Computer Science - Security and Privacy (securityprivacy) - Research area

  • Postal addressShow on map

    Konemiehentie 2, Computer Science building

    Finland

Filter
Conference article in proceedings

Search results

  • 2025

    Misbinding Raw Public Keys to Identities in TLS

    Moustafa, M., Sethi, M. & Aura, T., 28 Jan 2025, Secure IT Systems - 29th Nordic Conference, NordSec 2024, Proceedings. Horn Iwaya, L., Kamm, L., Martucci, L. & Pulls, T. (eds.). Springer, p. 62-79 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15396 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • 2024

    Data-Oblivious ML Accelerators Using Hardware Security Extensions

    Elatali, H., Jekel, J. Z., Gunn, L. J. & Asokan, N., 2024, Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024. IEEE, p. 373-377 5 p. (Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    6 Downloads (Pure)
  • 2023

    Analyzing Microservice Connectivity with Kubesonde

    Bufalino, J., Di Francesco, M. & Aura, T., 30 Nov 2023, ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Chandra, S., Blincoe, K. & Tonella, P. (eds.). New York: ACM, p. 2038–2043 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    80 Downloads (Pure)
  • 2022

    Towards cryptographically-authenticated in-memory data structures

    Ghorshi, S., Gunn, L. J., Liljestrand, H. & Asokan, N., 2022, Proceedings - 2022 IEEE Secure Development Conference, SecDev 2022. IEEE, p. 30-44 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • 2021

    Credential Provisioning and Device Configuration with EAP

    Boire, S., Akgün, T., Ginzboorg, P., Laitinen, P., Tamrakar, S. & Aura, T., 22 Nov 2021, MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access. New York, NY, USA: ACM, p. 87–96 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    141 Downloads (Pure)
  • GrandDetAuto: Detecting malicious nodes in large-scale autonomous networks

    Abera, T., Brasser, F., Gunn, L., Jauernig, P., Koisser, D. & Sadeghi, A. R., 7 Oct 2021, Proceedings of 24th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2021. ACM, p. 220-234 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices

    Blue, L., Marchal, S., Traynor, P. & Asokan, N., 18 May 2021, IoTDI 2021 - Proceedings of the 2021 International Conference on Internet-of-Things Design and Implementation. ACM, p. 15-27 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    File
    1 Citation (Scopus)
    43 Downloads (Pure)
  • 2020

    A little goes a long way: Improving toxic language classification despite data scarcity

    Juuti, M., Gröndahl, T., Flanagan, A. & Asokan, N., 20 Nov 2020, Findings of the Association for Computational Linguistics: EMNLP 2020. Association for Computational Linguistics, p. 2991-3009 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    135 Downloads (Pure)
  • Camouflage: Hardware-assisted CFI for the ARM linux kernel

    Denis-Courmont, R., Liljestrand, H., Chinea, C. & Ekberg, J. E., Jul 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. IEEE, 9218535. (Proceedings - Design Automation Conference; vol. 2020-July).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    17 Citations (Scopus)
  • Effective writing style transfer via combinatorial paraphrasing

    Gröndahl, T. & Asokan, N., 17 Aug 2020, Proceedings on Privacy Enhancing Technologies. De Gruyter, p. 175-195 20 p. (Proceedings on Privacy Enhancing Technologies; vol. 2020, no. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    262 Downloads (Pure)
  • Extraction of Complex DNN Models: Real Threat or Boogeyman?

    Atli, B. G., Szyller, S., Juuti, M., Marchal, S. & Asokan, N., 7 Nov 2020, Engineering Dependable and Secure Machine Learning Systems: Third International Workshop, EDSMLS 2020, New York City, NY, USA, February 7, 2020, Revised Selected Papers. Shehory, O., Farchi, E. & Barash, G. (eds.). Springer, p. 42-57 16 p. ( Communications in Computer and Information Science; vol. 1272).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    25 Citations (Scopus)
    1 Downloads (Pure)
  • PACStack: an Authenticated Call Stack

    Liljestrand, H., Nyman, T., Gunn, L. J., Ekberg, J.-E. & Asokan, N., Aug 2020, Proceedings of the 30th USENIX Security Symposium. USENIX -The Advanced Computing Systems Association, 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access