Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Publications supported by CloSer

Conference Papers

2018

  1. Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan. "Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials" [open access technical report, source code]. 3rd Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID), 2018.
  2. Jian Liu; Li Duan; Yong Li; N. Asokan. "Secure Deduplication of Encrypted Data: Refined Model and New Constructions". CT-RSA 2018.
  3. Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan. "Migrating SGX Enclaves with Persistent State" [open access technical report, source code]. 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018.
  4. Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan. "SafeKeeper: Protecting Web Passwords using Trusted Execution Environments" [open access technical report, source code]. The Web Conference (WWW) 2018 (JuFo 2).
  5. S. Ramezanian, T. Meskanen, V. Niemi. "Privacy Preserving Queries on Directed Graph". NTMS'2018 - Security Track.

2017

  1. Anton Akusok, Emil Eirola, Yoan Miche, Andrey Gritsenko, and Amaury Lendasse “Advanced Query Strategies for Active Learning with Extreme Learning Machine”. In European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017), pp. 105-110. Bruges, Belgium, 2017.
  2. Monshizadeh, Mehrnoosh; Khatri, Vikramajeet; and Kantola, Raimo. “Detection as a service: An SDN application”. In 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, pp. 285-290, 2017.
  3. Monshizadeh, Mehrnoosh; Khatri, Vikramajeet; Kantola, Raimo; and Yan, Zheng. “An Orchestrated Security Platform for Internet of Robots”. In proceedings of 12th International Conference, Green, Pervasive, and Cloud Computing (GPC), Cetara, Italy, pp. 298-312, 2017.
  4. Jian Liu, Mika Juuti, Yao Lu, N Asokan, "Oblivious Neural Network Predictions via MiniONN transformations", CCS 2017, Dallas, USA (JuFo 2) [open access technical report]
  5. Ágnes Kiss, Jian Liu, Thomas Schneider, N Asokan, Benny Pinkas, "Private set intersection for unequal set sizes with mobile applications", PETS 2017, Minneapolis, USA, [open access technical report]
  6. Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi,  "Private Membership Test Protocol with Low Communication Complexity", NSS 2017, Helsinki, Finland 
  7. Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan, "CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers"RAID 2017, Atlanta, USA, [open access technical report]
  8. Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan, "The Circle Game: Scalable Private Membership Test Using Trusted Hardware", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017, Abu Dhabi, UAE, April 2017, (Honorable mention in the best paper competition), [open access technical report]
  9. Anomaly-Based Intrusion Detection using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space, Buse Gul Atli, Yoan Miche, Aapo Kalliola, Ian Oliver, Silke Holtmanns and Amaury Lendasse, in Cognitive Computation, under review (submitted Oct. 2017).

2016

  1. Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Juha Karhunen, "Android Malware Detection: Building Useful Representations", IEEE International Conference on Machine Learning and Applications (IEEE ICMLA'16), Anaheim, USA, December, 2016.
  2. Anton Akusok, Emil Eirola, Yoan Miche, Ian Oliver, Kaj-Mikael Björk, Andrey Gritsenko, Stephen Baek, Amaury Lendasse, "Incremental ELMVIS for unsupervised learning", International Conference on Extreme Learning Machines (ELM2016), Singapore, December, 2016.

  3. Ibbad Hafeez, Aaron Yi Ding, Lauri Suomalainen, Alexey Kirichenko, Sasu Tarkoma, " Securebox: Toward Safer and Smarter IoT Networks", Cloud Assisted Networking Workshop, ACM CoNEXT, Irvine, December 2016

Journal Papers

  1. Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Gröndahl, N. Asokan, Ahmad-Reza Sadeghi, "OmniShare: Encrypted Cloud Storage for the Multi-Device Era", IEEE Internet Computing, , Volume 22, Issue 4, July 2018 (JuFo 3[open access technical report]
  2. Paolo Palumbo, Luiza Sayfullina, Dmitriy Komashinskiy, Emil Eirola, Juha Karhunen, "A pragmatic android malware detection procedure". Computers & Security, vol. 70, pp. 689-701, 2017.(JuFo 2)

Book Chapters

  1. Monshizadeh, Mehrnoosh; and Khatri, Vikramajeet. “Mobile Virtual Network Operators (MVNO) Security”. In A Comprehensive Guide to 5G Security, Wiley Publishers, pp. 323-346, ISBN 978-1-119-29304-0, 2017.
  2. Monshizadeh, Mehrnoosh; and Khatri, Vikramajeet. “IoT Security”. In A Comprehensive Guide to 5G Security, Wiley Publishers, pp. 247-266, ISBN 978-1-119-29304-0, 2017.

Public Demos

...