Tuomas Aura

Professor

Research outputs

  1. 2017
  2. Published

    A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V. 2 Mar 2017 Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 144-147 4 p.

    Research output: Scientific - peer-reviewConference contribution

  3. 2016
  4. Published

    We know where you are!

    Rao, S. P., Oliver, I., Holtmanns, S. & Aura, T. 2 Aug 2016 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016. Vol. 2016-August, p. 277-293 17 p. 7529440

    Research output: Scientific - peer-reviewConference contribution

  5. Published

    An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T. 30 Jun 2016 Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers Inc., p. 281-288 8 p. 7502823

    Research output: Scientific - peer-reviewConference contribution

  6. Published

    Domain Isolation in a Multi-tenant Software-Defined Network

    Ranjbar, A., Antikainen, M. & Aura, T. 10 Mar 2016 Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 16-25 10 p. 7431391

    Research output: Scientific - peer-reviewConference contribution

  7. Published
  8. Published

    Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V. 2016 Proceedings of the 10th European Conference on Software Architecture Workshops. ACM

    Research output: Scientific - peer-reviewConference contribution

  9. Published

    The Black Mark Beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppänen, V. 2016 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW). Younas, M., Awan & ElHaddad, J. (eds.). IEEE, p. 264-269 6 p.

    Research output: Scientific - peer-reviewConference contribution

  10. 2015
  11. Published

    Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

    Rao, S. P., Holtmanns, S., Oliver, I. & Aura, T. 2 Dec 2015 Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Institute of Electrical and Electronics Engineers Inc., Vol. 1, p. 1171-1176 6 p. 7345408

    Research output: Scientific - peer-reviewConference contribution

  12. Published

    Commitment-based device-pairing protocol with synchronized drawings and comparison metrics

    Antikainen, M., Sethi, M., Matetic, S. & Aura, T. 2015 In : PERVASIVE AND MOBILE COMPUTING. 16, Part B, p. 205-219

    Research output: Scientific - peer-reviewArticle

  13. Published

    Electronic Citizen Identities and Strong Authentication

    Suoranta, S., Haataja, L. & Aura, T. 2015 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015. Buchegger, S. & Dam, M. (eds.). p. 213-230

    Research output: Scientific - peer-reviewConference contribution

  14. Published

    Flexible Management of Cloud-Connected Digital Signage

    Sethi, M., Lijding, M., Di Francesco, M. & Aura, T. 2015 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), Beijing, China, 10-14 August 2015. IEEE, p. 205-212

    Research output: Scientific - peer-reviewConference contribution

  15. Published

    Flooding DDoS Mitigation and Traffic Management with Software Defined Networking

    Kalliola, A., Lee, K., Lee, H. & Aura, T. 2015 IEEE 4th International Conference on Cloud Networking (CloudNet), 5-7 October 2015, Niagara Falls, Canada. IEEE, p. 248-254

    Research output: Scientific - peer-reviewConference contribution

  16. Published

    Secure and Low-Power Authentication for Resource-Constrained Devices

    Sethi, M., Kortoci, P., Di Francesco, M. & Aura, T. 2015 5th International Conference on the Internet of Things (IoT), 26-28 October 2015, Seoul, South Korea. p. 30-36

    Research output: Scientific - peer-reviewConference contribution

  17. 2014
  18. Published

    Adaptive and context-aware privacy preservation exploiting user interactions in smart environments

    Pallapa, G., Das, S. K., Di Francesco, M. & Aura, T. 2014 In : PERVASIVE AND MOBILE COMPUTING. 12, n/a, p. 232-243

    Research output: Scientific - peer-reviewArticle

  19. Published

    Commitment-based device pairing with synchronized drawing

    Sethi, M., Antikainen, M. & Aura, T. 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom 2014), Budapest, Hungary, March 24-28, 2014. IEEE

    Research output: Scientific - peer-reviewConference contribution

  20. Published

    Denial-of-Service Attacks in Bloom-Filter-Based Forwarding

    Antikainen, M., Aura, T. & Särelä, M. 2014 In : IEEE-ACM TRANSACTIONS ON NETWORKING. 22, 5, p. 1463-1476

    Research output: Scientific - peer-reviewArticle

  21. Published

    Denial-of-Service Mitigation for Internet Services

    Kalliola, A., Aura, T. & Šcepanovic, S. 2014 Nordic Conference on Secure IT Systems, Tromsø, Norway, October 15-17, 2014. Bernsmed, K. & Fischer-Hübner, S. (eds.). Springer International Publishing, p. 213-228

    Research output: Scientific - peer-reviewConference contribution

  22. Published

    Logout in single sign-on systems: problems and solutions.

    Suoranta, S., Manzoor, K., Tontti, A., Ruuskanen, J. & Aura, T. 2014 In : Journal of Information Security and Applications (JISA). 19, 1, p. 61-77

    Research output: Scientific - peer-reviewArticle

  23. Published

    MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies

    Oat, E., Di Francesco, M. & Aura, T. 2014 The first IEEE Workshop on Developing Applications for Pervasive Display Networks (PD-Apps '14), Budapest, Hungary. Budapest, Hungary, p. 506-511

    Research output: Scientific - peer-reviewConference contribution

  24. Published

    Secure Bootstrapping of Cloud-Managed Ubiquitous Displays

    Sethi, M., Oat, E., Di Francesco, M. & Aura, T. 2014 The 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Seattle, WA, USA. p. 739-750

    Research output: Scientific - peer-reviewConference contribution

  25. Published

    Spatially aware malware infection modeling framework.

    Kalliola, A. & Aura, T. 2014 The 14th IEEE International Conference on Computer and Information Technology (CIT 2014), Xi’an, China, September 11-13, 2014.

    Research output: Scientific - peer-reviewConference contribution

  26. Published

    Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch

    Antikainen, M., Aura, T. & Särelä, M. 2014 Nordic Conference on Secure IT Systems, Tromso, Norway, October 15-17, 2014. p. 229-244

    Research output: Scientific - peer-reviewConference contribution

  27. 2013
  28. Published

    Logout in Single Sign-on Systems

    Suoranta, S., Tontti, A., Ruuskanen, J. & Aura, T. 2013 Policies and Research in Identity Management, Third IFIP WG 11.6 Working Conference, IDMAN 2013,London, UK, April 2013. Simone Fischer-Hübner, E. D. L. (ed.). p. 147-160

    Research output: Scientific - peer-reviewConference contribution

  29. 2012
  30. Published
  31. Published

    Scaling Bloom filter based multicast with hierarchical tree splitting

    Rizvi, S., Zahemszky, A. & Aura, T. 2012 ICC IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012. IEEE, p. 2790-2795

    Research output: Scientific - peer-reviewConference contribution

  32. Published

    Strong Authentication with Mobile Phone

    Suoranta, S., Andrade, A. & Aura, T. 2012 Information Security, 15th International Conference, ISC 2012; Passau, Germany; September 2012. Gollmann, D. & Freiling, F. C. (eds.). p. 70-85

    Research output: Scientific - peer-reviewConference contribution

  33. 2011
  34. Published

    Applicability Analysis of Grid Security Mechanisms on Cloud Networking

    Khan, R., Komu, M. & Aura, T. 2011 2011 IEEE International Conference on Cloud and Service Computing (CSC2011), December 12-14, 2011, Hong Kong, China. p. nn

    Research output: Scientific - peer-reviewConference contribution

  35. Published

    Forwarding Anomalies in Bloom Filter-based Multicast

    Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J. 2011 INFOCOM IEEE INFOCOM 2011, Shanghai, China, April 10-15, 2011. p. 2399-2407 (IEEE INFOCOM)

    Research output: Scientific - peer-reviewConference contribution

  36. Published

    Performance Analysis of HIP Diet Exchange for WSN Security Establishment

    Nie, P., Vähä-Herttua, J., Aura, T. & Gurtov, A. 2011 The 7th Annual International Symposium on QoS and Security for Wireless and Mobile Networks 2011. Miami, FL, USA, Oct 31- Nov 04. MSWiM

    Research output: Scientific - peer-reviewConference contribution

  37. Published

    Security Analysis of Leap-of-Faith Protocols

    Pham, V. & Aura, T. 2011 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September 2011. George Kesidis, H. W. (ed.). London, UK: ICST

    Research output: Scientific - peer-reviewConference contribution

  38. 2010
  39. Published

    Can Hand-held Computers Still Be Better Smart Cards?

    Tamrakar, S., Ekberg, J-E., Laitinen, P., Asokan, N. & Aura, T. 2010 Intrust 2010 - The Second International Conference on Trusted Systems, Beijing, China, December 13-15, 2010. Chen, L. & Yung, M. (eds.). Beijing China: Chen, Liqun and Yung, Moti, p. 194-212

    Research output: Scientific - peer-reviewConference contribution

  40. Published

    Forwarding Anomalies in Bloom Filter Based Multicast

    Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J. 2010 Espoo, p. 9 (Tietoliikenne- ja tietoverkkotekniikan laitoksen raporttisarja; no. 6/2010)

    Research output: ProfessionalWorking paper

  41. Published

    How to share your favourite search result while preserving privacy and quality

    Danezis, G., Aura, T., Shuo, C. & Kiciman, E. 2010 Privacy Enhancing Technologies Symposium (PETS2010), Waterloo, Canada, July 2010. p. 273-290

    Research output: Scientific - peer-reviewConference contribution

  42. Published

    Symbian OS Platform Security Model

    Li, B., Reshetova, E. & Aura, T. 2010 In : ;login: The USENIX Magazine. 35, 4

    Research output: ScientificArticle

  43. 2009
  44. Published

    Privacy-preserving 802.11 access-point discovery

    Lindqvist, J., Aura, T., Danezis, G., Koponen, T., Myllyniemi, A., Mäki, J. & Roe, M. 2009 ACM conference on Wireless network security (WiSec). David Basin, S. C. (ed.). New York, NY, USA: ACM, p. 123-130

    Research output: Scientific - peer-reviewConference contribution

  45. 2008
  46. Published

    Chattering Laptops

    Aura, T., Lindqvist, J., Roe, M. & Mohammed, A. 2008 8th Privacy Enhancing Technologies Symposium (PETS) Leuven, Belgium, July 23-25, 2008.. Springer Berlin / Heidelberg, Germany, p. 167-186

    Research output: Scientific - peer-reviewConference contribution

  47. 2005
  48. Published

    Analysis of the HIP Base Exchagne Protocol

    Aura, T., Nagarajan, A. & Gurtov, A. 2005 10th Australasian Conference on Information Security and Privacy Brisbane, Australia Heinäkuussa 4-6 päivä, 2005. Colin Boyd, J. M. G. N. (ed.).

    Research output: Scientific - peer-reviewConference contribution

  49. 2002
  50. Published

    Towards a Survivable Security Architecture for Ad-Hoc Networks

    Aura, T. & Mäki, S. 2002 9th International Workshop on Security Protocols, Cambridge, UK, April 25-27, 2001. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 63-73

    Research output: Scientific - peer-reviewConference contribution

  51. 2001
  52. Published

    DOS-Resistant Authentication with Client Puzzles

    Aura, T., Nikander, P. & Leiwo, J. 2001 8th International Workshop on Security Protocols, Cambridge, UK, April 3-5, 2000. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 170-177

    Research output: Scientific - peer-reviewConference contribution

  53. Published

    DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)

    Aura, T. 2001 8th International Workshop on Security Protocols, Cambridge, UK, April 3-5, 2000. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 178-181

    Research output: Scientific - peer-reviewConference contribution

  54. 2000
  55. Published

    A causal semantics for time Petri nets

    Aura, T. & Lilius, J. 2000 In : Theoretical Computer Science. 243, 1-2, p. 409-447

    Research output: Scientific - peer-reviewArticle

  56. Published

    Analyzing single-server network inhibition

    Aura, T., Bishop, M. & Sniegowski, D. 2000 The 2000 IEEE Computer Security Foundations Workshop, Cambridge, UK, July 2000. Los Alamitos CA, USA, p. 108-117

    Research output: Scientific - peer-reviewConference contribution

  57. Published

    Authorization and Availability - Aspects of Open Network Security

    Aura, T. 2000 Espoo, p. 42 (Helsinki University of Technology, Laboratory for Theoretical Computer Science, Research Reports; no. HUT-TCS-A64)

    Research output: ProfessionalWorking paper

  58. Published

    Privacy and Accountability in Certificate Systems

    Aura, T. & Ellison, C. 2000 Espoo, p. 17 (Helsinki University of Technology, Laboratory for Theoretical Computer Science, Research Reports; no. HUT-TCS-A61)

    Research output: ProfessionalWorking paper

  59. Published

    Robust Membership Management for Ad-hoc Groups

    Mäki, S., Aura, T. & Hietalahti, M. 2000 Thr 5th Nordic Workshop on Secure IT Systems, Reykjavik, Icleand, October 12-13, 2000. Erlingsson, U. (ed.). Reykjavik: Reykjavik University, p. 151-168

    Research output: Scientific - peer-reviewConference contribution

  60. Published

    Towards network denial of service resistant protocols

    Leiwo, J., Nikander, P. & Aura, T. 2000 Sixteenth Annual Working Conference on Information Security, Beijing, China, August 2000. Qing, S. & Eloff, J. H. P. (eds.). Boston MA, USA, p. 10

    Research output: Scientific - peer-reviewConference contribution

  61. Published

    Using conservation of flow as a security mechanism in network protocols

    Hughes, J., Aura, T. & Bishop, M. 2000 The 2000 IEEE Symposium on Security and Privacy, Oakland CA, USA, May 2000. Los Alamitos CA, USA, p. 132-141

    Research output: Scientific - peer-reviewConference contribution

  62. 1999
  63. Published

    Distributed access-rights management with delegation certificates

    Aura, T. 1999 Secure Internet Programming: Security Issues for Distributed and Mobile Objects. Vitek, J. & Jensen, C. (eds.). Berlin, p. 211-235

    Research output: Scientific - peer-reviewChapter

  64. Published

    Software license management with smart cards

    Aura, T. & Gollmann, D. 1999 USENIX Workshop on Smartcard Technology, Chicago, May 1999. USENIX Association, p. 75-85

    Research output: Scientific - peer-reviewConference contribution

  65. 1998
  66. Published

    Delegation-based access control for intelligent network services

    Aura, T., Koponen, P. & Räsänen, J. 1998 ECOOP Workshop on Distributed Object Security, Brussels, Belgium, July 1998. France: Unite de Recherche INRIA

    Research output: Scientific - peer-reviewConference contribution

Previous 1 2 Next

ID: 43163