Computer Science - Security and Privacy (securityprivacy)

  • Postal addressShow on map

    Konemiehentie 2, Computer Science building

    Finland

Search results

  • 2023

    Analyzing Microservice Connectivity with Kubesonde

    Bufalino, J., Di Francesco, M. & Aura, T., 30 Nov 2023, ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Chandra, S., Blincoe, K. & Tonella, P. (eds.). New York: ACM, p. 2038–2043 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    37 Downloads (Pure)
  • Threat modeling framework for mobile communication systems

    Rao, S. P., Chen, H. Y. & Aura, T., Feb 2023, In: Computers and Security. 125, p. 1-23 23 p., 103047.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    435 Downloads (Pure)
  • 2022

    Hardware Platform Security for Mobile Devices

    Gunn, L. J., Asokan, N., Ekberg, J-E., Liljestrand, H., Nayani, V. & Nyman, T., 7 Jun 2022, NOW Publishers. 181 p. (Foundations and Trends in Privacy and Security; vol. 3, no. 3-4)

    Research output: Book/ReportBookScientificpeer-review

  • Towards cryptographically-authenticated in-memory data structures

    Ghorshi, S., Gunn, L. J., Liljestrand, H. & Asokan, N., 2022, Proceedings - 2022 IEEE Secure Development Conference, SecDev 2022. IEEE, p. 30-44 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • 2021

    Credential Provisioning and Device Configuration with EAP

    Boire, S., Akgün, T., Ginzboorg, P., Laitinen, P., Tamrakar, S. & Aura, T., 22 Nov 2021, MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access. New York, NY, USA: ACM, p. 87–96 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    119 Downloads (Pure)
  • GrandDetAuto: Detecting malicious nodes in large-scale autonomous networks

    Abera, T., Brasser, F., Gunn, L., Jauernig, P., Koisser, D. & Sadeghi, A. R., 7 Oct 2021, Proceedings of 24th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2021. ACM, p. 220-234 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices

    Blue, L., Marchal, S., Traynor, P. & Asokan, N., 18 May 2021, IoTDI 2021 - Proceedings of the 2021 International Conference on Internet-of-Things Design and Implementation. ACM, p. 15-27 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    File
    1 Citation (Scopus)
    34 Downloads (Pure)
  • Nimble Out-of-Band Authentication for EAP (EAP-NOOB)

    Aura, T., Sethi, M. & Peltonen, A., Dec 2021, 51 p. Internet Engineering Task Force.

    Research output: Other contributionProfessional

    Open Access
  • Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols

    Sethi, M. & Aura, T., 1 Sept 2021, In: IEEE Communications Standards Magazine. 5, 3, p. 34-39 6 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    119 Downloads (Pure)
  • 2020

    A little goes a long way: Improving toxic language classification despite data scarcity

    Juuti, M., Gröndahl, T., Flanagan, A. & Asokan, N., 20 Nov 2020, Findings of the Association for Computational Linguistics: EMNLP 2020. Association for Computational Linguistics, p. 2991-3009 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    128 Downloads (Pure)
  • Camouflage: Hardware-assisted CFI for the ARM linux kernel

    Denis-Courmont, R., Liljestrand, H., Chinea, C. & Ekberg, J. E., Jul 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. IEEE, 9218535. (Proceedings - Design Automation Conference; vol. 2020-July).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    13 Citations (Scopus)
  • Effective writing style transfer via combinatorial paraphrasing

    Gröndahl, T. & Asokan, N., 17 Aug 2020, Proceedings on Privacy Enhancing Technologies. De Gruyter, p. 175-195 20 p. (Proceedings on Privacy Enhancing Technologies; vol. 2020, no. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    252 Downloads (Pure)
  • Evaluation of Out-of-Band Channels for IoT Security

    Latvala, S., Sethi, M. & Aura, T., Jan 2020, In: SN Computer Science. 1, 1, 18.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    12 Citations (Scopus)
    274 Downloads (Pure)
  • Extraction of Complex DNN Models: Real Threat or Boogeyman?

    Atli, B. G., Szyller, S., Juuti, M., Marchal, S. & Asokan, N., 7 Nov 2020, Engineering Dependable and Secure Machine Learning Systems: Third International Workshop, EDSMLS 2020, New York City, NY, USA, February 7, 2020, Revised Selected Papers. Shehory, O., Farchi, E. & Barash, G. (eds.). Springer, p. 42-57 16 p. ( Communications in Computer and Information Science; vol. 1272).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    18 Citations (Scopus)
    1 Downloads (Pure)
  • Formal verification of misbinding attacks on secure device pairing and bootstrapping

    Peltonen, A., Sethi, M. & Aura, T., 1 Apr 2020, In: Journal of Information Security and Applications. 51, 17 p., 102461.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    157 Downloads (Pure)
  • Hardware-assisted memory safety

    Liljestrand, H., 2020, Aalto University. 166 p.

    Research output: ThesisDoctoral ThesisCollection of Articles

    Open Access
  • PACStack: an Authenticated Call Stack

    Liljestrand, H., Nyman, T., Gunn, L. J., Ekberg, J-E. & Asokan, N., Aug 2020, Proceedings of the 30th USENIX Security Symposium. USENIX -The Advanced Computing Systems Association, 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Toward Hardware-assisted Run-time Protection

    Nyman, T., 2020, Aalto University. 226 p.

    Research output: ThesisDoctoral ThesisCollection of Articles

    Open Access