Follow
Shohreh Hosseinzadeh
Shohreh Hosseinzadeh
Department of Information Technology, University of Turku
Verified email at utu.fi
Title
Cited by
Cited by
Year
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
1172018
A semantic security framework and context-aware role-based access control ontology for smart spaces
S Hosseinzadeh, S Virtanen, N Díaz-Rodríguez, J Lilius
Proceedings of the International Workshop on Semantic Big Data, 1-6, 2016
512016
Security in container-based virtualization through vTPM
S Hosseinzadeh, S Laurén, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
452016
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd
arXiv preprint arXiv:1808.06478, 2018
352018
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
302015
Security and privacy in cloud computing via obfuscation and diversification: A survey
S Hosseinzadeh, S Hyrynsalmi, M Conti, V Leppänen
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
232015
Recent trends in applying TPM to cloud computing
S Hosseinzadeh, B Sequeiros, PRM Inácio, V Leppänen
Security and Privacy 3 (1), e93, 2020
222020
Interface diversification in IoT operating systems
P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
222016
Diversification of system calls in linux binaries
S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ...
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
222015
Symbol diversification of linux binaries
S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
World Congress on Internet Security (WorldCIS-2014), 74-79, 2014
202014
Software security considerations for IoT
A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ...
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
192016
Obfuscation and Diversification for Securing the Internet of Things (IoT)
S Hosseinzadeh, S Hyrynsalmi, V Leppänen
Internet of Things: Principles and Paradigms, 259–274, 2016
182016
A survey on aims and environments of diversification and obfuscation in software security
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Proceedings of the 17th International Conference on Computer Systems and …, 2016
142016
Internal interface diversification as a security measure in sensor networks
S Rauti, L Koivunen, P Mäki, S Hosseinzadeh, S Laurén, J Holvitie, ...
Journal of Sensor and Actuator Networks 7 (1), 12, 2018
92018
Investigating the possibility of data leakage in time of live VM migration
R Yasmin, MR Memarian, S Hosseinzadeh, M Conti, V Leppänen
Cyber Threat Intelligence, 259-279, 2018
52018
Obfuscation and diversification for securing cloud computing
S Hosseinzadeh, S Laurén, S Rauti, S Hyrynsalmi, M Conti, V Leppänen
Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC …, 2017
52017
A survey on internal interfaces used by exploits and implications on interface diversification
S Rauti, S Lauren, J Uitto, S Hosseinzadeh, J Ruohonen, S Hyrynsalmi, ...
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
52016
Measuring software security from the design of software
M Saarela, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
Proceedings of the 18th International Conference on Computer Systems and …, 2017
32017
A scalable distributed M3 platform on a low-power cluster
A Berg, P Karvinen, S Grönroos, F Wickström, ND Rodrıguez, ...
Open International M3 Semantic Interoperability Workshop 21, 49-58, 2013
22013
Diversification of System Calls in Linux Binaries
JM Mäkelä, S Hyrynsalmi, V Leppänen
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20