Tuomas Aura

Professor

Research outputs

  1. 2018
  2. Published

    Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and Mitigation

    Kalliola, A., Miche, Y., Oliver, I., Holtmanns, S., Atli, B., Lendasse, A., Bjork, K-M., Akusok, A. & Aura, T. 2018 Proceedings of ELM-2016. Cao, J., Cambria, E., Lendasse, A., Miche, Y. & Vong, C. M. (eds.). Cham, p. 129-143 15 p. (Proceedings in Adaptation, Learning and Optimization; vol. 9)

    Research output: Scientific - peer-reviewChapter

  3. 2017
  4. Published

    SynAPTIC: Secure and persistent connectivity for containers

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T. 10 Jul 2017 Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. Institute of Electrical and Electronics Engineers Inc., p. 262-267 6 p. 7973711

    Research output: Scientific - peer-reviewConference contribution

  5. Published

    A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V. 2 Mar 2017 Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 144-147 4 p.

    Research output: Scientific - peer-reviewConference contribution

  6. Published

    A Large-Scale Analysis of Download Portals and Freeware Installers

    Geniola, A., Antikainen, M. & Aura, T. 2017 Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham: Springer International Publishing AG, p. 209-225 17 p. (Lecture Notes in Computer Science; vol. 10674)

    Research output: Scientific - peer-reviewConference contribution

  7. Published

    GPASS: A Password Manager with Group-Based Access Control

    Bui, T. & Aura, T. 2017 Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham: Springer International Publishing AG, p. 229-244 16 p. (Lecture Notes in Computer Science; vol. 10674)

    Research output: Scientific - peer-reviewChapter

  8. Published

    Key Exchange with the Help of a Public Ledger

    Bui, T. & Aura, T. 2017 Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Stajano, F., Anderson, J., Christianson, B. & Matyás, V. (eds.). Cham: Springer International Publishing AG, p. 123-136 14 p. (Lecture Notes in Computer Science; vol. 10476)

    Research output: Scientific - peer-reviewChapter

  9. 2016
  10. Published

    We know where you are!

    Rao, S. P., Oliver, I., Holtmanns, S. & Aura, T. 2 Aug 2016 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016. Vol. 2016-August, p. 277-293 17 p. 7529440

    Research output: Scientific - peer-reviewConference contribution

  11. Published

    An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T. 30 Jun 2016 Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers Inc., p. 281-288 8 p. 7502823

    Research output: Scientific - peer-reviewConference contribution

  12. Published

    Domain Isolation in a Multi-tenant Software-Defined Network

    Ranjbar, A., Antikainen, M. & Aura, T. 10 Mar 2016 Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 16-25 10 p. 7431391

    Research output: Scientific - peer-reviewConference contribution

  13. Published
  14. Published

    Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V. 2016 Proceedings of the 10th European Conference on Software Architecture Workshops. ACM

    Research output: Scientific - peer-reviewConference contribution

  15. Published

    The Black Mark Beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppänen, V. 2016 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW). Younas, M., Awan & ElHaddad, J. (eds.). IEEE, p. 264-269 6 p.

    Research output: Scientific - peer-reviewConference contribution

  16. 2015
  17. Published

    Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

    Rao, S. P., Holtmanns, S., Oliver, I. & Aura, T. 2 Dec 2015 Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Institute of Electrical and Electronics Engineers Inc., Vol. 1, p. 1171-1176 6 p. 7345408

    Research output: Scientific - peer-reviewConference contribution

  18. Published

    Commitment-based device-pairing protocol with synchronized drawings and comparison metrics

    Antikainen, M., Sethi, M., Matetic, S. & Aura, T. 2015 In : PERVASIVE AND MOBILE COMPUTING. 16, Part B, p. 205-219

    Research output: Scientific - peer-reviewArticle

  19. Published

    Electronic Citizen Identities and Strong Authentication

    Suoranta, S., Haataja, L. & Aura, T. 2015 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015. Buchegger, S. & Dam, M. (eds.). p. 213-230

    Research output: Scientific - peer-reviewConference contribution

  20. Published

    Flexible Management of Cloud-Connected Digital Signage

    Sethi, M., Lijding, M., Di Francesco, M. & Aura, T. 2015 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), Beijing, China, 10-14 August 2015. IEEE, p. 205-212

    Research output: Scientific - peer-reviewConference contribution

  21. Published

    Flooding DDoS Mitigation and Traffic Management with Software Defined Networking

    Kalliola, A., Lee, K., Lee, H. & Aura, T. 2015 IEEE 4th International Conference on Cloud Networking (CloudNet), 5-7 October 2015, Niagara Falls, Canada. IEEE, p. 248-254

    Research output: Scientific - peer-reviewConference contribution

  22. Published

    Secure and Low-Power Authentication for Resource-Constrained Devices

    Sethi, M., Kortoci, P., Di Francesco, M. & Aura, T. 2015 5th International Conference on the Internet of Things (IoT), 26-28 October 2015, Seoul, South Korea. p. 30-36

    Research output: Scientific - peer-reviewConference contribution

  23. 2014
  24. Published

    Adaptive and context-aware privacy preservation exploiting user interactions in smart environments

    Pallapa, G., Das, S. K., Di Francesco, M. & Aura, T. 2014 In : PERVASIVE AND MOBILE COMPUTING. 12, n/a, p. 232-243

    Research output: Scientific - peer-reviewArticle

  25. Published

    Commitment-based device pairing with synchronized drawing

    Sethi, M., Antikainen, M. & Aura, T. 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom 2014), Budapest, Hungary, March 24-28, 2014. IEEE

    Research output: Scientific - peer-reviewConference contribution

  26. Published

    Denial-of-Service Attacks in Bloom-Filter-Based Forwarding

    Antikainen, M., Aura, T. & Särelä, M. 2014 In : IEEE-ACM TRANSACTIONS ON NETWORKING. 22, 5, p. 1463-1476

    Research output: Scientific - peer-reviewArticle

  27. Published

    Denial-of-Service Mitigation for Internet Services

    Kalliola, A., Aura, T. & Šcepanovic, S. 2014 Nordic Conference on Secure IT Systems, Tromsø, Norway, October 15-17, 2014. Bernsmed, K. & Fischer-Hübner, S. (eds.). Springer International Publishing, p. 213-228

    Research output: Scientific - peer-reviewConference contribution

  28. Published

    Logout in single sign-on systems: problems and solutions.

    Suoranta, S., Manzoor, K., Tontti, A., Ruuskanen, J. & Aura, T. 2014 In : Journal of Information Security and Applications (JISA). 19, 1, p. 61-77

    Research output: Scientific - peer-reviewArticle

  29. Published

    MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies

    Oat, E., Di Francesco, M. & Aura, T. 2014 The first IEEE Workshop on Developing Applications for Pervasive Display Networks (PD-Apps '14), Budapest, Hungary. Budapest, Hungary, p. 506-511

    Research output: Scientific - peer-reviewConference contribution

  30. Published

    Secure Bootstrapping of Cloud-Managed Ubiquitous Displays

    Sethi, M., Oat, E., Di Francesco, M. & Aura, T. 2014 The 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Seattle, WA, USA. p. 739-750

    Research output: Scientific - peer-reviewConference contribution

  31. Published

    Spatially aware malware infection modeling framework.

    Kalliola, A. & Aura, T. 2014 The 14th IEEE International Conference on Computer and Information Technology (CIT 2014), Xi’an, China, September 11-13, 2014.

    Research output: Scientific - peer-reviewConference contribution

  32. Published

    Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch

    Antikainen, M., Aura, T. & Särelä, M. 2014 Nordic Conference on Secure IT Systems, Tromso, Norway, October 15-17, 2014. p. 229-244

    Research output: Scientific - peer-reviewConference contribution

  33. 2013
  34. Published

    Logout in Single Sign-on Systems

    Suoranta, S., Tontti, A., Ruuskanen, J. & Aura, T. 2013 Policies and Research in Identity Management, Third IFIP WG 11.6 Working Conference, IDMAN 2013,London, UK, April 2013. Simone Fischer-Hübner, E. D. L. (ed.). p. 147-160

    Research output: Scientific - peer-reviewConference contribution

  35. 2012
  36. Published
  37. Published

    Scaling Bloom filter based multicast with hierarchical tree splitting

    Rizvi, S., Zahemszky, A. & Aura, T. 2012 ICC IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012. IEEE, p. 2790-2795

    Research output: Scientific - peer-reviewConference contribution

  38. Published

    Strong Authentication with Mobile Phone

    Suoranta, S., Andrade, A. & Aura, T. 2012 Information Security, 15th International Conference, ISC 2012; Passau, Germany; September 2012. Gollmann, D. & Freiling, F. C. (eds.). p. 70-85

    Research output: Scientific - peer-reviewConference contribution

  39. 2011
  40. Published

    Applicability Analysis of Grid Security Mechanisms on Cloud Networking

    Khan, R., Komu, M. & Aura, T. 2011 2011 IEEE International Conference on Cloud and Service Computing (CSC2011), December 12-14, 2011, Hong Kong, China. p. nn

    Research output: Scientific - peer-reviewConference contribution

  41. Published

    Forwarding Anomalies in Bloom Filter-based Multicast

    Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J. 2011 INFOCOM IEEE INFOCOM 2011, Shanghai, China, April 10-15, 2011. p. 2399-2407 (IEEE INFOCOM)

    Research output: Scientific - peer-reviewConference contribution

  42. Published

    Performance Analysis of HIP Diet Exchange for WSN Security Establishment

    Nie, P., Vähä-Herttua, J., Aura, T. & Gurtov, A. 2011 The 7th Annual International Symposium on QoS and Security for Wireless and Mobile Networks 2011. Miami, FL, USA, Oct 31- Nov 04. MSWiM

    Research output: Scientific - peer-reviewConference contribution

  43. Published

    Security Analysis of Leap-of-Faith Protocols

    Pham, V. & Aura, T. 2011 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September 2011. George Kesidis, H. W. (ed.). London, UK: ICST

    Research output: Scientific - peer-reviewConference contribution

  44. 2010
  45. Published

    Can Hand-held Computers Still Be Better Smart Cards?

    Tamrakar, S., Ekberg, J-E., Laitinen, P., Asokan, N. & Aura, T. 2010 Intrust 2010 - The Second International Conference on Trusted Systems, Beijing, China, December 13-15, 2010. Chen, L. & Yung, M. (eds.). Beijing China: Chen, Liqun and Yung, Moti, p. 194-212

    Research output: Scientific - peer-reviewConference contribution

  46. Published

    Forwarding Anomalies in Bloom Filter Based Multicast

    Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J. 2010 Espoo, p. 9 (Tietoliikenne- ja tietoverkkotekniikan laitoksen raporttisarja; no. 6/2010)

    Research output: ProfessionalWorking paper

  47. Published

    How to share your favourite search result while preserving privacy and quality

    Danezis, G., Aura, T., Shuo, C. & Kiciman, E. 2010 Privacy Enhancing Technologies Symposium (PETS2010), Waterloo, Canada, July 2010. p. 273-290

    Research output: Scientific - peer-reviewConference contribution

  48. Published

    Symbian OS Platform Security Model

    Li, B., Reshetova, E. & Aura, T. 2010 In : ;login: The USENIX Magazine. 35, 4

    Research output: ScientificArticle

  49. 2009
  50. Published

    Privacy-preserving 802.11 access-point discovery

    Lindqvist, J., Aura, T., Danezis, G., Koponen, T., Myllyniemi, A., Mäki, J. & Roe, M. 2009 ACM conference on Wireless network security (WiSec). David Basin, S. C. (ed.). New York, NY, USA: ACM, p. 123-130

    Research output: Scientific - peer-reviewConference contribution

  51. 2008
  52. Published

    Chattering Laptops

    Aura, T., Lindqvist, J., Roe, M. & Mohammed, A. 2008 8th Privacy Enhancing Technologies Symposium (PETS) Leuven, Belgium, July 23-25, 2008.. Springer Berlin / Heidelberg, Germany, p. 167-186

    Research output: Scientific - peer-reviewConference contribution

  53. 2005
  54. Published

    Analysis of the HIP Base Exchagne Protocol

    Aura, T., Nagarajan, A. & Gurtov, A. 2005 10th Australasian Conference on Information Security and Privacy Brisbane, Australia Heinäkuussa 4-6 päivä, 2005. Colin Boyd, J. M. G. N. (ed.).

    Research output: Scientific - peer-reviewConference contribution

  55. 2002
  56. Published

    Towards a Survivable Security Architecture for Ad-Hoc Networks

    Aura, T. & Mäki, S. 2002 9th International Workshop on Security Protocols, Cambridge, UK, April 25-27, 2001. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 63-73

    Research output: Scientific - peer-reviewConference contribution

  57. 2001
  58. Published

    DOS-Resistant Authentication with Client Puzzles

    Aura, T., Nikander, P. & Leiwo, J. 2001 8th International Workshop on Security Protocols, Cambridge, UK, April 3-5, 2000. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 170-177

    Research output: Scientific - peer-reviewConference contribution

  59. Published

    DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)

    Aura, T. 2001 8th International Workshop on Security Protocols, Cambridge, UK, April 3-5, 2000. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 178-181

    Research output: Scientific - peer-reviewConference contribution

  60. 2000
  61. Published

    A causal semantics for time Petri nets

    Aura, T. & Lilius, J. 2000 In : Theoretical Computer Science. 243, 1-2, p. 409-447

    Research output: Scientific - peer-reviewArticle

  62. Published

    Analyzing single-server network inhibition

    Aura, T., Bishop, M. & Sniegowski, D. 2000 The 2000 IEEE Computer Security Foundations Workshop, Cambridge, UK, July 2000. Los Alamitos CA, USA, p. 108-117

    Research output: Scientific - peer-reviewConference contribution

  63. Published

    Authorization and Availability - Aspects of Open Network Security

    Aura, T. 2000 Espoo, p. 42 (Helsinki University of Technology, Laboratory for Theoretical Computer Science, Research Reports; no. HUT-TCS-A64)

    Research output: ProfessionalWorking paper

  64. Published

    Privacy and Accountability in Certificate Systems

    Aura, T. & Ellison, C. 2000 Espoo, p. 17 (Helsinki University of Technology, Laboratory for Theoretical Computer Science, Research Reports; no. HUT-TCS-A61)

    Research output: ProfessionalWorking paper

  65. Published

    Robust Membership Management for Ad-hoc Groups

    Mäki, S., Aura, T. & Hietalahti, M. 2000 Thr 5th Nordic Workshop on Secure IT Systems, Reykjavik, Icleand, October 12-13, 2000. Erlingsson, U. (ed.). Reykjavik: Reykjavik University, p. 151-168

    Research output: Scientific - peer-reviewConference contribution

Previous 1 2 Next

ID: 43163