


Остановите войну!
for scientists:
N. Asokan
Person information

- affiliation: Aalto University, Department of Computer Science and Engineering
- affiliation: University of Helsinki, Department of Computer Science
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j32]Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, Thomas Nyman:
Hardware Platform Security for Mobile Devices. Found. Trends Priv. Secur. 3(3-4): 214-394 (2022) - [j31]Jian Liu
, Peilun Li, Raymond Cheng, N. Asokan
, Dawn Song:
Parallel and Asynchronous Smart Contract Execution. IEEE Trans. Parallel Distributed Syst. 33(5): 1097-1108 (2022) - [c130]Buse Gul Atli Tekgul, N. Asokan:
On the Effectiveness of Dataset Watermarking. IWSPA@CODASPY 2022: 93-99 - [i70]Buse Gul Atli Tekgul, N. Asokan:
On the Effectiveness of Dataset Watermarking in Adversarial Settings. CoRR abs/2202.12506 (2022) - [i69]Hans Liljestrand, Carlos Chinea Perez, Rémi Denis-Courmont, Jan-Erik Ekberg, N. Asokan:
Color My World: Deterministic Tagging for Memory Safety. CoRR abs/2204.03781 (2022) - [i68]Owura Asare, Meiyappan Nagappan, N. Asokan:
Is GitHub's Copilot as Bad As Humans at Introducing Vulnerabilities in Code? CoRR abs/2204.04741 (2022) - [i67]Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking. CoRR abs/2204.09649 (2022) - [i66]Sebastian Szyller, N. Asokan:
Conflicting Interactions Among Protections Mechanisms for Machine Learning Models. CoRR abs/2207.01991 (2022) - 2021
- [j30]Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Trans. Priv. Secur. 24(4): 26:1-26:36 (2021) - [c129]Logan Blue, Samuel Marchal
, Patrick Traynor, N. Asokan
:
Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices. IoTDI 2021: 15-27 - [c128]Ron Deibert, N. Asokan, Thenusha Satsoruban:
Investigating targeted espionage: Methods, findings, implications. ISTAS 2021: 1 - [c127]Sebastian Szyller, Buse Gul Atli, Samuel Marchal
, N. Asokan:
DAWN: Dynamic Adversarial Watermarking of Neural Networks. ACM Multimedia 2021: 4417-4425 - [c126]Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:
Tutorial: Investigating Advanced Exploits for System Security Assurance. SecDev 2021: 3-4 - [c125]Buse G. A. Tekgul, Yuxi Xia, Samuel Marchal
, N. Asokan:
WAFFLE: Watermarking in Federated Learning. SRDS 2021: 310-320 - [c124]Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan:
PACStack: an Authenticated Call Stack. USENIX Security Symposium 2021: 357-374 - [i65]Sebastian Szyller, Vasisht Duddu, Tommi Gröndahl, N. Asokan:
Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks. CoRR abs/2104.12623 (2021) - [i64]Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan:
Real-time Attacks Against Deep Reinforcement Learning Policies. CoRR abs/2106.08746 (2021) - [i63]Vasisht Duddu, Sebastian Szyller, N. Asokan:
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning. CoRR abs/2112.02230 (2021) - 2020
- [j29]Mohammad Mannan, N. Asokan
:
Confronting the Limitations of Hardware-Assisted Security. IEEE Secur. Priv. 18(5): 6-7 (2020) - [j28]Tommi Gröndahl, N. Asokan:
Effective writing style transfer via combinatorial paraphrasing. Proc. Priv. Enhancing Technol. 2020(4): 175-195 (2020) - [c123]Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan:
A little goes a long way: Improving toxic language classification despite data scarcity. EMNLP (Findings) 2020: 2991-3009 - [i62]Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan:
WAFFLE: Watermarking in Federated Learning. CoRR abs/2008.07298 (2020) - [i61]Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan:
A little goes a long way: Improving toxic language classification despite data scarcity. CoRR abs/2009.12344 (2020)
2010 – 2019
- 2019
- [j27]Tommi Gröndahl
, N. Asokan
:
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? ACM Comput. Surv. 52(3): 45:1-45:36 (2019) - [j26]Samuel Marchal
, Markus Miettinen
, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan
:
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication. IEEE J. Sel. Areas Commun. 37(6): 1402-1412 (2019) - [j25]Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider
:
SoK: Modular and Efficient Private Decision Tree Evaluation. Proc. Priv. Enhancing Technol. 2019(2): 187-208 (2019) - [j24]Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan:
Circumventing Cryptographic Deniability with Remote Attestation. Proc. Priv. Enhancing Technol. 2019(3): 350-369 (2019) - [j23]Jian Liu
, Wenting Li
, Ghassan O. Karame
, N. Asokan
:
Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing. IEEE Trans. Computers 68(1): 139-151 (2019) - [j22]Babins Shrestha
, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan
:
Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Trans. Mob. Comput. 18(2): 444-457 (2019) - [c122]Mika Juuti, Buse Gul Atli, N. Asokan
:
Making Targeted Black-box Evasion Attacks Effective and Efficient. AISec@CCS 2019: 83-94 - [c121]Fritz Alder
, N. Asokan
, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CCSW@CCS 2019: 185-199 - [c120]N. Asokan:
Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead. CCS 2019: 1687 - [c119]Thomas Nyman
, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan
, Ahmad-Reza Sadeghi:
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks. DAC 2019: 63 - [c118]Hans Liljestrand, Thomas Nyman
, Jan-Erik Ekberg, N. Asokan
:
Authenticated Call Stack. DAC 2019: 223 - [c117]Andrew Paverd, Marcus Völp
, Ferdinand Brasser, Matthias Schunter, N. Asokan
, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c116]Mika Juuti, Sebastian Szyller, Samuel Marchal
, N. Asokan
:
PRADA: Protecting Against DNN Model Stealing Attacks. EuroS&P 2019: 512-527 - [c115]Thien Duc Nguyen, Samuel Marchal
, Markus Miettinen, Hossein Fereidooni, N. Asokan
, Ahmad-Reza Sadeghi:
DÏoT: A Federated Self-learning Anomaly Detection System for IoT. ICDCS 2019: 756-767 - [c114]Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma
, N. Asokan
:
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification. PerCom 2019: 1-9 - [c113]Long Cheng, Hans Liljestrand, Md. Salman Ahmed
, Thomas Nyman, Trent Jaeger, N. Asokan
, Danfeng Yao
:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - [c112]Hans Liljestrand
, Zaheer Gauhar, Thomas Nyman
, Jan-Erik Ekberg, N. Asokan
:
Protecting the stack with PACed canaries. SysTEX@SOSP 2019: 4:1-4:6 - [c111]Lachlan J. Gunn, Jian Liu, Bruno Vavala, N. Asokan
:
Making Speculative BFT Resilient with Trusted Monotonic Counters. SRDS 2019: 133-142 - [c110]Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. USENIX Security Symposium 2019: 177-194 - [i60]Long Cheng, Hans Liljestrand
, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan:
Exploitation Techniques and Defenses for Data-Oriented Attacks. CoRR abs/1902.08359 (2019) - [i59]Tommi Gröndahl, N. Asokan:
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? CoRR abs/1902.08939 (2019) - [i58]Tommi Gröndahl, N. Asokan:
Using logical form encodings for unsupervised linguistic transformation: Theory and applications. CoRR abs/1902.09381 (2019) - [i57]Hans Liljestrand
, Thomas Nyman, Lachlan J. Gunn
, Jan-Erik Ekberg, N. Asokan:
PACStack: an Authenticated Call Stack. CoRR abs/1905.10242 (2019) - [i56]Lachlan J. Gunn
, Jian Liu, Bruno Vavala, N. Asokan:
Making Speculative BFT Resilient with Trusted Monotonic Counters. CoRR abs/1905.10255 (2019) - [i55]Tommi Gröndahl, N. Asokan:
Effective writing style imitation via combinatorial paraphrasing. CoRR abs/1905.13464 (2019) - [i54]Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan:
DAWN: Dynamic Adversarial Watermarking of Neural Networks. CoRR abs/1906.00830 (2019) - [i53]Mika Juuti, Buse Gul Atli, N. Asokan:
Making targeted black-box evasion attacks effective and efficient. CoRR abs/1906.03397 (2019) - [i52]Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Protecting the stack with PACed canaries. CoRR abs/1909.05747 (2019) - [i51]Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan:
Extraction of Complex DNN Models: Real Threat or Boogeyman? CoRR abs/1910.05429 (2019) - 2018
- [j21]Markus Miettinen
, N. Asokan
:
Ad-hoc key agreement: A brief history and the challenges ahead. Comput. Commun. 131: 32-34 (2018) - [j20]Jian Liu, Wenting Li
, Ghassan O. Karame, N. Asokan:
Toward Fairness of Cryptocurrency Payments. IEEE Secur. Priv. 16(3): 81-89 (2018) - [j19]Andrew Paverd
, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Grondahl, N. Asokan
, Ahmad-Reza Sadeghi:
OmniShare: Encrypted Cloud Storage for the Multi-Device Era. IEEE Internet Comput. 22(4): 27-36 (2018) - [j18]Elena Reshetova
, Hans Liljestrand
, Andrew Paverd
, N. Asokan:
Toward Linux kernel memory safety. Softw. Pract. Exp. 48(12): 2237-2256 (2018) - [j17]N. Asokan
, Thomas Nyman
, Norrathep Rattanavipanon
, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(11): 2290-2300 (2018) - [c109]Arseny Kurnikov, Andrew Paverd
, Mohammad Mannan, N. Asokan
:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. ARES 2018: 40:1-40:10 - [c108]Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan
:
All You Need is: Evading Hate Speech Detection. AISec@CCS 2018: 2-12 - [c107]Jian Liu
, Li Duan
, Yong Li
, N. Asokan
:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. CT-RSA 2018: 374-393 - [c106]Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
Revisiting context-based authentication in IoT. DAC 2018: 32:1-32:6 - [c105]Fritz Alder
, Arseny Kurnikov, Andrew Paverd
, N. Asokan
:
Migrating SGX Enclaves with Persistent State. DSN 2018: 195-206 - [c104]Mika Juuti, Bo Sun, Tatsuya Mori
, N. Asokan:
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews. ESORICS (1) 2018: 132-151 - [c103]Christian Vaas, Mika Juuti, N. Asokan
, Ivan Martinovic:
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories. EuroS&P 2018: 199-213 - [c102]Md Sakib Nizam Khan, Samuel Marchal
, Sonja Buchegger, N. Asokan
:
chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change. Privacy and Identity Management 2018: 205-221 - [c101]Samuel Marchal, N. Asokan:
On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World. CSET @ USENIX Security Symposium 2018 - [c100]Arseny Kurnikov, Klaudia Krawiecka, Andrew Paverd
, Mohammad Mannan, N. Asokan:
Using SafeKeeper to Protect Web Passwords. WWW (Companion Volume) 2018: 159-162 - [c99]Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd
, Mohammad Mannan, N. Asokan:
SafeKeeper: Protecting Web Passwords using Trusted Execution Environments. WWW 2018: 349-358 - [i50]Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Sasu Tarkoma, N. Asokan:
Proximity Verification Based on Acoustic Room Impulse Response. CoRR abs/1803.07211 (2018) - [i49]Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan:
Migrating SGX Enclaves with Persistent State. CoRR abs/1803.11021 (2018) - [i48]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Minh Hoang Dang, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. CoRR abs/1804.07474 (2018) - [i47]Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. CoRR abs/1804.08569 (2018) - [i46]Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan:
Stay On-Topic: Generating Context-specific Fake Restaurant Reviews. CoRR abs/1805.02400 (2018) - [i45]Mika Juuti, Sebastian Szyller, Alexey Dmitrenko, Samuel Marchal, N. Asokan:
PRADA: Protecting against DNN Model Stealing Attacks. CoRR abs/1805.02628 (2018) - [i44]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. CoRR abs/1807.05002 (2018) - [i43]Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan:
All You Need is "Love": Evading Hate-speech Detection. CoRR abs/1808.09115 (2018) - [i42]Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CoRR abs/1810.06080 (2018) - [i41]Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. CoRR abs/1811.09189 (2018) - [i40]Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan:
On The Use of Remote Attestation to Break and Repair Deniability. IACR Cryptol. ePrint Arch. 2018: 424 (2018) - [i39]Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider:
SoK: Modular and Efficient Private Decision Tree Evaluation. IACR Cryptol. ePrint Arch. 2018: 1099 (2018) - 2017
- [j16]Ágnes Kiss, Jian Liu, Thomas Schneider
, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. Proc. Priv. Enhancing Technol. 2017(4): 177-197 (2017) - [j15]Samuel Marchal
, Giovanni Armano, Tommi Grondahl, Kalle Saari, Nidhi Singh, N. Asokan
:
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application. IEEE Trans. Computers 66(10): 1717-1733 (2017) - [c98]Sandeep Tamrakar, Jian Liu, Andrew Paverd
, Jan-Erik Ekberg, Benny Pinkas, N. Asokan
:
The Circle Game: Scalable Private Membership Test Using Trusted Hardware. AsiaCCS 2017: 31-44 - [c97]Jian Liu, Mika Juuti, Yao Lu, N. Asokan
:
Oblivious Neural Network Predictions via MiniONN Transformations. CCS 2017: 619-631 - [c96]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman
, Andrew Paverd
, Lucas Davi, Patrick Koeberl, N. Asokan
, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. DAC 2017: 24:1-24:6 - [c95]Markus Miettinen, Samuel Marchal
, Ibbad Hafeez, N. Asokan
, Ahmad-Reza Sadeghi, Sasu Tarkoma
:
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2177-2184 - [c94]Radek Tomsu, Samuel Marchal
, N. Asokan
:
Profiling Users by Modeling Web Transactions. ICDCS 2017: 2399-2404 - [c93]Markus Miettinen, Samuel Marchal
, Ibbad Hafeez, Tommaso Frassetto, N. Asokan
, Ahmad-Reza Sadeghi, Sasu Tarkoma
:
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2511-2514 - [c92]Elena Reshetova, Filippo Bonazzi, N. Asokan:
SELint: An SEAndroid Policy Analysis Tool. ICISSP 2017: 47-58 - [c91]Elena Reshetova, Filippo Bonazzi, N. Asokan
:
Randomization Can't Stop BPF JIT Spray. NSS 2017: 233-247 - [c90]Thomas Nyman
, Jan-Erik Ekberg, Lucas Davi, N. Asokan
:
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers. RAID 2017: 259-284 - [c89]Mika Juuti, Christian Vaas, Hans Liljestrand, Ivo Sluganovic, N. Asokan
, Ivan Martinovic:
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication. SECON 2017: 1-2 - [c88]Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand
, N. Asokan
, Ivan Martinovic:
STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification. SECON 2017: 1-9 - [i38]Radek Tomsu, Samuel Marchal, N. Asokan:
Profiling Users by Modeling Web Transactions. CoRR abs/1703.09745 (2017) - [i37]Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement. CoRR abs/1705.10295 (2017) - [i36]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. CoRR abs/1706.03754 (2017) - [i35]Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan:
CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers. CoRR abs/1706.05715 (2017) - [i34]Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Protecting Web Passwords from Rogue Servers using Trusted Execution Environments. CoRR abs/1709.01261 (2017) - [i33]Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan:
Towards Linux Kernel Memory Safety. CoRR abs/1710.06175 (2017) - [i32]Jian Liu, Mika Juuti, Yao Lu, N. Asokan:
Oblivious Neural Network Predictions via MiniONN transformations. IACR Cryptol. ePrint Arch. 2017: 452 (2017) - [i31]Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. IACR Cryptol. ePrint Arch. 2017: 670 (2017) - [i30]Jian Liu, Li Duan, Yong Li, N. Asokan:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. IACR Cryptol. ePrint Arch. 2017: 1089 (2017) - 2016
- [j14]Tooska Dargahi
, Moreno Ambrosin
, Mauro Conti, N. Asokan
:
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs. Comput. Commun. 85: 1-13 (2016) - [c87]Tigist Abera, N. Asokan
, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman
, Andrew Paverd
, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-Flow Attestation for Embedded Systems Software. CCS 2016: 743-754 - [c86]Tigist Abera, N. Asokan
, Lucas Davi, Farinaz Koushanfar
, Andrew Paverd
, Ahmad-Reza Sadeghi, Gene Tsudik:
Invited - Things, trouble, trust: on building trust in IoT systems. DAC 2016: 121:1-121:6 - [c85]Samuel Marchal
, Kalle Saari, Nidhi Singh, N. Asokan
:
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets. ICDCS 2016: 323-333 - [c84]Giovanni Armano, Samuel Marchal
, N. Asokan
:
Real-Time Client-Side Phishing Prevention Add-On. ICDCS 2016: 777-778 - [c83]Elena Reshetova, Filippo Bonazzi, Thomas Nyman
, Ravishankar Borgaonkar, N. Asokan:
Characterizing SEAndroid Policies in the Wild. ICISSP 2016: 482-489 - [c82]Kubilay Ahmet Küçük
, Andrew Paverd
, Andrew C. Martin, N. Asokan
, Andrew Simpson, Robin Ankele:
Exploring the use of Intel SGX for Secure Many-Party Applications. SysTEX@Middleware 2016: 5:1-5:6 - [c81]Klaudia Krawiecka, Andrew Paverd
, N. Asokan
:
Protecting Password Databases using Trusted Hardware. SysTEX@Middleware 2016: 9:1-9:6 - [c80]Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, N. Asokan:
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. NDSS 2016 - [c79]Altaf Shaik, Jean-Pierre Seifert, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi:
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. NDSS 2016 - [c78]Narges Yousefnezhad
, Marcin Nagy, N. Asokan
:
On improving tie strength estimates by aggregating multiple communication channels. Networking 2016: 530-535 - [c77]Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan
, Ahmad-Reza Sadeghi:
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments. WISEC 2016: 225-226 - [i29]Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-FLow ATtestation for Embedded Systems Software. CoRR abs/1605.07763 (2016) - [i28]Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan:
The Circle Game: Scalable Private Membership Test Using Trusted Hardware. CoRR abs/1606.01655 (2016) - [i27]Elena Reshetova, Filippo Bonazzi, N. Asokan:
SELint: an SEAndroid policy analysis tool. CoRR abs/1608.02339 (2016) - [i26]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Towards Fairness of Cryptocurrency Payments. CoRR abs/1609.07256 (2016) - [i25]Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan, Ivan Martinovic:
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition. CoRR abs/1610.02801 (2016) - [i24]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT. CoRR abs/1611.04880 (2016) - [i23]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Scalable Byzantine Consensus via Hardware-assisted Secret Sharing. CoRR abs/1612.04997 (2016) - 2015
- [c76]Markus Miettinen, N. Asokan
, Farinaz Koushanfar
, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula:
I Know Where You are: Proofs of Presence Resilient to Malicious Provers. AsiaCCS 2015: 567-577 - [c75]Jian Liu, N. Asokan
, Benny Pinkas:
Secure Deduplication of Encrypted Data without Additional Independent Servers. CCS 2015: 874-885 - [c74]