Geniola, Markku Antikainen, Tuomas Aura (2017). A Large-Scale Analysis of Download Portals and Freeware Installers. Nordic Conference on Secure IT Systems, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings():209-225.A Large-Scale Analysis of Download Portals and Freeware InstallersGeniolaPublished
2017Thanh Bui, Tuomas Aura (2017). GPASS: A Password Manager with Group-Based Access Control. Nordic Conference on Secure IT Systems, Secure IT Systems():229-244.GPASS: A Password Manager with Group-Based Access ControlBuiPublished
2017Thanh Bui, Tuomas Aura (2017). Key Exchange with the Help of a Public Ledger. International Security Protocols Workshop, Security Protocols XXV():123-136.Key Exchange with the Help of a Public LedgerBuiPublished
2016N. Asokan (2016). Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. Network and Distributed System Security SymposiumPractical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication SystemsAsokanPublished
2017Elena Reshetova, Filippo Bonazzi, N. Asokan (2017). Randomization can’t stop BPF JIT spray. International Conference on Network and System Security, Network and System Security - 11th International Conference, NSS 2017, Proceedings, 10394 LNCS(10394 LNCS):233-247.Randomization can’t stop BPF JIT sprayReshetovaPublished
2017Thanh Bui (2017). Key exchange with the help of a public ledger (Transcript of discussion). International Workshop on Security Protocols, Security Protocols XXV - 25th International Workshop, Revised Selected Papers():137-143.Key exchange with the help of a public ledger (Transcript of discussion)BuiPublished
2017Sandeep Tamrakar (2017). Applications of Trusted Execution Environments (TEEs). Applications of Trusted Execution Environments (TEEs)TamrakarPublished
2017S. Signorello, S. Marchal, J. François, O. Festor, R. State (2017). Advanced interest flooding attacks in named-data networking. International Symposium on Network Computing and Applications, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)().Advanced interest flooding attacks in named-data networkingSignorelloPublished
2018Mika Juuti, Francesco Corona, Juha Karhunen (2018). Stochastic Discriminant Analysis for Linear Supervised Dimension Reduction. Neurocomputing, 291(291):136-150.Stochastic Discriminant Analysis for Linear Supervised Dimension ReductionJuutiPublished
2018Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Gröndahl, N. Asokan, Ahmad-Reza Sadeghi (2018). OmniShare: Encrypted Cloud Storage for the Multi-Device Era. IEEE INTERNET COMPUTING, 22:27-36.OmniShare: Encrypted Cloud Storage for the Multi-Device EraPaverdPublished
2018Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan (2018). Stay On-Topic. European Symposium on Research in Computer Security, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings():132-151.Stay On-TopicJuutiPublished
2018Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan (2018). Toward Fairness of Cryptocurrency Payments. IEEE Security and Privacy, 16(16):81-89.Toward Fairness of Cryptocurrency PaymentsLiuPublished
2018Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan (2018). Migrating SGX Enclaves with Persistent State. Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) p. 195-206.Migrating SGX Enclaves with Persistent StateAlderPublished
2018Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohmmad Mannan, N. Asokan (2018). SafeKeeper: Protecting Web Passwords using Trusted Execution Environments. The Web Conference, WWW '18 : Proceedings of the 2018 World Wide Web Conference():349-358.SafeKeeper: Protecting Web Passwords using Trusted Execution EnvironmentsKrawieckaPublished
2018Arseny Kurnikov, Klaudia Krawiecka, Andrew Paverd, Mohmmad Mannan, N. Asokan (2018). Using SafeKeeper to Protect Web Passwords. The Web Conference, Companion Proceedings of the The Web Conference 2018 p. 159-162 .Using SafeKeeper to Protect Web PasswordsKurnikovPublished
2017Masoud Naderpour, Tommi Meskanen, Andrew Paverd, Valtteri Niemi (2017). Auditable De-anonymization in V2X Communication. Journal of ICT Standardization, 5:51-106.Auditable De-anonymization in V2X CommunicationNaderpourPublished
2019Jian Liu, Wenting Li, G. Karame, N. Asokan (2019). Scalable Byzantine Consensus via Hardware-assisted Secret Sharing. IEEE Transactions on Computers, 68(68):139-151.Scalable Byzantine Consensus via Hardware-assisted Secret SharingLiuPublished
2018Buse Gul Atli, Yoan Miche, Alexander Jung (2018). Network Intrusion Detection Using Flow Statistics. IEEE Statistical Signal Processing Workshop, 2018 IEEE Statistical Signal Processing Workshop, SSP 2018():70-74.Network Intrusion Detection Using Flow StatisticsAtliPublished
2018Abu Shohel Ahmed, Tuomas Aura (2018). Turning Trust Around. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Proceedings -17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018():104-111.Turning Trust AroundAhmedPublished
2018N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik (2018). ASSURED. International Conference on Embedded Software, IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 37(37):2290-2300.ASSUREDAsokanPublished
2018Shohreh Hosseinzadeh, Hans Liljestrand, Ville Leppanen, Andrew Paverd (2018). Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization. Workshop on System Software for Trusted Execution, SysTEX '18():42-47.Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow RandomizationHosseinzadehPublished
2018Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Tuomas Aura (2018). Security wrapper orchestration in cloud. International Conference on Availability, Reliability and Security, ARES 2018 - 13th International Conference on Availability, Reliability and SecuritySecurity wrapper orchestration in cloudKalliolaPublished
2018Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan (2018). Toward Linux kernel memory safety. Software: Practice and Experience, 48:2237-2256.Toward Linux kernel memory safetyReshetovaPublished
2018Samuel Marchal, N. Asokan (2018). On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World. USENIX Workshop on Cyber Security Experimentation and Test, 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)().On Designing and Evaluating Phishing Webpage Detection Techniques for the Real WorldMarchalPublished
2018Alberto Geniola, Markku Antikainen, Tuomas Aura (2018). Automated analysis of freeware installers promoted by download portals. Computers and Security, 77(77):209-225.Automated analysis of freeware installers promoted by download portalsGeniolaPublished
2019Cesar Bernardini, Samuel Marchal, Muhammad Rizwan Asghar, Bruno Crispo (2019). PrivICN. Computer Networks, 149(149):13-28.PrivICNBernardiniPublished
2018Markus Miettinen, Thien Duc Nguyen, Ahmad Reza Sadeghi, N. Asokan (2018). Revisiting context-based authentication in IoT. Annual Design Automation Conference, Proceedings of the 55th Annual Design Automation Conference, DAC 2018, Part F137710.Revisiting context-based authentication in IoTMiettinenPublished
2018Jian Liu (2018). Privacy-Preserving Cloud-Assisted Services. Privacy-Preserving Cloud-Assisted ServicesLiuPublished
2018Elena Reshetova (2018). Mobile and Embedded Platform Security. Mobile and Embedded Platform SecurityReshetovaPublished
2018Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura (2018). Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer. USENIX Security Symposium, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA():1511-1525.Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the ComputerBuiPublished
2018Thanh Bui, Tuomas Aura (2018). Application of Public Ledgers to Revocation in Distributed Access Control. International Conference on Information, Communications and Signal Processing
, Information and Communications Security
():781-792.
Application of Public Ledgers to Revocation in Distributed Access ControlBuiPublished
2017Sanja Scepanovic, Igor Mishkovski, Jukka Ruohonen, Frederick Ayala-Gómez, Tuomas Aura, Sami Hyrynsalmi (2017). Malware distributions and graph structure of the Web. arXiv.org, abs/1707.06071.Malware distributions and graph structure of the WebScepanovicPublished
2016Siddharth Rao, Bhanu Teja Kotte, Silke Holtmanns (2016). Privacy in LTE networks. EAI International Conference on Mobile Multimedia Communications, MobiMedia '16 Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications():176-183.Privacy in LTE networksRaoPublished
2018Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan (2018). Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. International Conference on Availability, Reliability and Security, Proceedings of the 13th International Conference on Availability, Reliability and Security p. 40:1-40:10.Keys in the Clouds: Auditable Multi-device Access to Cryptographic CredentialsKurnikovPublished
2018Edward Arbon, Peter Smet, Lachlan Gunn, Mark McDonnell (2018). Anomaly Detection in Satellite Communications Systems using LSTM Networks. Military Communications and Information Systems Conference, 2018 Military Communications and Information Systems Conference, MilCIS 2018 - Proceedings().Anomaly Detection in Satellite Communications Systems using LSTM NetworksArbonPublished
2018Markus Miettinen, N. Asokan (2018). Ad-hoc key agreement. Computer Communications, 131(131):32-34.Ad-hoc key agreementMiettinenPublished
2018Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan (2018). All You Need Is "Love": Evading Hate Speech Detection. ACM Workshop on Artificial Intelligence and Security, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security():2-12.All You Need Is "Love": Evading Hate Speech DetectionGröndahlPublished
2018Mehrnoosh Monshizadeh, Vikramajeet Khatri, Buse Atli, Raimo Kantola (2018). An intelligent defense and filtration platform for network traffic. International Conference on Wired/Wireless Internet Communications, Wired/Wireless Internet Communications - 16th IFIP WG 6.2 International Conference, WWIC 2018, Proceedings():107-118.An intelligent defense and filtration platform for network trafficMonshizadehPublished
2018Jian Liu, Li Duan, Yong Li, N. Asokan (2018). Secure deduplication of encrypted data. International Conference on Cryptographers Track, Topics in Cryptology – CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, Proceedings():374-393.Secure deduplication of encrypted dataLiuPublished
2019Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan (2019). PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. USENIX Security Symposium, Proceedings of the 28th USENIX Security Symposium p. 177-194. [USENIX Security '19 presentation video and slides]PAC it up: Towards Pointer Integrity using ARM Pointer AuthenticationLiljestrandPublished
2019Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi (2019). HardScope: Hardening Embedded Systems Against Data-Oriented Attacks. Design Automation Conference, Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019(). [Extended version of the work.]HardScope: Hardening Embedded Systems Against Data-Oriented AttacksNymanPublished
2019Samuel Marchal, Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan (2019). AuDI: Towards autonomous IoT device-type identification using periodic communications. IEEE Journal on Selected Areas in Communications, 37(37):1402-1412.AuDI: Towards autonomous IoT device-type identification using periodic communicationsMarchalPublished
2019Lachlan Gunn, Ricardo Vieitez Parra, N. Asokan (2019). Circumventing Cryptographic Deniability with Remote Attestation. Privacy Enhancing Technologies Symposium, Proceedings on Privacy Enhancing Technologies p. 350–369.Circumventing Cryptographic Deniability with Remote AttestationGunnPublished
2019Thanh Bui, Siddharth Rao, Markku Antikainen, Tuomas Aura (2019). Pitfalls of open architecture. European Workshop on Systems Security, Proceedings of the 12th European Workshop on Systems Security, EuroSec 2019 p. 6.Pitfalls of open architectureBuiPublished
2019Mehrnoosh Monshizadeh, Vikramajeet Khatri, Buse Atli, Raimo Kantola, Zheng Yan (2019). Performance Evaluation of a Combined Anomaly Detection Platform. IEEE Access, 7(7):100964-100978.Performance Evaluation of a Combined Anomaly Detection PlatformMonshizadehPublished
2019Mika Juuti (2019). Access Control and Machine Learning: Evasion and Defenses. Access Control and Machine Learning: Evasion and DefensesJuutiPublished
2019Tommi Gröndahl, N. Asokan (2019). Text analysis in adversarial settings. ACM Computing Surveys, 52:1-36.Text analysis in adversarial settingsGröndahlPublished
2019Mohit Sethi, Aleksi Peltonen, Tuomas Aura (2019). Misbinding attacks on secure device pairing and bootstrapping. ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security():453-464.Misbinding attacks on secure device pairing and bootstrappingSethiPublished
2019M. Juuti, S. Szyller, S. Marchal, N. Asokan (2019). PRADA: Protecting Against DNN Model Stealing Attacks. IEEE European Symposium on Security and Privacy, IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019():512-527.PRADA: Protecting Against DNN Model Stealing AttacksJuutiPublished
2019Samuel Marchal, Sebastian Szyller (2019). Detecting organized eCommerce fraud using scalable categorical clustering. Annual Computer Security Applications Conference, 2019 Annual Computer Security Applications Conference (ACSAC ’19), December 9–13, 2019, San Juan, PR, USA():215–228.Detecting organized eCommerce fraud using scalable categorical clusteringMarchalPublished
2019Hans Liljestrand, Thomas Nyman, Jan Erik Ekberg, N. Asokan (2019). Late breaking results: Authenticated call stack. Annual Design Automation Conference, Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019().Late breaking results: Authenticated call stackLiljestrandPublished
2019Marcin Nagy, Teemu Kärkkäinen, Arseny Kurnikov, Jörg Ott (2019). Web-based framework for accessing native opportunistic networking applications. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 20th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2019Web-based framework for accessing native opportunistic networking applicationsNagyPublished
2019Lachlan J Gunn, Andrew Allison, Derek Abbott (2019). Linear measurements from nonlinear sensors: identifying distortion with incidental noise. IEEE INSTRUMENTATION AND MEASUREMENT MAGAZINE, 23(23):50-55.Linear measurements from nonlinear sensors: identifying distortion with incidental noiseGunnPublished
2019Azhar Iqbal, Lachlan J Gunn, Mingyuo Guo, M Ali Babar, Derek Abbott (2019). Game theoretical modelling of network/cyber security. IEEE Access, 7(7):154167-154179.Game theoretical modelling of network/cyber securityIqbalPublished
2019Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan (2019). Protecting the stack with PACed canaries. Workshop on System Software for Trusted Execution, SysTEX ’19, October 27, 2019, Huntsville, ON, Canada [Link to proceedings]Protecting the stack with PACed canariesLiljestrandPublished
2019Long Cheng, Hans Liljestrand, Md Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao (2019). Exploitation Techniques and Defenses for Data-Oriented Attacks. IEEE Secure Development Conference, Proceedings - 2019 IEEE Secure Development, SecDev 2019():114-128.Exploitation Techniques and Defenses for Data-Oriented AttacksChengPublished
2019Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma, N. Asokan (2019). DoubleEcho. IEEE International Conference on Pervasive Computing and Communications, 2019 IEEE International Conference on Pervasive Computing and Communications, PerCom 2019DoubleEchoThu TruongPublished
2019Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan (2019). Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Transactions on Mobile Computing, 18(18):444-457.Sensor-Based Proximity Detection in the Face of Active AdversariesShresthaPublished
2019Andrew Paverd, Marcus Völp, Ferdinand Brasser, Matthias Schunter, N. Asokan, Ahmad Reza Sadeghi, Paulo Esteves-Veríssimo, Andreas Steininger, Thorsten Holz (2019). Sustainable security & safety. International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, CERTS 2019Sustainable security & safetyPaverdPublished
2017Elena Reshetova, Filippo Bonazzi, N. Asokan (2017). SELint. International Conference on Information Systems Security and Privacy, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy():47-58.SELintReshetovaPublished
2019Debopam Bhattacherjee, Andrei Gurtov, Tuomas Aura (2019). Watch Your Step! Detecting Stepping Stones in Programmable Networks. IEEE International Conference on Communications, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings().Watch Your Step! Detecting Stepping Stones in Programmable NetworksBhattacherjeePublished
2019Veronica Toro Betancur, Jose Viquez Zamora, Markku Antikainen, Mario Di Francesco (2019). A Scalable Software Update Service for IoT Devices in Urban Scenarios. International Conference on the Internet of Things, Proceedings of the 9th International Conference on the Internet of Things().A Scalable Software Update Service for IoT Devices in Urban ScenariosToro BetancurPublished
2019Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici (2019). Detection of threats to IoT devices using scalable VPN-forwarded honeypots. ACM Conference on Data and Application Security and Privacy, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy():85-96.Detection of threats to IoT devices using scalable VPN-forwarded honeypotsTambePublished
2019Md Sakib Nizam Khan, Samuel Marchal, Sonja Buchegger, N. Asokan (2019). chowniot. International IFIP Summer School on Privacy and Identity Management, Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Revised Selected Papers():205-221.chowniotKhanPublished
2019Thanh Bui, Markku Antikainen, Tuomas Aura (2019). Analysis of topology poisoning attacks in software-defined networking. Nordic Conference on Secure IT Systems, Secure IT Systems - 24th Nordic Conference, NordSec 2019, Proceedings():87-102.Analysis of topology poisoning attacks in software-defined networkingBuiPublished
2019Siddharth Rao, Tien Bui, Markku Antikainen, Tuomas Aura (2019). Client-Side Vulnerabilities in Commercial VPNs. Nordic Conference on Secure IT Systems, Secure IT Systems():103-119.Client-Side Vulnerabilities in Commercial VPNsRaoPublished
2019Lachlan Gunn, Jian Liu, Bruno Vavala, N. Asokan (2019). Making Speculative BFT Resilient with Trusted Monotonic Counters. International Symposium on Reliable Distributed Systems, IEEE 38th International Symposium on Reliable Distributed Systems : SRDS 2019, Lyon, France 1-4 October 2019 p. 133-142.Making Speculative BFT Resilient with Trusted Monotonic CountersGunnPublished
2019Mika Juuti, Buse Atli, N. Asokan (2019). Making targeted black-box evasion attacks effective and efficient. ACM Workshop on Artificial Intelligence and Security, AISec'19: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security(): 83–94.Making targeted black-box evasion attacks effective and efficientJuutiPublished
2019T. D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, A. Sadeghi (2019). DÏoT: A Federated Self-learning Anomaly Detection System for IoT. International Conference on Distributed Computing Systems, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)():756-767.DÏoT: A Federated Self-learning Anomaly Detection System for IoTNguyenPublished
2019Ágnes Kiss, Masoud Naderpour, Jian Liu, N Asokan, Thomas Schneider (2019). Sok: modular and efficient private decision tree evaluation. Proceedings of Privacy Enhancing Technologies, 2019(2019):187-208.Sok: modular and efficient private decision tree evaluationKissPublished
2019Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan (2019). Extraction of Complex DNN Models: Real Threat or Boogeyman?. The AAAI-20 Workshop on Engineering Dependable and Secure Machine Learning Systems, Engineering Dependable and Secure Machine Learning Systems():42-57.Extraction of Complex DNN Models: Real Threat or Boogeyman?AtliPublished
2020Hans Liljestrand (2020). Hardware-assisted memory safety. Hardware-assisted memory safetyLiljestrandPublished
2019N. Asokan (2019). Hardware-assisted Trusted Execution Environments Look Back, Look Ahead. ACM Conference on Computer and Communications Security():1687-1687.Hardware-assisted Trusted Execution Environments Look Back, Look AheadAsokanPublished
2018Jagmohan Chauhan, Jathushan Rajasegaran, Suranga Seneviratne, Archan Misra, Aruna Seneviratne, Youngki Lee (2018). Performance Characterization of Deep Learning Models for Breathing-Based Authentication on Resource-Constrained Devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2.Performance Characterization of Deep Learning Models for Breathing-Based Authentication on Resource-Constrained DevicesChauhanPublished
2020Carmen Camara, Pedro Peris-Lopez, Jose Maria De Fuentes, Samuel Marchal (2020). Access Control for Implantable Medical Devices. IEEE Transactions on Emerging Topics in Computing, 9(9):1126-1138.Access Control for Implantable Medical DevicesCamaraPublished
2020Ibbad Hafeez, Markku Antikainen, Aaron Yi Ding, Sasu Tarkoma (2020). IoT-KEEPER. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 17(17):45-59.IoT-KEEPERHafeezPublished
2020Aleksi Peltonen, Mohit Sethi, Tuomas Aura (2020). Formal verification of misbinding attacks on secure device pairing and bootstrapping. Journal of Information Security and Applications, 51(51).Formal verification of misbinding attacks on secure device pairing and bootstrappingPeltonenPublished
2020Sampsa Latvala, Mohit Sethi, Tuomas Aura (2020). Evaluation of Out-of-Band Channels for IoT Security. SN Computer Science, 1.Evaluation of Out-of-Band Channels for IoT SecurityLatvalaPublished
2019Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner (2019). S-FaaS. ACM Cloud Computing Security Workshop, CCSW 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop():185-199.S-FaaSAlderPublished
2020Abu Shohel Ahmed, Mukesh Thakur, Santeri Paavolainen, Tuomas Aura (2020). Transparency of SIM profiles for the consumer remote SIM provisioning protocol. Annales des Telecommunications/Annals of Telecommunications().Transparency of SIM profiles for the consumer remote SIM provisioning protocolAhmedPublished
2020Thanh Bui, Siddharth Rao, Markku Antikainen, Tuomas Aura (2020). XSS Vulnerabilities in cloud-application add-ons. ACM Asia Conference on Computer and Communications Security, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security():610-621.XSS Vulnerabilities in cloud-application add-onsBuiPublished
2020Hans Liljestrand, Thomas Nyman, Lachlan J Gunn, Jan-Erik Ekberg, N. Asokan (2020). PACStack: an Authenticated Call Stack. USENIX Security Symposium, Proceedings of the 30th USENIX Security Symposium().PACStack: an Authenticated Call StackLiljestrandPublished
2020Thomas Nyman (2020). Toward Hardware-assisted Run-time Protection. Toward Hardware-assisted Run-time ProtectionNymanPublished
2020Aleksi Peltonen, Eduardo Inglés, Sampsa Latvala, Dan Garcia-Carrillo, Mohit Sethi, Tuomas Aura (2020). Enterprise security for the internet of things (IOT). Sensors (Switzerland), 20(20):1-23.Enterprise security for the internet of things (IOT)PeltonenPublished
2020Remi Denis-Courmont, Hans Liljestrand, Carlos Chinea, Jan Erik Ekberg (2020). Camouflage. Annual Design Automation Conference, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020CamouflageDenis-CourmontPublished
2020Tommi Gröndahl, N. Asokan (2020). Effective writing style transfer via combinatorial paraphrasing. Privacy Enhancing Technologies Symposium, Proceedings on Privacy Enhancing Technologies():175-195.Effective writing style transfer via combinatorial paraphrasingGröndahlPublished
2020Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan (2020). A little goes a long way: Improving toxic language classification despite data scarcity. Conference on Empirical Methods in Natural Language Processing, Findings of the Association for Computational Linguistics: EMNLP 2020():2991-3009.A little goes a long way: Improving toxic language classification despite data scarcityJuutiPublished
2021Aleksi Peltonen, Ralf Sasse, David Basin (2021). A Comprehensive Formal Analysis of 5G Handover. ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks():1-12.A Comprehensive Formal Analysis of 5G HandoverPeltonenPublished
2021Thanh Bui (2021). Security Failures in Modern Software. Security Failures in Modern SoftwareBuiPublished
2021Logan Blue, Samuel Marchal, Patrick Traynor, N. Asokan (2021). Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices. International Conference on Internet-of-Things Design and Implementation, IoTDI 2021 - Proceedings of the 2021 International Conference on Internet-of-Things Design and Implementation():15-27.Lux: Enabling Ephemeral Authorization for Display-Limited IoT DevicesBluePublished
2021Tommi Gröndahl (2021). Natural Language Processing in Adversarial Settings and Beyond: Benefits and Risks of Text Classification, Transformation, and Representation. Natural Language Processing in Adversarial Settings and Beyond: Benefits and Risks of Text Classification, Transformation, and RepresentationGröndahlPublished
2019Ibbad Hafeez, Markku Antikainen, Sasu Tarkoma (2019). Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing. IEEE International Conference on Pervasive Computing and Communications Workshops, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019():196-201.Protecting IoT-environments against Traffic Analysis Attacks with Traffic MorphingHafeezPublished
2021Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Mollering, Thien Duc Nguyen, Phillip Rieger, Ahmad Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni (2021). SAFELearn: Secure Aggregation for private FEderated Learning. IEEE Symposium on Security and Privacy, Proceedings - 2021 IEEE Symposium on Security and Privacy Workshops, SPW 2021():56-62.SAFELearn: Secure Aggregation for private FEderated LearningFereidooniPublished
2021Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng Daphne Yao (2021). Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Transactions on Privacy and Security, 24(24).Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense ApproachesChengPublished
2021Sebastien Boire, Tolgahan Akgün, Philip Ginzboorg, Pekka Laitinen, Sandeep Tamrakar, Tuomas Aura (2021). Credential Provisioning and Device Configuration with EAP. ACM International Symposium on Mobility Management and Wireless Access, MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access():87–96.Credential Provisioning and Device Configuration with EAPBoirePublished
2021Mohit Sethi, Tuomas Aura (2021). Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols. IEEE Communications Standards Magazine, 5(5):34-39.Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual ProtocolsSethiPublished
2021Tuomas Aura, Mohit Sethi, Aleksi Peltonen (2021). Nimble Out-of-Band Authentication for EAP (EAP-NOOB). Nimble Out-of-Band Authentication for EAP (EAP-NOOB)AuraPublished
2021Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan (2021). DAWN. ACM International Conference on Multimedia, Proceedings of the 29th ACM International Conference on Multimedia, MM 2021():4417-4425.DAWNSzyllerPublished
2021Buse G. A. Tekgul, Yuxi Xia, Samuel Marchal, N. Asokan (2021). WAFFLE: Watermarking in Federated Learning. International Symposium on Reliable Distributed Systems, Proceedings of 40th International Symposium on Reliable Distributed Systems, SRDS 2021():310-320.WAFFLE: Watermarking in Federated LearningTekgulPublished
2022Buse Gül Atli Tekgül (2022). Securing Machine Learning: Streamlining Attacks and Defenses Under Realistic Adversary Models. Securing Machine Learning: Streamlining Attacks and Defenses Under Realistic Adversary ModelsAtli TekgülPublished
2022Charles Koutcheme, Artturi Tilanterä, Aleksi Peltonen, Arto Hellas, Lassi Haaranen (2022). Exploring How Students Solve Open-ended Assignments. Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE 2022 - Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education():75-81.Exploring How Students Solve Open-ended AssignmentsKoutchemePublished
2022Buse Atli Tekgul, Shelly Wang, Samuel Marchal, N. Asokan (2022). Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses. European Symposium on Research in Computer Security, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings, 13556(13556):384-404.Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and DefensesAtli TekgulPublished
2022Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad Reza Sadeghi, Thomas Schneider (2022). FLAME: Taming Backdoors in Federated Learning. USENIX Security Symposium, Proceedings of the 31st USENIX Security Symposium, Security 2022():1415-1432.FLAME: Taming Backdoors in Federated LearningNguyenPublished
2022Buse Gul Atli Tekgul, N. Asokan (2022). On the Effectiveness of Dataset Watermarking. ACM International Workshop on Security and Privacy Analytics, IWSPA 2022 - Proceedings of the 2022 ACM International Workshop on Security and Privacy Analytics():93-99.On the Effectiveness of Dataset WatermarkingAtli TekgulPublished
2022Siddharth Prakash Rao, Hsin Yi Chen, Tuomas Aura (2022). Threat modeling framework for mobile communication systems. Computers and Security, 125(125):1-23.Threat modeling framework for mobile communication systemsRaoPublished
2023Aleksi Peltonen (2023). Formal Verification and Standardization of Security Protocols. Formal Verification and Standardization of Security ProtocolsPeltonenPublished
2023Sebastian Szyller (2023). Ownership and Confidentiality in Machine Learning. Ownership and Confidentiality in Machine LearningSzyllerPublished
2023Sebastian Szyller, N. Asokan (2023). Conflicting Interactions among Protection Mechanisms for Machine Learning Models. AAAI Conference on Artificial Intelligence, AAAI-23 Special Tracks():15179-15187.Conflicting Interactions among Protection Mechanisms for Machine Learning ModelsSzyllerPublished
2023N Asokan (2023). Model Stealing Attacks and Defenses : Where Are We Now?. ACM Asia Conference on Computer and Communications Security():327-327. [View record in Web of Science]Model Stealing Attacks and Defenses : Where Are We Now?AsokanPublished
2021Hsin Yi Chen, Siddharth Prakash Rao (2021). Adversarial Trends in Mobile Communication Systems. Nordic Conference on Secure IT Systems, Secure IT Systems - 26th Nordic Conference, NordSec 2021, Proceedings():153-171.Adversarial Trends in Mobile Communication SystemsChenPublished
2023Jacopo Bufalino, Mario Di Francesco, Tuomas Aura (2023). Analyzing Microservice Connectivity with Kubesonde. ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering():2038–2043.Analyzing Microservice Connectivity with KubesondeBufalinoPublished
2023Buse G.A. Tekgul, N. Asokan (2023). FLARE. Annual Computer Security Applications Conference, Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023():492-505.FLARETekgulPublished
2024Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Samuel Marchal, Mika Ylianttila (2024). Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications. IEEE Consumer Communications and Networking Conference, 2024 IEEE 21st Consumer Communications and Networking Conference, CCNC 2024():956-962.Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning ApplicationsSiriwardhanaPublished