Tuomas Aura

Orcid: 0000-0003-1648-8875

Affiliations:
  • Microsoft Research


According to our database1, Tuomas Aura authored at least 94 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Threat modeling framework for mobile communication systems.
Comput. Secur., 2023

Analyzing Microservice Connectivity with Kubesonde.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

2022
Security Analysis of the Consumer Remote SIM Provisioning Protocol.
CoRR, 2022

2021
Nimble Out-of-Band Authentication for EAP (EAP-NOOB).
RFC, December, 2021

Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols.
IEEE Commun. Stand. Mag., 2021

Transparency of SIM profiles for the consumer remote SIM provisioning protocol.
Ann. des Télécommunications, 2021

Credential Provisioning and Device Configuration with EAP.
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021

2020
Evaluation of Out-of-Band Channels for IoT Security.
SN Comput. Sci., 2020

Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB.
Sensors, 2020

Formal verification of misbinding attacks on secure device pairing and bootstrapping.
J. Inf. Secur. Appl., 2020

Threat modeling framework for mobile communication systems.
CoRR, 2020

XSS Vulnerabilities in Cloud-Application Add-Ons.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Misbinding Attacks on Secure Device Pairing.
CoRR, 2019

Client-Side Vulnerabilities in Commercial VPNs.
Proceedings of the Secure IT Systems, 2019

Analysis of Topology Poisoning Attacks in Software-Defined Networking.
Proceedings of the Secure IT Systems, 2019

Watch Your Step! Detecting Stepping Stones in Programmable Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet.
Proceedings of the 12th European Workshop on Systems Security, 2019

Misbinding Attacks on Secure Device Pairing and Bootstrapping.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Automated analysis of freeware installers promoted by download portals.
Comput. Secur., 2018

Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer.
Proceedings of the 27th USENIX Security Symposium, 2018

Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Application of Public Ledgers to Revocation in Distributed Access Control.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Security Wrapper Orchestration in Cloud.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Malware distributions and graph structure of the Web.
CoRR, 2017

Key Exchange with the Help of a Public Ledger.
Proceedings of the Security Protocols XXV, 2017

A Large-Scale Analysis of Download Portals and Freeware Installers.
Proceedings of the Secure IT Systems, 2017

GPASS: A Password Manager with Group-Based Access Control.
Proceedings of the Secure IT Systems, 2017

SynAPTIC: Secure And Persistent connecTIvity for Containers.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Correlating file-based malware graphs against the empirical ground truth of DNS graphs.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

We know where you are!
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
Flexible Management of Cloud-Connected Digital Signage.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Domain Isolation in a Multi-tenant Software-Defined Network.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Electronic Citizen Identities and Strong Authentication.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Secure and low-power authentication for resource-constrained devices.
Proceedings of the 5th International Conference on the Internet of Things, 2015

Flooding DDoS mitigation and traffic management with software defined networking.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

2014
Denial-of-Service Attacks in Bloom-Filter-Based Forwarding.
IEEE/ACM Trans. Netw., 2014

Adaptive and context-aware privacy preservation exploiting user interactions in smart environments.
Pervasive Mob. Comput., 2014

Logout in single sign-on systems: Problems and solutions.
J. Inf. Secur. Appl., 2014

Commitment-based device pairing with synchronized drawing.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

MoCHA: Augmenting pervasive displays through mobile devices and web-based technologies.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Denial-of-Service Mitigation for Internet Services.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Secure bootstrapping of cloud-managed ubiquitous displays.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Spatially Aware Malware Infection Modeling Framework.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Logout in Single Sign-on Systems.
Proceedings of the Policies and Research in Identity Management, 2013

2012
Strong Authentication with Mobile Phone.
Proceedings of the Information Security - 15th International Conference, 2012

Scaling Bloom filter based multicast with hierarchical tree splitting.
Proceedings of IEEE International Conference on Communications, 2012

2011
Security Analysis of Leap-of-Faith Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2011

Performance analysis of HIP diet exchange for WSN security establishment.
Proceedings of the Q2SWinet'11, Proceedings of the Seventh ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, FL, USA, October 31, 2011

Forwarding anomalies in Bloom filter-based multicast.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Applicability analysis of grid security mechanisms on cloud networking.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
Symbian OS Platform Security Model.
login Usenix Mag., 2010

How to Share Your Favourite Search Results while Preserving Privacy and Quality.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Can Hand-Held Computers Still Be Better Smart Cards?
Proceedings of the Trusted Systems - Second International Conference, 2010

2009
Privacy-preserving 802.11 access-point discovery.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
Chattering Laptops.
Proceedings of the Privacy Enhancing Technologies, 2008

2007
Reconciling Multiple IPsec and Firewall Policies.
Proceedings of the Security Protocols, 2007

Securing network location awareness with authenticated DHCP.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2006
Why you shouldn't study security [security education].
IEEE Secur. Priv., 2006

Designing the mobile IPv6 security protocol.
Ann. des Télécommunications, 2006

Scanning electronic documents for personally identifiable information.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

2005
Mobile IP Version 6 Route Optimization Security Design Background.
RFC, December, 2005

Cryptographically Generated Addresses (CGA).
RFC, March, 2005

Experiences with Host-to-Host IPsec.
Proceedings of the Security Protocols, 2005

Experiences with Host-to-Host IPsec.
Proceedings of the Security Protocols, 2005

Reducing Reauthentication Delay in Wireless Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Analysis of the HIP Base Exchange Protocol.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Privacy, Control and Internet Mobility.
Proceedings of the Security Protocols, 2004

Privacy, Control and Internet Mobility (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Effects of Mobility and Multihoming on Transport-Protocol Security.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

2002
Securing IPv6 neighbor and router discovery.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

Mobile IPv6 Security.
Proceedings of the Security Protocols, 2002

Security of Internet Location Management.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Communications security on the internet.
Softw. Focus, 2001

Towards a Survivable Security Architecture for Ad-Hoc Networks.
Proceedings of the Security Protocols, 2001

2000
A causal semantics for time Petri nets.
Theor. Comput. Sci., 2000

DOS-Resistant Authentication with Client Puzzles.
Proceedings of the Security Protocols, 2000

DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

Using Conservation of Flow as a Security Mechanism in Network Protocols.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Towards Network Denial of Service Resistant Protocols.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Analyzing Single-Server Network Inhibition.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Software License Management with Smart Cards.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

Distributed Access-Rights Managements with Delegations Certificates.
Proceedings of the Secure Internet Programming, 1999

1998
Delegation-Based Control for Intelligent Network Services.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

On the Structure of Delegation Networks.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Fast Access Control Decisions from Delegation Certificate Databases.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Stateless connections.
Proceedings of the Information and Communication Security, First International Conference, 1997

Strategies against Replay Attacks.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

Time Processes for Time Petri-Nets.
Proceedings of the Application and Theory of Petri Nets 1997, 1997

1996
Practical Invisibility in Digital Communication.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996


  Loading...