Diversification and obfuscation techniques for software security: A systematic literature review S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ... Information and Software Technology 104, 72-93, 2018 | 117 | 2018 |
A semantic security framework and context-aware role-based access control ontology for smart spaces S Hosseinzadeh, S Virtanen, N Díaz-Rodríguez, J Lilius Proceedings of the International Workshop on Semantic Big Data, 1-6, 2016 | 51 | 2016 |
Security in container-based virtualization through vTPM S Hosseinzadeh, S Laurén, V Leppänen Proceedings of the 9th International Conference on Utility and Cloud …, 2016 | 45 | 2016 |
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd arXiv preprint arXiv:1808.06478, 2018 | 35 | 2018 |
Security in the internet of things through obfuscation and diversification S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen 2015 International Conference on Computing, Communication and Security …, 2015 | 30 | 2015 |
Security and privacy in cloud computing via obfuscation and diversification: A survey S Hosseinzadeh, S Hyrynsalmi, M Conti, V Leppänen 2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015 | 23 | 2015 |
Recent trends in applying TPM to cloud computing S Hosseinzadeh, B Sequeiros, PRM Inácio, V Leppänen Security and Privacy 3 (1), e93, 2020 | 22 | 2020 |
Interface diversification in IoT operating systems P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen Proceedings of the 9th International Conference on Utility and Cloud …, 2016 | 22 | 2016 |
Diversification of system calls in linux binaries S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ... Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015 | 22 | 2015 |
Symbol diversification of linux binaries S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen World Congress on Internet Security (WorldCIS-2014), 74-79, 2014 | 20 | 2014 |
Software security considerations for IoT A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ... 2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016 | 19 | 2016 |
Obfuscation and Diversification for Securing the Internet of Things (IoT) S Hosseinzadeh, S Hyrynsalmi, V Leppänen Internet of Things: Principles and Paradigms, 259–274, 2016 | 18 | 2016 |
A survey on aims and environments of diversification and obfuscation in software security S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ... Proceedings of the 17th International Conference on Computer Systems and …, 2016 | 14 | 2016 |
Internal interface diversification as a security measure in sensor networks S Rauti, L Koivunen, P Mäki, S Hosseinzadeh, S Laurén, J Holvitie, ... Journal of Sensor and Actuator Networks 7 (1), 12, 2018 | 9 | 2018 |
Investigating the possibility of data leakage in time of live VM migration R Yasmin, MR Memarian, S Hosseinzadeh, M Conti, V Leppänen Cyber Threat Intelligence, 259-279, 2018 | 5 | 2018 |
Obfuscation and diversification for securing cloud computing S Hosseinzadeh, S Laurén, S Rauti, S Hyrynsalmi, M Conti, V Leppänen Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC …, 2017 | 5 | 2017 |
A survey on internal interfaces used by exploits and implications on interface diversification S Rauti, S Lauren, J Uitto, S Hosseinzadeh, J Ruohonen, S Hyrynsalmi, ... Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016 | 5 | 2016 |
Measuring software security from the design of software M Saarela, S Hosseinzadeh, S Hyrynsalmi, V Leppänen Proceedings of the 18th International Conference on Computer Systems and …, 2017 | 3 | 2017 |
A scalable distributed M3 platform on a low-power cluster A Berg, P Karvinen, S Grönroos, F Wickström, ND Rodrıguez, ... Open International M3 Semantic Interoperability Workshop 21, 49-58, 2013 | 2 | 2013 |
Diversification of System Calls in Linux Binaries JM Mäkelä, S Hyrynsalmi, V Leppänen Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2016 | | 2016 |