20152019

Research output per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Education/Academic qualification

Master of Science (Technology), Information Technology

Fingerprint Dive into the research topics where Tien Bui is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 13 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 7 Conference contribution
  • 2 Chapter
  • 1 Poster

Analysis of topology poisoning attacks in software-defined networking

Bui, T., Antikainen, M. & Aura, T., 13 Nov 2019, Secure IT Systems - 24th Nordic Conference, NordSec 2019, Proceedings. Askarov, A., Hansen, R. R. & Rafnsson, W. (eds.). p. 87-102 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11875 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Client-Side Vulnerabilities in Commercial VPNs

    Rao, S., Bui, T., Antikainen, M. & Aura, T., 2019, Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. p. 103-119 17 p. (Lecture Notes in Computer Science; vol. 11875).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet

    Bui, T., Rao, S., Antikainen, M. & Aura, T., 25 Mar 2019, Proceedings of the 12th European Workshop on Systems Security, EuroSec 2019. ACM, p. 6 3

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    File
  • 91 Downloads (Pure)

    Application of Public Ledgers to Revocation in Distributed Access Control

    Bui, T. & Aura, T., 2018, Information and Communications Security: ICICS 2018. Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z. & Meddahi, A. (eds.). Cham, p. 781-792 12 p. (Lecture notes in computer science; vol. 11149).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • 1 Citation (Scopus)

    Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer

    Bui, T., Rao, S. P., Antikainen, M., Bojan, V. M. & Aura, T., 2018, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA. Baltimore, MD: USENIX : THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 1511-1525 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
  • 24 Downloads (Pure)

    Projects

    Secure Connectivity of Future Cyber-Physical Systems

    Bui, T., Peltonen, A., Sethi, M., Aura, T. & Antikainen, M.

    01/09/201631/08/2020

    Project: Academy of Finland: Other research funding

    Cyber Trust SHOK

    Bui, T., Rao, S., Suoranta, S., Antikainen, M., Aura, T., Peltonen, A. & Scepanovic, S.

    01/04/201531/12/2017

    Project: Business Finland: Strategic centres for science, technology and innovation (SHOK)

    Activities

    • 1 Public or invited talk

    Last mile authentication problem: Exploiting the missing link in end-to-end secure communication

    Siddharth Rao (Speaker), Tien Bui (Speaker), Markku Antikainen (Speaker), Tuomas Aura (Speaker)
    12 Aug 2018

    Activity: Talk or presentation typesPublic or invited talk