19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Evaluation of Out-of-Band Channels for IoT Security

Latvala, S., Sethi, M. & Aura, T., Jan 2020, In : SN Computer Science. 1, 18.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
16 Downloads (Pure)

Formal verification of misbinding attacks on secure device pairing and bootstrapping

Peltonen, A., Sethi, M. & Aura, T., 1 Apr 2020, In : Journal of Information Security and Applications. 51, 102461.

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
10 Downloads (Pure)
2019

Analysis of topology poisoning attacks in software-defined networking

Bui, T., Antikainen, M. & Aura, T., 13 Nov 2019, Secure IT Systems - 24th Nordic Conference, NordSec 2019, Proceedings. Askarov, A., Hansen, R. R. & Rafnsson, W. (eds.). p. 87-102 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11875 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Client-Side Vulnerabilities in Commercial VPNs

Rao, S., Bui, T., Antikainen, M. & Aura, T., 2019, Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. p. 103-119 17 p. (Lecture Notes in Computer Science; vol. 11875).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Misbinding attacks on secure device pairing and bootstrapping

Sethi, M., Peltonen, A. & Aura, T., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. ACM, p. 453-464 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Open Access
File
100 Downloads (Pure)

Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet

Bui, T., Rao, S., Antikainen, M. & Aura, T., 25 Mar 2019, Proceedings of the 12th European Workshop on Systems Security, EuroSec 2019. ACM, p. 6 3

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

File
79 Downloads (Pure)

Watch Your Step! Detecting Stepping Stones in Programmable Networks

Bhattacherjee, D., Gurtov, A. & Aura, T., 1 May 2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 7 p. 8761731. (IEEE International Conference on Communications; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

2018

Application of Public Ledgers to Revocation in Distributed Access Control

Bui, T. & Aura, T., 2018, Information and Communications Security: ICICS 2018. Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z. & Meddahi, A. (eds.). Cham, p. 781-792 12 p. (Lecture notes in computer science; vol. 11149).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)

Automated analysis of freeware installers promoted by download portals

Geniola, A., Antikainen, M. & Aura, T., 1 Aug 2018, In : Computers and Security. 77, p. 209-225 17 p.

Research output: Contribution to journalReview ArticleScientificpeer-review

Open Access
File
242 Downloads (Pure)

Learning Flow Characteristics Distributions with ELM for Distributed Denial of Service Detection and Mitigation

Kalliola, A., Miche, Y., Oliver, I., Holtmanns, S., Atli, B., Lendasse, A., Bjork, K-M., Akusok, A. & Aura, T., 2018, Proceedings of ELM-2016. Cao, J., Cambria, E., Lendasse, A., Miche, Y. & Vong, C. M. (eds.). Cham, p. 129-143 15 p. (Proceedings in Adaptation, Learning and Optimization; vol. 9).

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer

Bui, T., Rao, S. P., Antikainen, M., Bojan, V. M. & Aura, T., 2018, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA. Baltimore, MD: USENIX : THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 1511-1525 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Open Access
File
20 Downloads (Pure)

Security wrapper orchestration in cloud

Kalliola, A., Lal, S., Ahola, K., Oliver, I., Miche, Y. & Aura, T., 27 Aug 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. ACM, 3232853

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)

Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure

Ahmed, A. S. & Aura, T., 5 Sep 2018, Proceedings -17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 104-111 8 p. 8455894. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

3 Citations (Scopus)
2017

A Large-Scale Analysis of Download Portals and Freeware Installers

Geniola, A., Antikainen, M. & Aura, T., 2017, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham, p. 209-225 17 p. (Lecture Notes in Computer Science; vol. 10674).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)

A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet

Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2 Mar 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. IEEE, p. 144-147 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)

GPASS: A Password Manager with Group-Based Access Control

Bui, T. & Aura, T., 2017, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham, p. 229-244 16 p. (Lecture Notes in Computer Science; vol. 10674).

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

Key Exchange with the Help of a Public Ledger

Bui, T. & Aura, T., 2017, Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Stajano, F., Anderson, J., Christianson, B. & Matyás, V. (eds.). Cham, p. 123-136 14 p. (Lecture Notes in Computer Science; vol. 10476).

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

2 Citations (Scopus)

Malware distributions and graph structure of the Web

Scepanovic, S., Mishkovski, I., Ruohonen, J., Ayala-Gómez, F., Aura, T. & Hyrynsalmi, S., 2017, In : arXiv.org. abs/1707.06071

Research output: Contribution to journalArticleScientific

SynAPTIC: Secure and persistent connectivity for containers

Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 10 Jul 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. IEEE, p. 262-267 6 p. 7973711

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

2 Citations (Scopus)
2016

An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 30 Jun 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, p. 281-288 8 p. 7502823

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

12 Citations (Scopus)

Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs

Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2016, Proceedings of the 10th European Conference on Software Architecture Workshops. ACM

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Domain Isolation in a Multi-tenant Software-Defined Network

Ranjbar, A., Antikainen, M. & Aura, T., 10 Mar 2016, Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015. IEEE, p. 16-25 10 p. 7431391

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

2 Citations (Scopus)

The Black Mark Beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs

Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppänen, V., 2016, 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW). Younas, M., Awan & ElHaddad, J. (eds.). IEEE, p. 264-269 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)

We know where you are!

Rao, S. P., Oliver, I., Holtmanns, S. & Aura, T., 2 Aug 2016, 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016. Vol. 2016-August. p. 277-293 17 p. 7529440

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

6 Citations (Scopus)
2015

Commitment-based device-pairing protocol with synchronized drawings and comparison metrics

Antikainen, M., Sethi, M., Matetic, S. & Aura, T., 2015, In : Pervasive and Mobile Computing. 16, Part B, p. 205-219

Research output: Contribution to journalArticleScientificpeer-review

Open Access
File
1 Citation (Scopus)
115 Downloads (Pure)

Electronic Citizen Identities and Strong Authentication

Suoranta, S., Haataja, L. & Aura, T., 2015, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015. Buchegger, S. & Dam, M. (eds.). p. 213-230

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Flexible Management of Cloud-Connected Digital Signage

Sethi, M., Lijding, M., Di Francesco, M. & Aura, T., 2015, 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), Beijing, China, 10-14 August 2015. IEEE, p. 205-212

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

2 Citations (Scopus)

Flooding DDoS Mitigation and Traffic Management with Software Defined Networking

Kalliola, A., Lee, K., Lee, H. & Aura, T., 2015, IEEE 4th International Conference on Cloud Networking (CloudNet), 5-7 October 2015, Niagara Falls, Canada. IEEE, p. 248-254

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

24 Citations (Scopus)

Secure and Low-Power Authentication for Resource-Constrained Devices

Sethi, M., Kortoci, P., Di Francesco, M. & Aura, T., 2015, 5th International Conference on the Internet of Things (IoT), 26-28 October 2015, Seoul, South Korea. IEEE Communications Society, p. 30-36

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

9 Citations (Scopus)

Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

Rao, S. P., Holtmanns, S., Oliver, I. & Aura, T., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. IEEE, Vol. 1. p. 1171-1176 6 p. 7345408

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

11 Citations (Scopus)
2014

Adaptive and context-aware privacy preservation exploiting user interactions in smart environments

Pallapa, G., Das, S. K., Di Francesco, M. & Aura, T., 2014, In : Pervasive and Mobile Computing. 12, n/a, p. 232-243

Research output: Contribution to journalArticleScientificpeer-review

14 Citations (Scopus)

Commitment-based device pairing with synchronized drawing

Sethi, M., Antikainen, M. & Aura, T., 2014, IEEE International Conference on Pervasive Computing and Communications (PerCom 2014), Budapest, Hungary, March 24-28, 2014. IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

15 Citations (Scopus)

Denial-of-Service Attacks in Bloom-Filter-Based Forwarding

Antikainen, M., Aura, T. & Särelä, M., 2014, In : IEEE-ACM TRANSACTIONS ON NETWORKING. 22, 5, p. 1463-1476

Research output: Contribution to journalArticleScientificpeer-review

23 Citations (Scopus)

Denial-of-Service Mitigation for Internet Services

Kalliola, A., Aura, T. & Šcepanovic, S., 2014, Nordic Conference on Secure IT Systems, Tromsø, Norway, October 15-17, 2014. Bernsmed, K. & Fischer-Hübner, S. (eds.). Springer International Publishing, p. 213-228

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)

Logout in single sign-on systems: problems and solutions.

Suoranta, S., Manzoor, K., Tontti, A., Ruuskanen, J. & Aura, T., 2014, In : Journal of Information Security and Applications (JISA). 19, 1, p. 61-77

Research output: Contribution to journalArticleScientificpeer-review

6 Citations (Scopus)

MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies

Oat, E., Di Francesco, M. & Aura, T., 2014, The first IEEE Workshop on Developing Applications for Pervasive Display Networks (PD-Apps '14), Budapest, Hungary. Budapest, Hungary, p. 506-511

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

12 Citations (Scopus)

Secure Bootstrapping of Cloud-Managed Ubiquitous Displays

Sethi, M., Oat, E., Di Francesco, M. & Aura, T., 2014, The 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Seattle, WA, USA. p. 739-750

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

9 Citations (Scopus)

Spatially aware malware infection modeling framework.

Kalliola, A. & Aura, T., 2014, The 14th IEEE International Conference on Computer and Information Technology (CIT 2014), Xi’an, China, September 11-13, 2014.

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch

Antikainen, M., Aura, T. & Särelä, M., 2014, Nordic Conference on Secure IT Systems, Tromso, Norway, October 15-17, 2014. p. 229-244

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

46 Citations (Scopus)
2013

Logout in Single Sign-on Systems

Suoranta, S., Tontti, A., Ruuskanen, J. & Aura, T., 2013, Policies and Research in Identity Management, Third IFIP WG 11.6 Working Conference, IDMAN 2013,London, UK, April 2013. Simone Fischer-Hübner, E. D. L. (ed.). p. 147-160

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Scaling Bloom filter based multicast with hierarchical tree splitting

Rizvi, S., Zahemszky, A. & Aura, T., 2012, ICC IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012. IEEE, p. 2790-2795

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

2 Citations (Scopus)

Strong Authentication with Mobile Phone

Suoranta, S., Andrade, A. & Aura, T., 2012, Information Security, 15th International Conference, ISC 2012; Passau, Germany; September 2012. Gollmann, D. & Freiling, F. C. (eds.). p. 70-85

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)
2011

Applicability Analysis of Grid Security Mechanisms on Cloud Networking

Khan, R., Komu, M. & Aura, T., 2011, 2011 IEEE International Conference on Cloud and Service Computing (CSC2011), December 12-14, 2011, Hong Kong, China. p. nn

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Forwarding Anomalies in Bloom Filter-based Multicast

Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J., 2011, INFOCOM IEEE INFOCOM 2011, Shanghai, China, April 10-15, 2011. p. 2399-2407 (IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

57 Citations (Scopus)

Performance Analysis of HIP Diet Exchange for WSN Security Establishment

Nie, P., Vähä-Herttua, J., Aura, T. & Gurtov, A., 2011, The 7th Annual International Symposium on QoS and Security for Wireless and Mobile Networks 2011. Miami, FL, USA, Oct 31- Nov 04. MSWiM: ACM

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

20 Citations (Scopus)

Security Analysis of Leap-of-Faith Protocols

Pham, V. & Aura, T., 2011, 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September 2011. George Kesidis, H. W. (ed.). London, UK: ICST

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)
2010

Can Hand-held Computers Still Be Better Smart Cards?

Tamrakar, S., Ekberg, J-E., Laitinen, P., Asokan, N. & Aura, T., 2010, Intrust 2010 - The Second International Conference on Trusted Systems, Beijing, China, December 13-15, 2010. Chen, L. & Yung, M. (eds.). Beijing China: Chen, Liqun and Yung, Moti, p. 194-212

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Forwarding Anomalies in Bloom Filter Based Multicast

Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J., 2010, Espoo, p. 9, (Tietoliikenne- ja tietoverkkotekniikan laitoksen raporttisarja; no. 6/2010).

Research output: Working paperProfessional

How to share your favourite search result while preserving privacy and quality

Danezis, G., Aura, T., Shuo, C. & Kiciman, E., 2010, Privacy Enhancing Technologies Symposium (PETS2010), Waterloo, Canada, July 2010. p. 273-290

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)