Conference Papers

  • Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan and Ivan Martinovic. STASH: Securing transparent authentication schemes using prover-side proximity verification. In IEEE International Conference on Sensing, Communication and Networking 2017 (SECON'17). arXiv preprint arXiv:1610.02801

  • Radek Tomsu, Samuel Marchal and N Asokan. Profiling Users by Modeling Web Transactions. In IEEE International Conference on Distributed Computing Systems (ICDCS 2017). arXiv preprint arXiv:1703.09745 (JUFO 2)
  • Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N Asokan, Ahmad-Reza Sadeghi and Sasu Tarkoma. IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT. In IEEE International Conference on Distributed Computing Systems (ICDCS 2017). arXiv preprint arXiv:1611.04880 (JUFO 2)
  • Samuel Marchal, Kalle Saari, Nidhi Singh and N. Asokan. 2016. Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets. In International Conference on Distributed Computing Systems (ICDCS 2016). arXiv preprint (JUFO 2)
  • Otto Huhta, Prakash Shrestha, Swapnil Udar, Mika Juuti, Nitesh Saxena, and N. Asokan. 2016. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. In Network and Distributed Systems Security (NDSS '16):
  • Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, and Sudha Yellapantula. 2015. I Know Where You are: Proofs of Presence Resilient to Malicious Provers. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15). ACM, New York, NY, USA, 567-577. DOI=

  • Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jörg Ott, and Ahmad-Reza Sadeghi. 2015. How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '15). ACM, New York, NY, USA, , Article 18 , 12 pages. DOI=

  • Sourav Bhattacharya , Otto Huhta and  N. Asokan. 2015. LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling . In Trust and Trustworthy Computing '15. DOI= 143-162.
  • Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and Majid Sobhani. 2014. Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). ACM, New York, NY, USA, 880-891. DOI= (JUFO 2) 

Journal Papers

  • Samuel Marchal,   Giovanni Armano, Tommi Gröndahl, Kalle Saari, Nidhi Singh and N Asokan. Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application. In  IEEE Transactions on Computers > Volume: PP Issue: 99 (May 2017) (JUFO 2)

  • Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan and Petteri Nurmi. 2015. Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability, In Pervasive and Mobile Computing '15. DOI= 187-204. (JUFO 2)


  • Swapnil Udar, Aalto University, "Contextual Authentication and Authorization Using Wearable Devices", M.Sc. thesis completed February 2016, supervised by N. Asokan, instructed by Otto Huhta and Mika Juuti
  • Giovanni Armano, Aalto University, "Real-time Client Side Phishing Detection", M.Sc. thesis completed August 2016, supervised by N. Asokan, instructed by Samuel Marchal:
  • Radek Tomsu, Aalto University, "Automated Deauthentication using Web Transaction Analysis", M.Sc. thesis in progress, supervised by N. Asokan, instructed by Samuel Marchal


Public Demos

  • No labels