Tuomas Aura

Professor

Research outputs

  1. 2019
  2. Published

    Analysis of topology poisoning attacks in software-defined networking

    Bui, T., Antikainen, M. & Aura, T., 13 Nov 2019, Secure IT Systems - 24th Nordic Conference, NordSec 2019, Proceedings. Askarov, A., Hansen, R. R. & Rafnsson, W. (eds.). p. 87-102 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11875 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. Published

    Misbinding attacks on secure device pairing and bootstrapping

    Sethi, M., Peltonen, A. & Aura, T., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. ACM, p. 453-464 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  4. Published

    Watch Your Step! Detecting Stepping Stones in Programmable Networks

    Bhattacherjee, D., Gurtov, A. & Aura, T., 1 May 2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 7 p. 8761731. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. Published

    Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet

    Bui, T., Rao, S., Antikainen, M. & Aura, T., 25 Mar 2019, Proceedings of the 12th European Workshop on Systems Security, EuroSec 2019. ACM, p. 6 3

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  6. Published

    Client-Side Vulnerabilities in Commercial VPNs

    Rao, S., Bui, T., Antikainen, M. & Aura, T., 2019, Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. p. 103-119 17 p. (Lecture Notes in Computer Science; vol. 11875).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. 2018
  8. Published

    Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure

    Ahmed, A. S. & Aura, T., 5 Sep 2018, Proceedings -17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 104-111 8 p. 8455894. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  9. Published

    Security wrapper orchestration in cloud

    Kalliola, A., Lal, S., Ahola, K., Oliver, I., Miche, Y. & Aura, T., 27 Aug 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. ACM, 3232853

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  10. Published

    Automated analysis of freeware installers promoted by download portals

    Geniola, A., Antikainen, M. & Aura, T., 1 Aug 2018, In : Computers and Security. 77, p. 209-225 17 p.

    Research output: Contribution to journalReview ArticleScientificpeer-review

  11. Published

    Application of Public Ledgers to Revocation in Distributed Access Control

    Bui, T. & Aura, T., 2018, Information and Communications Security: ICICS 2018. Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z. & Meddahi, A. (eds.). Cham, p. 781-792 12 p. (Lecture notes in computer science; vol. 11149).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. Published

    Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and Mitigation

    Kalliola, A., Miche, Y., Oliver, I., Holtmanns, S., Atli, B., Lendasse, A., Bjork, K-M., Akusok, A. & Aura, T., 2018, Proceedings of ELM-2016. Cao, J., Cambria, E., Lendasse, A., Miche, Y. & Vong, C. M. (eds.). Cham, p. 129-143 15 p. (Proceedings in Adaptation, Learning and Optimization; vol. 9).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  13. Published

    Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer

    Bui, T., Rao, S. P., Antikainen, M., Bojan, V. M. & Aura, T., 2018, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA. Baltimore, MD: USENIX : THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 1511-1525 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  14. 2017
  15. Published

    SynAPTIC: Secure and persistent connectivity for containers

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 10 Jul 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. IEEE, p. 262-267 6 p. 7973711

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  16. Published

    A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2 Mar 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. IEEE, p. 144-147 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  17. Published

    A Large-Scale Analysis of Download Portals and Freeware Installers

    Geniola, A., Antikainen, M. & Aura, T., 2017, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham, p. 209-225 17 p. (Lecture Notes in Computer Science; vol. 10674).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  18. Published

    GPASS: A Password Manager with Group-Based Access Control

    Bui, T. & Aura, T., 2017, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham, p. 229-244 16 p. (Lecture Notes in Computer Science; vol. 10674).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  19. Published

    Key Exchange with the Help of a Public Ledger

    Bui, T. & Aura, T., 2017, Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Stajano, F., Anderson, J., Christianson, B. & Matyás, V. (eds.). Cham, p. 123-136 14 p. (Lecture Notes in Computer Science; vol. 10476).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  20. Published

    Malware distributions and graph structure of the Web

    Scepanovic, S., Mishkovski, I., Ruohonen, J., Ayala-Gómez, F., Aura, T. & Hyrynsalmi, S., 2017, In : arXiv.org. abs/1707.06071

    Research output: Contribution to journalArticleScientific

  21. Published

    Towards network denial of service resistant protocols

    Leiwo, J., Aura, T. & Nikander, P., 2017, In : IFIP Advances in Information and Communication Technology. 47, p. 301-310 10 p.

    Research output: Contribution to journalConference articleScientificpeer-review

  22. 2016
  23. Published

    We know where you are!

    Rao, S. P., Oliver, I., Holtmanns, S. & Aura, T., 2 Aug 2016, 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016. Vol. 2016-August. p. 277-293 17 p. 7529440

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  24. Published

    An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 30 Jun 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, p. 281-288 8 p. 7502823

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  25. Published

    Domain Isolation in a Multi-tenant Software-Defined Network

    Ranjbar, A., Antikainen, M. & Aura, T., 10 Mar 2016, Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015. IEEE, p. 16-25 10 p. 7431391

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  26. Published

    Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2016, Proceedings of the 10th European Conference on Software Architecture Workshops. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  27. Published

    The Black Mark Beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppänen, V., 2016, 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW). Younas, M., Awan & ElHaddad, J. (eds.). IEEE, p. 264-269 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  28. 2015
  29. Published

    Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

    Rao, S. P., Holtmanns, S., Oliver, I. & Aura, T., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. IEEE, Vol. 1. p. 1171-1176 6 p. 7345408

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  30. Published

    Commitment-based device-pairing protocol with synchronized drawings and comparison metrics

    Antikainen, M., Sethi, M., Matetic, S. & Aura, T., 2015, In : Pervasive and Mobile Computing. 16, Part B, p. 205-219

    Research output: Contribution to journalArticleScientificpeer-review

  31. Published

    Electronic Citizen Identities and Strong Authentication

    Suoranta, S., Haataja, L. & Aura, T., 2015, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015. Buchegger, S. & Dam, M. (eds.). p. 213-230

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  32. Published

    Flexible Management of Cloud-Connected Digital Signage

    Sethi, M., Lijding, M., Di Francesco, M. & Aura, T., 2015, 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), Beijing, China, 10-14 August 2015. IEEE, p. 205-212

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  33. Published

    Flooding DDoS Mitigation and Traffic Management with Software Defined Networking

    Kalliola, A., Lee, K., Lee, H. & Aura, T., 2015, IEEE 4th International Conference on Cloud Networking (CloudNet), 5-7 October 2015, Niagara Falls, Canada. IEEE, p. 248-254

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  34. Published

    Secure and Low-Power Authentication for Resource-Constrained Devices

    Sethi, M., Kortoci, P., Di Francesco, M. & Aura, T., 2015, 5th International Conference on the Internet of Things (IoT), 26-28 October 2015, Seoul, South Korea. IEEE Communications Society, p. 30-36

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  35. 2014
  36. Published

    Adaptive and context-aware privacy preservation exploiting user interactions in smart environments

    Pallapa, G., Das, S. K., Di Francesco, M. & Aura, T., 2014, In : Pervasive and Mobile Computing. 12, n/a, p. 232-243

    Research output: Contribution to journalArticleScientificpeer-review

  37. Published

    Commitment-based device pairing with synchronized drawing

    Sethi, M., Antikainen, M. & Aura, T., 2014, IEEE International Conference on Pervasive Computing and Communications (PerCom 2014), Budapest, Hungary, March 24-28, 2014. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  38. Published

    Denial-of-Service Attacks in Bloom-Filter-Based Forwarding

    Antikainen, M., Aura, T. & Särelä, M., 2014, In : IEEE-ACM TRANSACTIONS ON NETWORKING. 22, 5, p. 1463-1476

    Research output: Contribution to journalArticleScientificpeer-review

  39. Published

    Denial-of-Service Mitigation for Internet Services

    Kalliola, A., Aura, T. & Šcepanovic, S., 2014, Nordic Conference on Secure IT Systems, Tromsø, Norway, October 15-17, 2014. Bernsmed, K. & Fischer-Hübner, S. (eds.). Springer International Publishing, p. 213-228

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  40. Published

    Logout in single sign-on systems: problems and solutions.

    Suoranta, S., Manzoor, K., Tontti, A., Ruuskanen, J. & Aura, T., 2014, In : Journal of Information Security and Applications (JISA). 19, 1, p. 61-77

    Research output: Contribution to journalArticleScientificpeer-review

  41. Published

    MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies

    Oat, E., Di Francesco, M. & Aura, T., 2014, The first IEEE Workshop on Developing Applications for Pervasive Display Networks (PD-Apps '14), Budapest, Hungary. Budapest, Hungary, p. 506-511

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  42. Published

    Secure Bootstrapping of Cloud-Managed Ubiquitous Displays

    Sethi, M., Oat, E., Di Francesco, M. & Aura, T., 2014, The 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Seattle, WA, USA. p. 739-750

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  43. Published

    Spatially aware malware infection modeling framework.

    Kalliola, A. & Aura, T., 2014, The 14th IEEE International Conference on Computer and Information Technology (CIT 2014), Xi’an, China, September 11-13, 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  44. Published

    Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch

    Antikainen, M., Aura, T. & Särelä, M., 2014, Nordic Conference on Secure IT Systems, Tromso, Norway, October 15-17, 2014. p. 229-244

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  45. 2013
  46. Published

    Logout in Single Sign-on Systems

    Suoranta, S., Tontti, A., Ruuskanen, J. & Aura, T., 2013, Policies and Research in Identity Management, Third IFIP WG 11.6 Working Conference, IDMAN 2013,London, UK, April 2013. Simone Fischer-Hübner, E. D. L. (ed.). p. 147-160

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  47. 2012
  48. Published
  49. Published

    Scaling Bloom filter based multicast with hierarchical tree splitting

    Rizvi, S., Zahemszky, A. & Aura, T., 2012, ICC IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012. IEEE, p. 2790-2795

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  50. Published

    Strong Authentication with Mobile Phone

    Suoranta, S., Andrade, A. & Aura, T., 2012, Information Security, 15th International Conference, ISC 2012; Passau, Germany; September 2012. Gollmann, D. & Freiling, F. C. (eds.). p. 70-85

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  51. 2011
  52. Published

    Applicability Analysis of Grid Security Mechanisms on Cloud Networking

    Khan, R., Komu, M. & Aura, T., 2011, 2011 IEEE International Conference on Cloud and Service Computing (CSC2011), December 12-14, 2011, Hong Kong, China. p. nn

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  53. Published

    Forwarding Anomalies in Bloom Filter-based Multicast

    Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J., 2011, INFOCOM IEEE INFOCOM 2011, Shanghai, China, April 10-15, 2011. p. 2399-2407 (IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  54. Published

    Performance Analysis of HIP Diet Exchange for WSN Security Establishment

    Nie, P., Vähä-Herttua, J., Aura, T. & Gurtov, A., 2011, The 7th Annual International Symposium on QoS and Security for Wireless and Mobile Networks 2011. Miami, FL, USA, Oct 31- Nov 04. MSWiM: ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  55. Published

    Security Analysis of Leap-of-Faith Protocols

    Pham, V. & Aura, T., 2011, 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September 2011. George Kesidis, H. W. (ed.). London, UK: ICST

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  56. 2010
  57. Published

    Can Hand-held Computers Still Be Better Smart Cards?

    Tamrakar, S., Ekberg, J-E., Laitinen, P., Asokan, N. & Aura, T., 2010, Intrust 2010 - The Second International Conference on Trusted Systems, Beijing, China, December 13-15, 2010. Chen, L. & Yung, M. (eds.). Beijing China: Chen, Liqun and Yung, Moti, p. 194-212

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  58. Published

    Forwarding Anomalies in Bloom Filter Based Multicast

    Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J., 2010, Espoo, p. 9, (Tietoliikenne- ja tietoverkkotekniikan laitoksen raporttisarja; no. 6/2010).

    Research output: Working paperProfessional

  59. Published

    How to share your favourite search result while preserving privacy and quality

    Danezis, G., Aura, T., Shuo, C. & Kiciman, E., 2010, Privacy Enhancing Technologies Symposium (PETS2010), Waterloo, Canada, July 2010. p. 273-290

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  60. Published

    Symbian OS Platform Security Model

    Li, B., Reshetova, E. & Aura, T., 2010, In : ;login: The USENIX Magazine. 35, 4

    Research output: Contribution to journalArticleScientific

Previous 1 2 Next

ID: 43163