Filter
Conference contribution

Search results

  • 2022

    Exploring How Students Solve Open-ended Assignments: A Study of SQL Injection Attempts in a Cybersecurity Course

    Koutcheme, C., Tilanterä, A., Peltonen, A., Hellas, A. & Haaranen, L., 7 Jul 2022, ITiCSE 2022 - Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education. ACM, p. 75-81 7 p. (Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • FLAME: Taming Backdoors in Federated Learning

    Nguyen, T. D., Rieger, P., Chen, H., Yalame, H., Möllering, H., Fereidooni, H., Marchal, S., Miettinen, M., Mirhoseini, A., Zeitouni, S., Koushanfar, F., Sadeghi, A. R. & Schneider, T., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX - THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 1415-1432 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    8 Downloads (Pure)
  • Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses

    Atli Tekgul, B., Wang, S., Marchal, S. & Asokan, N., 2022, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Proceedings. Atluri, DiPietro, R., Jensen, CD. & Meng, W. (eds.). Vol. 13556. p. 384-404 21 p. (Lecture Notes in Computer Science; vol. 13556).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • 2021

    A Comprehensive Formal Analysis of 5G Handover

    Peltonen, A., Sasse, R. & Basin, D., 21 Jun 2021, WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, p. 1-12 12 p. 3467823

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    168 Downloads (Pure)
  • Credential Provisioning and Device Configuration with EAP

    Boire, S., Akgün, T., Ginzboorg, P., Laitinen, P., Tamrakar, S. & Aura, T., 22 Nov 2021, MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access. New York, NY, USA: ACM, p. 87–96 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    60 Downloads (Pure)
  • DAWN: Dynamic Adversarial Watermarking of Neural Networks

    Szyller, S., Atli, B. G., Marchal, S. & Asokan, N., 17 Oct 2021, Proceedings of the 29th ACM International Conference on Multimedia, MM 2021. ACM, p. 4417-4425 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    8 Citations (Scopus)
  • Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices

    Blue, L., Marchal, S., Traynor, P. & Asokan, N., 18 May 2021, IoTDI 2021 - Proceedings of the 2021 International Conference on Internet-of-Things Design and Implementation. ACM, p. 15-27 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    File
    12 Downloads (Pure)
  • SAFELearn: Secure Aggregation for private FEderated Learning

    Fereidooni, H., Marchal, S., Miettinen, M., Mirhoseini, A., Mollering, H., Nguyen, T. D., Rieger, P., Sadeghi, A. R., Schneider, T., Yalame, H. & Zeitouni, S., May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy Workshops, SPW 2021. IEEE, p. 56-62 7 p. 9474309

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    23 Citations (Scopus)
    155 Downloads (Pure)
  • 2020

    Extraction of Complex DNN Models: Real Threat or Boogeyman?

    Atli, B. G., Szyller, S., Juuti, M., Marchal, S. & Asokan, N., 7 Nov 2020, Engineering Dependable and Secure Machine Learning Systems: Third International Workshop, EDSMLS 2020, New York City, NY, USA, February 7, 2020, Revised Selected Papers. Shehory, O., Farchi, E. & Barash, G. (eds.). p. 42-57 16 p. ( Communications in Computer and Information Science; vol. 1272).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    8 Citations (Scopus)
    1 Downloads (Pure)
  • XSS Vulnerabilities in cloud-application add-ons

    Bui, T., Rao, S., Antikainen, M. & Aura, T., 5 Oct 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. ACM, p. 610-621 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    49 Downloads (Pure)
  • 2019

    Analysis of topology poisoning attacks in software-defined networking

    Bui, T., Antikainen, M. & Aura, T., 13 Nov 2019, Secure IT Systems - 24th Nordic Conference, NordSec 2019, Proceedings. Askarov, A., Hansen, R. R. & Rafnsson, W. (eds.). p. 87-102 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11875 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • A Scalable Software Update Service for IoT Devices in Urban Scenarios

    Toro Betancur, V., Viquez Zamora, J., Antikainen, M. & Di Francesco, M., 2019, Proceedings of the 9th International Conference on the Internet of Things . ACM, 8 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    74 Downloads (Pure)
  • chowniot: Enhancing IoT privacy by automated handling of ownership change

    Khan, M. S. N., Marchal, S., Buchegger, S. & Asokan, N., 1 Jan 2019, Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Revised Selected Papers. Slamanig, D., Krenn, S., Fischer-Hübner, S., Pierson, J. & Kosta, E. (eds.). p. 205-221 17 p. (IFIP Advances in Information and Communication Technology; vol. 547).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    112 Downloads (Pure)
  • Client-Side Vulnerabilities in Commercial VPNs

    Rao, S., Bui, T., Antikainen, M. & Aura, T., 2019, Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. p. 103-119 17 p. (Lecture Notes in Computer Science; vol. 11875).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Detecting organized eCommerce fraud using scalable categorical clustering

    Marchal, S. & Szyller, S., 2019, 2019 Annual Computer Security Applications Conference (ACSAC ’19), December 9–13, 2019, San Juan, PR, USA. ACM, p. 215–228 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    170 Downloads (Pure)
  • DÏoT: A Federated Self-learning Anomaly Detection System for IoT

    Nguyen, T. D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N. & Sadeghi, A., 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, p. 756-767 12 p. (International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • Misbinding attacks on secure device pairing and bootstrapping

    Sethi, M., Peltonen, A. & Aura, T., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. ACM, p. 453-464 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    181 Downloads (Pure)
  • Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet

    Bui, T., Rao, S., Antikainen, M. & Aura, T., 25 Mar 2019, Proceedings of the 12th European Workshop on Systems Security, EuroSec 2019. ACM, p. 6 3

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    File
    3 Citations (Scopus)
    419 Downloads (Pure)
  • Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing

    Hafeez, I., Antikainen, M. & Tarkoma, S., Mar 2019, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019. IEEE, p. 196-201 6 p. 8730787. (2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Watch Your Step! Detecting Stepping Stones in Programmable Networks

    Bhattacherjee, D., Gurtov, A. & Aura, T., 1 May 2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 7 p. 8761731. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • 2018

    Application of Public Ledgers to Revocation in Distributed Access Control

    Bui, T. & Aura, T., 2018, Information and Communications Security: ICICS 2018. Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z. & Meddahi, A. (eds.). Cham, p. 781-792 12 p. (Lecture notes in computer science; vol. 11149).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer

    Bui, T., Rao, S. P., Antikainen, M., Bojan, V. M. & Aura, T., 2018, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA. Baltimore, MD: USENIX - THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 1511-1525 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    118 Downloads (Pure)
  • Security wrapper orchestration in cloud

    Kalliola, A., Lal, S., Ahola, K., Oliver, I., Miche, Y. & Aura, T., 27 Aug 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. ACM, 3232853

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure

    Ahmed, A. S. & Aura, T., 5 Sep 2018, Proceedings -17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 104-111 8 p. 8455894. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    10 Citations (Scopus)
  • 2017

    A Large-Scale Analysis of Download Portals and Freeware Installers

    Geniola, A., Antikainen, M. & Aura, T., 2017, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham, p. 209-225 17 p. (Lecture Notes in Computer Science; vol. 10674).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    3 Citations (Scopus)
  • A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2 Mar 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. IEEE, p. 144-147 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Key exchange with the help of a public ledger (Transcript of discussion)

    Bui, T., 2017, Security Protocols XXV - 25th International Workshop, Revised Selected Papers. p. 137-143 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10476 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • SynAPTIC: Secure and persistent connectivity for containers

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 10 Jul 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. IEEE, p. 262-267 6 p. 7973711

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    8 Citations (Scopus)
  • 2016

    An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 30 Jun 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, p. 281-288 8 p. 7502823

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    22 Citations (Scopus)
  • Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2016, Proceedings of the 10th European Conference on Software Architecture Workshops. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Privacy in LTE networks

    Rao, S., Kotte, B. T. & Holtmanns, S., 18 Jun 2016, MobiMedia '16 Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications . Xi'an, China: Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), p. 176-183 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • The Black Mark Beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppänen, V., 2016, 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW). Younas, M., Awan & ElHaddad, J. (eds.). IEEE, p. 264-269 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • User location tracking attacks for LTE networks using the interworking functionality

    Holtmanns, S., Rao, S. P. & Oliver, I., 21 Jun 2016, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016. IEEE, p. 315-322 8 p. 7497239

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    17 Citations (Scopus)
  • We know where you are!

    Rao, S. P., Oliver, I., Holtmanns, S. & Aura, T., 2 Aug 2016, 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016. Vol. 2016-August. p. 277-293 17 p. 7529440

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    10 Citations (Scopus)