Filter
Conference contribution

Search results

  • 2020

    Extraction of Complex DNN Models: Real Threat or Boogeyman?

    Atli, B. G., Szyller, S., Juuti, M., Marchal, S. & Asokan, N., 7 Nov 2020, Engineering Dependable and Secure Machine Learning Systems: Third International Workshop, EDSMLS 2020, New York City, NY, USA, February 7, 2020, Revised Selected Papers. Shehory, O., Farchi, E. & Barash, G. (eds.). p. 42-57 15 p. ( Communications in Computer and Information Science; vol. 1272).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    1 Downloads (Pure)
  • XSS Vulnerabilities in cloud-application add-ons

    Bui, T., Rao, S., Antikainen, M. & Aura, T., Oct 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. ACM, p. 610-621

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • 2019

    Analysis of topology poisoning attacks in software-defined networking

    Bui, T., Antikainen, M. & Aura, T., 13 Nov 2019, Secure IT Systems - 24th Nordic Conference, NordSec 2019, Proceedings. Askarov, A., Hansen, R. R. & Rafnsson, W. (eds.). p. 87-102 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11875 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • A Scalable Software Update Service for IoT Devices in Urban Scenarios

    Toro Betancur, V., Viquez Zamora, J., Antikainen, M. & Di Francesco, M., 2019, Proceedings of the 9th International Conference on the Internet of Things . ACM, 8 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    60 Downloads (Pure)
  • chowniot: Enhancing IoT privacy by automated handling of ownership change

    Khan, M. S. N., Marchal, S., Buchegger, S. & Asokan, N., 1 Jan 2019, Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Revised Selected Papers. Slamanig, D., Krenn, S., Fischer-Hübner, S., Pierson, J. & Kosta, E. (eds.). p. 205-221 17 p. (IFIP Advances in Information and Communication Technology; vol. 547).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    24 Downloads (Pure)
  • Client-Side Vulnerabilities in Commercial VPNs

    Rao, S., Bui, T., Antikainen, M. & Aura, T., 2019, Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. p. 103-119 17 p. (Lecture Notes in Computer Science; vol. 11875).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Detecting organized eCommerce fraud using scalable categorical clustering

    Marchal, S. & Szyller, S., 2019, 2019 Annual Computer Security Applications Conference (ACSAC ’19), December 9–13, 2019, San Juan, PR, USA. ACM, p. 215–228 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    105 Downloads (Pure)
  • DÏoT: A Federated Self-learning Anomaly Detection System for IoT

    Nguyen, T. D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N. & Sadeghi, A., 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, p. 756-767 12 p. (International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • Misbinding attacks on secure device pairing and bootstrapping

    Sethi, M., Peltonen, A. & Aura, T., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. ACM, p. 453-464 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    151 Downloads (Pure)
  • Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet

    Bui, T., Rao, S., Antikainen, M. & Aura, T., 25 Mar 2019, Proceedings of the 12th European Workshop on Systems Security, EuroSec 2019. ACM, p. 6 3

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    File
    1 Citation (Scopus)
    189 Downloads (Pure)
  • Watch Your Step! Detecting Stepping Stones in Programmable Networks

    Bhattacherjee, D., Gurtov, A. & Aura, T., 1 May 2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 7 p. 8761731. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • 2018

    Application of Public Ledgers to Revocation in Distributed Access Control

    Bui, T. & Aura, T., 2018, Information and Communications Security: ICICS 2018. Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z. & Meddahi, A. (eds.). Cham, p. 781-792 12 p. (Lecture notes in computer science; vol. 11149).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer

    Bui, T., Rao, S. P., Antikainen, M., Bojan, V. M. & Aura, T., 2018, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA. Baltimore, MD: USENIX : THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 1511-1525 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    55 Downloads (Pure)
  • Security wrapper orchestration in cloud

    Kalliola, A., Lal, S., Ahola, K., Oliver, I., Miche, Y. & Aura, T., 27 Aug 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. ACM, 3232853

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure

    Ahmed, A. S. & Aura, T., 5 Sep 2018, Proceedings -17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 104-111 8 p. 8455894. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    4 Citations (Scopus)
  • 2017

    A Large-Scale Analysis of Download Portals and Freeware Installers

    Geniola, A., Antikainen, M. & Aura, T., 2017, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham, p. 209-225 17 p. (Lecture Notes in Computer Science; vol. 10674).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    2 Citations (Scopus)
  • A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2 Mar 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. IEEE, p. 144-147 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Key exchange with the help of a public ledger (Transcript of discussion)

    Bui, T., 2017, Security Protocols XXV - 25th International Workshop, Revised Selected Papers. p. 137-143 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10476 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • SynAPTIC: Secure and persistent connectivity for containers

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 10 Jul 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. IEEE, p. 262-267 6 p. 7973711

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    2 Citations (Scopus)
  • 2016

    An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 30 Jun 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, p. 281-288 8 p. 7502823

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    14 Citations (Scopus)
  • Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2016, Proceedings of the 10th European Conference on Software Architecture Workshops. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Privacy in LTE networks

    Rao, S., Kotte, B. T. & Holtmanns, S., 18 Jun 2016, MobiMedia '16 Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications . Xi'an, China: Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), p. 176-183 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • The Black Mark Beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppänen, V., 2016, 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW). Younas, M., Awan & ElHaddad, J. (eds.). IEEE, p. 264-269 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • User location tracking attacks for LTE networks using the interworking functionality

    Holtmanns, S., Rao, S. P. & Oliver, I., 21 Jun 2016, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016. IEEE, p. 315-322 8 p. 7497239

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    11 Citations (Scopus)
  • We know where you are!

    Rao, S. P., Oliver, I., Holtmanns, S. & Aura, T., 2 Aug 2016, 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016. Vol. 2016-August. p. 277-293 17 p. 7529440

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    6 Citations (Scopus)