N. Asokan

Professor

Research outputs

  1. 2019
  2. Accepted/In press

    Making targeted black-box evasion attacks effective and efficient

    Juuti, M., Atli, B. & Asokan, N., 12 Aug 2019, (Accepted/In press). 12 p.

    Research output: Contribution to conferencePaperScientificpeer-review

  3. Published

    Circumventing Cryptographic Deniability with Remote Attestation

    Gunn, L., Vieitez Parra, R. & Asokan, N., 12 Jul 2019, Proceedings on Privacy Enhancing Technologies. p. 350–369 (Proceedings on Privacy Enhancing Technologies; vol. 2019, no. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  4. Published

    Text analysis in adversarial settings: Does deception leave a stylistic trace?

    Gröndahl, T. & Asokan, N., 1 Jun 2019, In : ACM COMPUTING SURVEYS. 52, 3, p. 1-36 45.

    Research output: Contribution to journalReview ArticleScientificpeer-review

  5. Published

    AuDI: Towards Autonomous IoT Device-Type Identification using Periodic Communication

    Marchal, S., Miettinen, M., Nguyen, T. D., Sadeghi, A-R. & Asokan, N., Jun 2019, In : IEEE Journal on Selected Areas in Communications. 37, 6, p. 1402-1412 11 p., 8664655.

    Research output: Contribution to journalArticleScientificpeer-review

  6. Accepted/In press

    PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

    Liljestrand, H., Nyman, T., Wang, K., Chinea Perez, C., Ekberg, J-E. & Asokan, N., 19 Jan 2019, (Accepted/In press) Proceedings of the 28th USENIX Security Symposium, USENIX Security 2019. USENIX Association

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. Published

    Scalable Byzantine Consensus via Hardware-assisted Secret Sharing

    Liu, J., Li, W., Karame, G. & Asokan, N., 1 Jan 2019, In : IEEE Transactions on Computers. 68, 1, p. 139-151

    Research output: Contribution to journalArticleScientificpeer-review

  8. Accepted/In press

    Making Speculative BFT Resilient with Trusted Monotonic Counters

    Gunn, L., Liu, J., Vavala, B. & Asokan, N., 2019, (Accepted/In press).

    Research output: Contribution to conferencePaperScientificpeer-review

  9. Published

    PRADA: Protecting Against DNN Model Stealing Attacks

    Juuti, M., Szyller, S., Marchal, S. & Asokan, N., 2019, IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019. IEEE, p. 512-527 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  10. 2018
  11. Published

    ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

    Asokan, N., Nyman, T., Rattanavipanon, N., Sadeghi, A-R. & Tsudik, G., Nov 2018, In : IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS. 37, 11, p. 2290-2300 10 p., 8493602.

    Research output: Contribution to journalArticleScientificpeer-review

  12. Published

    Ad-hoc key agreement: A brief history and the challenges ahead

    Miettinen, M. & Asokan, N., 1 Oct 2018, In : Computer Communications. 131, p. 32-34 3 p.

    Research output: Contribution to journalReview ArticleScientificpeer-review

  13. Published

    Toward Linux kernel memory safety

    Reshetova, E., Liljestrand, H., Paverd, A. & Asokan, N., 19 Sep 2018, In : Software: Practice and Experience. 48, 12, p. 2237-2256

    Research output: Contribution to journalArticleScientificpeer-review

  14. Published

    OmniShare: Encrypted Cloud Storage for the Multi-Device Era

    Paverd, A., Tamrakar, S., Nguyen, H. L., Pendyala, P., Nguyen, T. D., Stobert, E., Gröndahl, T., Asokan, N. & Sadeghi, A-R., 1 Aug 2018, In : IEEE INTERNET COMPUTING. 22, 4, p. 27-36

    Research output: Contribution to journalArticleScientificpeer-review

  15. Published

    Migrating SGX Enclaves with Persistent State

    Alder, F., Kurnikov, A., Paverd, A. & Asokan, N., 23 Jul 2018, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, p. 195-206

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  16. Published

    Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving Trajectories

    Vaas, C., Juuti, M., Asokan, N. & Martinovic, I., 6 Jul 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. IEEE, p. 199-213 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  17. Published

    Revisiting context-based authentication in IoT

    Miettinen, M., Nguyen, T. D., Sadeghi, A. R. & Asokan, N., 24 Jun 2018, Proceedings of the 55th Annual Design Automation Conference, DAC 2018. Institute of Electrical and Electronics Engineers, Vol. Part F137710. a32

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  18. Published

    Toward Fairness of Cryptocurrency Payments

    Liu, J., Li, W., Karame, G. O. & Asokan, N., 1 May 2018, In : IEEE Security and Privacy. 16, 3, p. 81-89 9 p.

    Research output: Contribution to journalArticleScientificpeer-review

  19. Published

    SafeKeeper: Protecting Web Passwords using Trusted Execution Environments

    Krawiecka, K., Kurnikov, A., Paverd, A., Mannan, M. & Asokan, N., 23 Apr 2018, WWW '18 : Proceedings of the 2018 World Wide Web Conference. ACM, p. 349-358 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  20. Published

    Using SafeKeeper to Protect Web Passwords

    Kurnikov, A., Krawiecka, K., Paverd, A., Mannan, M. & Asokan, N., 23 Apr 2018, Companion Proceedings of the The Web Conference 2018. ACM, p. 159-162

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  21. Published

    Secure deduplication of encrypted data: Refined model and new constructions

    Liu, J., Duan, L., Li, Y. & Asokan, N., 1 Jan 2018, Topics in Cryptology – CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, Proceedings. Smart, N. P. (ed.). Springer Verlag, p. 374-393 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10808 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  22. Published

    All You Need Is "Love": Evading Hate Speech Detection

    Gröndahl, T., Pajola, L., Juuti, M., Conti, M. & Asokan, N., 2018, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security. New York: ACM, p. 2-12 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  23. Published

    Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

    Kurnikov, A., Paverd, A., Mannan, M. & Asokan, N., 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, p. 40:1-40:10 (ARES 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  24. Published

    On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World

    Marchal, S. & Asokan, N., 2018, 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18). Baltimore, MD: USENIX Association, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionProfessional

  25. Published

    Stay On-Topic: Generating Context-specific Fake Restaurant Reviews

    Juuti, M., Sun, B., Mori, T. & Asokan, N., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. p. 132-151 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11098 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  26. 2017
  27. Published

    Oblivious Neural Network Predictions via MiniONN Transformations

    Liu, J., Juuti, M., Lu, Y. & Asokan, N., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . ACM, p. 619-631

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  28. Published

    Private Set Intersection for Unequal Set Sizes with Mobile Applications

    Kiss, Á., Liu, J., Schneider, T., Asokan, N. & Pinkas, B., 10 Oct 2017, Proceedings on Privacy Enhancing Technologies. p. 177–197 (Proceedings on Privacy Enhancing Technologies; vol. 2017, no. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  29. Published

    Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application

    Marchal, S., Armano, G., Gröndahl, T., Saari, K., Singh, N. & Asokan, N., 1 Oct 2017, In : IEEE Transactions on Computers. 66, 10, p. 1717-1733 17 p.

    Research output: Contribution to journalArticleScientificpeer-review

  30. Published

    CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers

    Nyman, T., Ekberg, J-E., Davi, L. & Asokan, N., 18 Sep 2017, Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings. Dacier, M., Bailey, M., Polychronakis, M. & Antonakakis, M. (eds.). Springer International Publishing, p. 259-284 25 p. ( Lecture Notes in Computer Science; vol. 10453).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  31. Published

    LO-FAT: Low-Overhead Control Flow ATtestation in Hardware

    Dessouky, G., Zeitouni, S., Nyman, T., Paverd, A., Davi, L., Koeberl, P., Asokan, N. & Sadeghi, A-R., 18 Jun 2017, Proceedings of the 54th Annual Design Automation Conference 2017, DAC 2017. Institute of Electrical and Electronics Engineers, Vol. Part 128280. 5 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  32. Published

    IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT

    Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A-R. & Tarkoma, S., 1 Jun 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). Lee, K. & Liu, L. (eds.). IEEE, p. 2177-2184 8 p. (International Conference on Distributed Computing Systems. Proceedings ; vol. 37).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  33. Published

    IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

    Miettinen, M., Marchal, S., Hafeez, I., Frassetto, T., Asokan, N., Sadeghi, A-R. & Tarkoma, S., 1 Jun 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). Lee, K. & Liu, L. (eds.). IEEE, p. 2511-2514 4 p. (International Conference on Distributed Computing Systems. Proceedings ; vol. 37).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  34. Published

    Profiling Users by Modeling Web Transactions

    Tomsu, R., Marchal, S. & Asokan, N., 1 Jun 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). Lee, K. & Liu, L. (eds.). IEEE, p. 2399-2404 6 p. (International Conference on Distributed Computing Systems. Proceedings; vol. 37).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  35. Published

    The circle game: Scalable private membership test using trusted hardware

    Tamrakar, S., Liu, J., Paverd, A., Ekberg, J-E., Pinkas, B. & Asokan, N., 2 Apr 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. p. 31-44 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  36. Published

    Implementing prover-side proximity verification for strengthening transparent authentication

    Juuti, M., Vaas, C., Liljestrand, H., Sluganovic, I., Asokan, N. & Martinovic, I., 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA: Demo Session. IEEE, p. 1-2

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  37. Published

    Randomization can’t stop BPF JIT spray

    Reshetova, E., Bonazzi, F. & Asokan, N., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Springer Verlag, Vol. 10394 LNCS. p. 233-247 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  38. Published

    STASH: Securing transparent authentication schemes using prover-side proximity verification

    Juuti, M., Vaas, C., Sluganovic, I., Liljestrand, H., Asokan, N. & Martinovic, I., 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA. IEEE, p. 1-9

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  39. 2016
  40. Published

    Exploring the Use of Intel SGX for Secure Many-Party Applications

    Küçük, K. A., Paverd, A., Martin, A., Asokan, N., Simpson, A. & Ankele, R., Dec 2016, Proceedings of the 1st Workshop on System Software for Trusted Execution. New York, NY, USA: ACM, p. 1-6 6 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  41. Published

    Protecting Password Databases Using Trusted Hardware

    Krawiecka, K., Paverd, A. & Asokan, N., Dec 2016, Proceedings of the 1st Workshop on System Software for Trusted Execution. New York, NY, USA: ACM, 2 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  42. Published

    C-FLAT: Control-Flow Attestation for Embedded Systems Software

    Abera, T., Asokan, N., Davi, L., Ekberg, J-E., Nyman, T., Paverd, A., Sadeghi, A-R. & Tsudik, G., 24 Oct 2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . ACM, p. 743-754 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  43. Published

    Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets

    Marchal, S., Saari, K., Singh, N. & Asokan, N., 10 Aug 2016, IEEE 36th International Conference on Distributed Computing Systems (ICDCS) . IEEE, p. 323 - 333 11 p. ( International Conference on Distributed Computing Systems. Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  44. Published

    Real-Time Client-Side Phishing Prevention Add-On

    Armano, G., Marchal, S. & Asokan, N., 10 Aug 2016, Proceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016. Institute of Electrical and Electronics Engineers, Vol. 2016-August. p. 777 - 778 2 p. 7536598

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  45. Published

    SELint: an SEAndroid policy analysis tool

    Reshetova, E., Bonazzi, F. & Asokan, N., 8 Aug 2016, arXiv, 13 p. (arXiv preprints).

    Research output: Working paperProfessional

  46. Published

    Poster: Friend or foe? Context authentication for trust domain separation in IoT environments

    Miettinen, M., Huang, J., Nguyen, T. D., Asokan, N. & Sadeghi, A. R., 18 Jul 2016, WiSec 2016 - Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. p. 225-226 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  47. Published

    ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs

    Dargahi, T., Ambrosin, M., Conti, M. & Asokan, N., 1 Jul 2016, In : Computer Communications. 85, p. 1-13 13 p.

    Research output: Contribution to journalArticleScientificpeer-review

  48. Published

    On improving tie strength estimates by aggregating multiple communication channels

    Yousefnezhad, N., Nagy, M. & Asokan, N., 21 Jun 2016, 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016. Institute of Electrical and Electronics Engineers, p. 530-535 6 p. 7497255

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  49. Published

    Invited - Things, trouble, trust: On building trust in IoT systems

    Abera, T., Asokan, N., Davi, L., Koushanfar, F., Paverd, A., Sadeghi, A. R. & Tsudik, G., 5 Jun 2016, Proceedings of the 53rd Annual Design Automation Conference, DAC 2016. Institute of Electrical and Electronics Engineers, Vol. 05-09-June-2016. 6 p. a121. (Proceedings : ACM IEEE Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  50. Published

    Characterizing SEAndroid policies in the wild

    Reshetova, E., Bonazzi, F., Nyman, T., Borgaonkar, R. & Asokan, N., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. SciTePress, p. 482-489 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  51. Published

    Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks

    Huhta, O., Shrestha, P., Udar, S., Juuti, M., Saxena, N. & Asokan, N., 2016, Network and Distributed System Security Symposium 2016. San Diego: Internet Society, p. 1-14

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  52. Published

    Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems

    Asokan, N., 2016.

    Research output: Contribution to conferencePaperScientificpeer-review

  53. Published

    TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition

    Juuti, M., Vaas, C., Sluganovic, I., Liljestrand, H., Martinovic, I. & Asokan, N., 2016, 12 p. (ArXiv preprints).

    Research output: Working paperProfessional

  54. 2015
  55. Published

    SEDA: Scalable embedded device attestation

    Asokan, N., Brasser, F., Ibrahim, A., Sadeghi, A. R., Schunter, M., Tsudik, G. & Wachsmann, C., 12 Oct 2015, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security . Vol. 2015-October. p. 964-975 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Previous 1 2 Next

ID: 42497