Publications supported by CloSer
Conference Papers
2018
- Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider. "SoK: Modular and Efficient Private Decision Tree Evaluation". Accepted for the Privacy Enhancing Technologies Symposium (PETS 2019).
- Leonardo Espinosa Leal, Anton Akusok and Kaj-Mikael Björk. "Website classification from webpage renders" Accepted for the International Conference on Extreme Learning Machines (ELM2018)
- Anton Akusok and Emil Eirola. "Comparison of Classification Methods for Very High-Dimensional Data in Sparse Random Projection Representation". Accepted for the International Conference on Extreme Learning Machines (ELM2018)
- Leonardo Espinosa Leal, Kaj-Mikael Björk, Amaury Lendasse, and Anton Akusok. "A Web Page Classifier Library Based on Random Image Content Analysis Using Deep Learning" PETRA '18 The 11th PErvasive Technologies Related to Assistive Environments Conference, 2018.
- Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan. "Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials" [open access technical report, source code]. 3rd Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID), 2018.
- Jian Liu; Li Duan; Yong Li; N. Asokan. "Secure Deduplication of Encrypted Data: Refined Model and New Constructions". CT-RSA 2018.
- Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan. "Migrating SGX Enclaves with Persistent State" [open access technical report, source code]. 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018.
- Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan. "SafeKeeper: Protecting Web Passwords using Trusted Execution Environments" [open access technical report, source code]. The Web Conference (WWW) 2018 (JuFo 2).
- S. Ramezanian, T. Meskanen, V. Niemi. "Privacy Preserving Queries on Directed Graph". NTMS'2018 - Security Track.
- S. Ramezanian, T. Meskanen, V. Niemi. "Privacy Preserving Shortest Path Queries on Directed Graph." 2018 22nd Conference of Open Innovations Association (FRUCT). IEEE, 2018.
- S. Ramezanian, T. Meskanen, V. Niemi. "Privacy Preserving 2-party Queries on Bipartite Graphs with Private Set Intersection". (Accepted in The 34th ACM/SIGAPP Symposium On Applied Computing)
- N. Asokan, T. Nyman, N. Rattanavipanon, A-R. Sadeghi and G. Tsudik. "ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices". IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems – Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018, 2018.
- F Alder, N Asokan, A Kurnikov, A Paverd, M Steiner. "S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX". arXiv preprint arXiv:1810.06080
2017
- Anton Akusok, Emil Eirola, Yoan Miche, Andrey Gritsenko, and Amaury Lendasse “Advanced Query Strategies for Active Learning with Extreme Learning Machine”. In European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017), pp. 105-110. Bruges, Belgium, 2017.
- Monshizadeh, Mehrnoosh; Khatri, Vikramajeet; and Kantola, Raimo. “Detection as a service: An SDN application”. In 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, pp. 285-290, 2017.
- Monshizadeh, Mehrnoosh; Khatri, Vikramajeet; Kantola, Raimo; and Yan, Zheng. “An Orchestrated Security Platform for Internet of Robots”. In proceedings of 12th International Conference, Green, Pervasive, and Cloud Computing (GPC), Cetara, Italy, pp. 298-312, 2017.
- Jian Liu, Mika Juuti, Yao Lu, N Asokan, "Oblivious Neural Network Predictions via MiniONN transformations", CCS 2017, Dallas, USA (JuFo 2) [open access technical report]
- Ágnes Kiss, Jian Liu, Thomas Schneider, N Asokan, Benny Pinkas, "Private set intersection for unequal set sizes with mobile applications", PETS 2017, Minneapolis, USA, [open access technical report]
- Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi, "Private Membership Test Protocol with Low Communication Complexity", NSS 2017, Helsinki, Finland
- Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan, "CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers", RAID 2017, Atlanta, USA, [open access technical report]
- Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan, "The Circle Game: Scalable Private Membership Test Using Trusted Hardware", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017, Abu Dhabi, UAE, April 2017, (Honorable mention in the best paper competition), [open access technical report]
Anomaly-Based Intrusion Detection using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space, Buse Gul Atli, Yoan Miche, Aapo Kalliola, Ian Oliver, Silke Holtmanns and Amaury Lendasse, in Cognitive Computation, under review (submitted Oct. 2017).
2016
- Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Juha Karhunen, "Android Malware Detection: Building Useful Representations", IEEE International Conference on Machine Learning and Applications (IEEE ICMLA'16), Anaheim, USA, December, 2016.
Anton Akusok, Emil Eirola, Yoan Miche, Ian Oliver, Kaj-Mikael Björk, Andrey Gritsenko, Stephen Baek, Amaury Lendasse, "Incremental ELMVIS for unsupervised learning", International Conference on Extreme Learning Machines (ELM2016), Singapore, December, 2016.
Ibbad Hafeez, Aaron Yi Ding, Lauri Suomalainen, Alexey Kirichenko, Sasu Tarkoma, " Securebox: Toward Safer and Smarter IoT Networks", Cloud Assisted Networking Workshop, ACM CoNEXT, Irvine, December 2016
Journal Papers
- Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan. "Towards Linux kernel memory safety" Software: Practice and Experience, Vol 48, Issue 12, 2018.
- Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Gröndahl, N. Asokan, Ahmad-Reza Sadeghi, "OmniShare: Encrypted Cloud Storage for the Multi-Device Era", IEEE Internet Computing, , Volume 22, Issue 4, July 2018 (JuFo 3) [open access technical report]
Book Chapters
- Monshizadeh, Mehrnoosh; and Khatri, Vikramajeet. “Mobile Virtual Network Operators (MVNO) Security”. In A Comprehensive Guide to 5G Security, Wiley Publishers, pp. 323-346, ISBN 978-1-119-29304-0, 2017.
- Monshizadeh, Mehrnoosh; and Khatri, Vikramajeet. “IoT Security”. In A Comprehensive Guide to 5G Security, Wiley Publishers, pp. 247-266, ISBN 978-1-119-29304-0, 2017.
Public Demos
Arseny Kurnikov, Klaudia Krawiecka, Andrew Paverd, Mohammad Mannan, N. Asokan. "Demo: Using SafeKeeper to Protect Web Passwords". The Web Conference (Demo Track) 2018.
Monshizadeh, Mehrnoosh; Khatri, Vikramajeet; and Kantola, Raimo. “An adaptive detection and prevention architecture for unsafe traffic in SDN enabled mobile networks”. In IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, pp. 883-884, 2017.
Jian Liu, Mika Juuti, Yao Lu, N Asokan, "Oblivious Neural Network Predictions via MiniONN transformations". Technology Workshop on Embedded and IoT Security, Darmstadt, Germany
Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan, Protecting Web Passwords from Rogue Servers using Trusted Execution Environments, Technology Workshop on Embedded and IoT Security, Darmstadt, Germany
Ibbad Hafeez, Aaron Yi Ding, Lauri Suomalainen, Sasu Tarkoma, Demo Abstract: Securebox- A Platform to Safeguard Network Edge, IEEE/ACM Symposium on Edge Computing, Washington D.C., USA, 27-28, October 2016.
Publications supported by CloSe
Conference Papers
2016
- Kaj-Mikael Björk, Emil Eirola, Yoan Miche, and Amaury Lendasse, “A New Application of Machine Learning in Health care”, to appear in the Proceedings of the 9th ACM International Conference on PErvasive Technologies Related to Assistive Environments (PETRA '16) , Island of Corfu, Greece, June 29-July 01, 2016
- Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemiand Jean-Pierre Seifert. "Practical attacks against privacy and availability in 4G/LTE mobile communication systems". In The Network and Distributed System Security Symposium (NDSS) , 2016
2015
Andrey Gritsenko, Emil Eirola, Daniel Schupp, Edward Ratner and Amaury Lendasse. “Probabilistic Methods for Multiclass Classification Problems”. In The International Conference on Extreme Learning Machines (ELM-2015) , December 15-17, 2015.
- Jian Liu, N. Asokanand Benny Pinkas. "Secure Deduplication of Encrypted Data without Additional Independent Servers" (pdf). In The 22nd ACM Conference on Computer and Communications Security (CCS) , 2015, (pp. 874-885) (JUFO 2)
- Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Yoan Miche, Amaury Lendasse and Juha Karhunen. "Efficient detection of zero-day Android Malware using Normalized Bernoulli Naive Bayes" (pdf). In The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), 2015, (pp. 198-205).
- Tommi Meskanen, Jian Liu, Sara Ramezanian and Valtter Niemi. "Private Membership Test for Bloom Filters". In The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), 2015, (pp. 515-522).
- Emil Eirola, Andrey Gritsenko, Anton Akusok, Kaj-Mikael Björk, Yoan Miche, Dušan Sovilj, Rui Nian, and Amaury Lendasse. "Extreme Learning Machines for Multiclass Classification: Refining Predictions with Gaussian Mixture Models." Publication222.pdf(pdfPublication222.pdf). In The 13th International Work-Conference on Artificial Neural Networks (IWANN 2015), (pp. 153-164), Palma de Mallorca, Spain, June 10-12, 2015.
- Tommi Meskanen, Valtteri Niemi, and Noora Nieminen. "Extended Model of Side-Information in Garbling". In The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15) , 2015, (pp. 950–957).
- Noora Nieminen and Arto Lepistö. "Privacy-Preserving Security Monitoring for Assisted Living Services". In Proceedings of the 17th International Symposium on Health Information Management Research (ISHIMR 2015)
2014
- Thomas Nyman, Jan-Erik Ekberg and N. Asokan. "Citizen Electronic Identities using TPM 2.0" (pdf). In The Proceedings of the 4th International Workshop on Trustworthy Embedded Devices (TrustED Workshop) of The 21st ACM Conference on Computer and Communications Security (CCS) 2014, (pp. 37-48), Arizona, USA, November 3 - 7, 2014
- Tommi Meskanen, Valtteri Niemi, and Noora Nieminen. "On Reusable Projective Garbling Schemes". In The 14th IEEE International Conference on Computer and Information Technology (CIT 2014), (pp. 315–322), 2014
- Tommi Meskanen, Valtteri Niemi, and Noora Nieminen. "Garbling in Reverse Order". In The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), (pp. 53–60), 2014
Journal Papers
- Dušan Sovilj, Emil Eirola, Yoan Miche, Kaj-Mikael Bjork, Rui Nian, Anton Akusok and Amaury Lendasse. "Extreme Learning Machine for Missing Data using Multiple Imputations" (pdf)Publication221.pdf. Neurocomputing, 2015, (JUFO 2)
- Tommi Meskanen, Valtteri Niemi, Noora Nieminen. "How to use garbling for privacy preserving electronic surveillance services" . In Journal of Cyber Security 4: (pp 41-64), - Special issue on Special Issue on Resilient and Trustworthy IoT Systems. 2015.
Public Demos
- Andrew Paverd, Sandeep Tamrakar, Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, N. Asokan and Ahmad-Reza Sadegi. Demo: OmniShare in the MAPPING privacy-via-IT-security app competition at CeBIT 2016. (Video, TiVi article) (Grand prize Winner)
- Ibbad Hafeez, Aaron Yi Ding, Lauri Suomalainen, Seppo Hätönen, Valtteri Niemi, Sasu Tarkoma. Demo: Cloud-based Security as a Service for Smart IoT Environments. In the proceedings of the 7th ACM Annual Wireless of the Students, by the Students, for the Students Workshop (ACM S3), Paris, France, September 2015 (Video)
- Ravishankar Borgaonkar, Altaf Shaik, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert. LTE & IMSI Catcher Myths. In Blackhat Europe 2015.
- Seppo Hätönen, Petri Savolainen, Ashwin Rao, Hannu Flinck, Sasu Tarkoma, "Off-the-Shelf Software-defined Wi-Fi Networks", SIGCOMM '16 Proceedings of the 2016 conferenceonACM SIGCOMM 2016 Conference, Florianpolis, Brazil, August, 2016
Research Reports
- Work package 1: Computationally Private Information Retrieval (CPIR)
- Work package 2: Secure cloud storage and deduplication
- Work package 3: Detecting covert / Illicit channels
- Work package 5: Networking and Scalability.
- Work package 6: Unified Design.