Filter
Conference article in proceedings

Search results

  • 2025

    Misbinding Raw Public Keys to Identities in TLS

    Moustafa, M., Sethi, M. & Aura, T., 28 Jan 2025, Secure IT Systems - 29th Nordic Conference, NordSec 2024, Proceedings. Horn Iwaya, L., Kamm, L., Martucci, L. & Pulls, T. (eds.). Springer, p. 62-79 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15396 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • 2023

    Analyzing Microservice Connectivity with Kubesonde

    Bufalino, J., Di Francesco, M. & Aura, T., 30 Nov 2023, ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Chandra, S., Blincoe, K. & Tonella, P. (eds.). New York: ACM, p. 2038–2043 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    80 Downloads (Pure)
  • 2021

    Credential Provisioning and Device Configuration with EAP

    Boire, S., Akgün, T., Ginzboorg, P., Laitinen, P., Tamrakar, S. & Aura, T., 22 Nov 2021, MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access. New York, NY, USA: ACM, p. 87–96 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    146 Downloads (Pure)
  • 2020

    XSS Vulnerabilities in cloud-application add-ons

    Bui, T., Rao, S., Antikainen, M. & Aura, T., 5 Oct 2020, Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. ACM, p. 610-621 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    251 Downloads (Pure)
  • 2019

    Analysis of topology poisoning attacks in software-defined networking

    Bui, T., Antikainen, M. & Aura, T., 13 Nov 2019, Secure IT Systems - 24th Nordic Conference, NordSec 2019, Proceedings. Askarov, A., Hansen, R. R. & Rafnsson, W. (eds.). Springer, p. 87-102 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11875 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • Client-Side Vulnerabilities in Commercial VPNs

    Rao, S., Bui, T., Antikainen, M. & Aura, T., 2019, Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. Springer, p. 103-119 17 p. (Lecture Notes in Computer Science; vol. 11875).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Misbinding attacks on secure device pairing and bootstrapping

    Sethi, M., Peltonen, A. & Aura, T., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. ACM, p. 453-464 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    239 Downloads (Pure)
  • Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet

    Bui, T., Rao, S., Antikainen, M. & Aura, T., 25 Mar 2019, Proceedings of the 12th European Workshop on Systems Security, EuroSec 2019. ACM, p. 6 3

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    File
    10 Citations (Scopus)
    510 Downloads (Pure)
  • Watch Your Step! Detecting Stepping Stones in Programmable Networks

    Bhattacherjee, D., Gurtov, A. & Aura, T., 1 May 2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 7 p. 8761731. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
  • 2018

    Application of Public Ledgers to Revocation in Distributed Access Control

    Bui, T. & Aura, T., 2018, Information and Communications Security: ICICS 2018. Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z. & Meddahi, A. (eds.). Cham: Springer, p. 781-792 12 p. (Lecture notes in computer science; vol. 11149).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    6 Citations (Scopus)
  • Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer

    Bui, T., Rao, S. P., Antikainen, M., Bojan, V. M. & Aura, T., 2018, Proceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA. Baltimore, MD: USENIX -The Advanced Computing Systems Association, p. 1511-1525 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    162 Downloads (Pure)
  • Security wrapper orchestration in cloud

    Kalliola, A., Lal, S., Ahola, K., Oliver, I., Miche, Y. & Aura, T., 27 Aug 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. ACM, 3232853

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure

    Ahmed, A. S. & Aura, T., 5 Sept 2018, Proceedings -17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 104-111 8 p. 8455894. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    14 Citations (Scopus)
  • 2017

    A Large-Scale Analysis of Download Portals and Freeware Installers

    Geniola, A., Antikainen, M. & Aura, T., 2017, Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings. Lipmaa, H., Mitrokotsa, A. & Matulevičius, R. (eds.). Cham: Springer, p. 209-225 17 p. (Lecture Notes in Computer Science; vol. 10674).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2 Mar 2017, Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. IEEE, p. 144-147 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
  • SynAPTIC: Secure and persistent connectivity for containers

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 10 Jul 2017, Proceedings - 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. IEEE, p. 262-267 6 p. 7973711

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    12 Citations (Scopus)
  • 2016

    An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

    Ranjbar, A., Komu, M., Salmela, P. & Aura, T., 30 Jun 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, p. 281-288 8 p. 7502823

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    25 Citations (Scopus)
  • Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppanen, V., 2016, Proceedings of the 10th European Conference on Software Architecture Workshops. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Domain Isolation in a Multi-tenant Software-Defined Network

    Ranjbar, A., Antikainen, M. & Aura, T., 10 Mar 2016, Proceedings - 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015. IEEE, p. 16-25 10 p. 7431391

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    8 Citations (Scopus)
  • The Black Mark Beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs

    Ruohonen, J., Scepanovic, S., Hyrynsalmi, S., Mishkovski, I., Aura, T. & Leppänen, V., 2016, 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW). Younas, M., Awan & ElHaddad, J. (eds.). IEEE, p. 264-269 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
  • We know where you are!

    Rao, S. P., Oliver, I., Holtmanns, S. & Aura, T., 2 Aug 2016, 2016 8th International Conference on Cyber Conflict: Cyber Power, CyCon 2016. NATO Cooperative Cyber Defence Centre of Excellence, Vol. 2016-August. p. 277-293 17 p. 7529440

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    10 Citations (Scopus)
  • 2015

    Electronic Citizen Identities and Strong Authentication

    Suoranta, S., Haataja, L. & Aura, T., 2015, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015. Buchegger, S. & Dam, M. (eds.). Springer, p. 213-230

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • Flexible Management of Cloud-Connected Digital Signage

    Sethi, M., Lijding, M., Di Francesco, M. & Aura, T., 2015, 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC), Beijing, China, 10-14 August 2015. IEEE, p. 205-212

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • Flooding DDoS Mitigation and Traffic Management with Software Defined Networking

    Kalliola, A., Lee, K., Lee, H. & Aura, T., 2015, IEEE 4th International Conference on Cloud Networking (CloudNet), 5-7 October 2015, Niagara Falls, Canada. IEEE, p. 248-254

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    47 Citations (Scopus)
  • Secure and Low-Power Authentication for Resource-Constrained Devices

    Sethi, M., Kortoci, P., Di Francesco, M. & Aura, T., 2015, 5th International Conference on the Internet of Things (IoT), 26-28 October 2015, Seoul, South Korea. IEEE, p. 30-36

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    10 Citations (Scopus)
  • Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

    Rao, S. P., Holtmanns, S., Oliver, I. & Aura, T., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. IEEE, Vol. 1. p. 1171-1176 6 p. 7345408

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    20 Citations (Scopus)
  • 2014

    Commitment-based device pairing with synchronized drawing

    Sethi, M., Antikainen, M. & Aura, T., 2014, IEEE International Conference on Pervasive Computing and Communications (PerCom 2014), Budapest, Hungary, March 24-28, 2014. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    25 Citations (Scopus)
  • Denial-of-Service Mitigation for Internet Services

    Kalliola, A., Aura, T. & Šcepanovic, S., 2014, Nordic Conference on Secure IT Systems, Tromsø, Norway, October 15-17, 2014. Bernsmed, K. & Fischer-Hübner, S. (eds.). Springer, p. 213-228

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    4 Citations (Scopus)
  • MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies

    Oat, E., Di Francesco, M. & Aura, T., 2014, The first IEEE Workshop on Developing Applications for Pervasive Display Networks (PD-Apps '14), Budapest, Hungary. Budapest, Hungary, p. 506-511

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    13 Citations (Scopus)
  • Secure Bootstrapping of Cloud-Managed Ubiquitous Displays

    Sethi, M., Oat, E., Di Francesco, M. & Aura, T., 2014, The 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), Seattle, WA, USA. p. 739-750

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    15 Citations (Scopus)
  • Spatially aware malware infection modeling framework.

    Kalliola, A. & Aura, T., 2014, The 14th IEEE International Conference on Computer and Information Technology (CIT 2014), Xi’an, China, September 11-13, 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch

    Antikainen, M., Aura, T. & Särelä, M., 2014, Nordic Conference on Secure IT Systems, Tromso, Norway, October 15-17, 2014. Springer, p. 229-244

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    83 Citations (Scopus)
  • 2013

    Logout in Single Sign-on Systems

    Suoranta, S., Tontti, A., Ruuskanen, J. & Aura, T., 2013, Policies and Research in Identity Management, Third IFIP WG 11.6 Working Conference, IDMAN 2013,London, UK, April 2013. Simone Fischer-Hübner, E. D. L. (ed.). Springer, p. 147-160

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2012

    Scaling Bloom filter based multicast with hierarchical tree splitting

    Rizvi, S., Zahemszky, A. & Aura, T., 2012, ICC IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012. IEEE, p. 2790-2795

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • Strong Authentication with Mobile Phone

    Suoranta, S., Andrade, A. & Aura, T., 2012, Information Security, 15th International Conference, ISC 2012; Passau, Germany; September 2012. Gollmann, D. & Freiling, F. C. (eds.). Springer, p. 70-85

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    5 Citations (Scopus)
  • 2011

    Applicability Analysis of Grid Security Mechanisms on Cloud Networking

    Khan, R., Komu, M. & Aura, T., 2011, 2011 IEEE International Conference on Cloud and Service Computing (CSC2011), December 12-14, 2011, Hong Kong, China. p. nn

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Forwarding Anomalies in Bloom Filter-based Multicast

    Särelä, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P. & Ott, J., 2011, INFOCOM IEEE INFOCOM 2011, Shanghai, China, April 10-15, 2011. p. 2399-2407 (IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    62 Citations (Scopus)
  • Performance Analysis of HIP Diet Exchange for WSN Security Establishment

    Nie, P., Vähä-Herttua, J., Aura, T. & Gurtov, A., 2011, The 7th Annual International Symposium on QoS and Security for Wireless and Mobile Networks 2011. Miami, FL, USA, Oct 31- Nov 04. MSWiM: ACM

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    22 Citations (Scopus)
  • Security Analysis of Leap-of-Faith Protocols

    Pham, V. & Aura, T., 2011, 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), London, UK, September 2011. George Kesidis, H. W. (ed.). London, UK: Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST)

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    7 Citations (Scopus)
  • 2010

    Can Hand-held Computers Still Be Better Smart Cards?

    Tamrakar, S., Ekberg, J.-E., Laitinen, P., Asokan, N. & Aura, T., 2010, Intrust 2010 - The Second International Conference on Trusted Systems, Beijing, China, December 13-15, 2010. Chen, L. & Yung, M. (eds.). Beijing China: Springer, p. 194-212

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • How to share your favourite search result while preserving privacy and quality

    Danezis, G., Aura, T., Shuo, C. & Kiciman, E., 2010, Privacy Enhancing Technologies Symposium (PETS2010), Waterloo, Canada, July 2010. Springer, p. 273-290

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    6 Citations (Scopus)
  • 2009

    Privacy-preserving 802.11 access-point discovery

    Lindqvist, J., Aura, T., Danezis, G., Koponen, T., Myllyniemi, A., Mäki, J. & Roe, M., 2009, ACM conference on Wireless network security (WiSec). David Basin, S. C. (ed.). New York, NY, USA: ACM, p. 123-130

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    32 Citations (Scopus)
  • 2008

    Chattering Laptops

    Aura, T., Lindqvist, J., Roe, M. & Mohammed, A., 2008, 8th Privacy Enhancing Technologies Symposium (PETS) Leuven, Belgium, July 23-25, 2008.. Springer Berlin / Heidelberg, Germany: Springer, p. 167-186

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    4 Citations (Scopus)
  • 2005

    Analysis of the HIP Base Exchagne Protocol

    Aura, T., Nagarajan, A. & Gurtov, A., 2005, 10th Australasian Conference on Information Security and Privacy Brisbane, Australia Heinäkuussa 4-6 päivä, 2005. Colin Boyd, J. M. G. N. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2004

    Effects of mobility and multihoming on transport-protocol security

    Aura, T., Nikander, P. & Camarillo, G., 16 Aug 2004, Proceedings - IEEE Symposium on Security and Privacy. Vol. 2004. p. 12-26 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    14 Citations (Scopus)
  • 2003

    Mobile IP version 6 (MIPv6) route optimization security design

    Nikander, P., Arkko, J., Aura, T. & Montenegr, G., 1 Dec 2003, IEEE Vehicular Technology Conference. 3 ed. IEEE, Vol. 58. p. 2004-2008 5 p. ( IEEE VTS Vehicular Technology Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    29 Citations (Scopus)
  • 2002

    Securing IPv6 neighbor and router discovery

    Arkko, J., Aura, T., Kempf, J., Mäntylä, V. M., Nikander, P. & Roe, M., 1 Dec 2002, Proceedings of the Workshop on Wireless Security. p. 77-86 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    47 Citations (Scopus)
  • Towards a Survivable Security Architecture for Ad-Hoc Networks

    Aura, T. & Mäki, S., 2002, 9th International Workshop on Security Protocols, Cambridge, UK, April 25-27, 2001. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer, p. 63-73

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2001

    DOS-Resistant Authentication with Client Puzzles

    Aura, T., Nikander, P. & Leiwo, J., 2001, 8th International Workshop on Security Protocols, Cambridge, UK, April 3-5, 2000. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer, p. 170-177

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)

    Aura, T., 2001, 8th International Workshop on Security Protocols, Cambridge, UK, April 3-5, 2000. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer, p. 178-181

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Your message has successfully been sent.
Your message was not sent due to an error.