Asokan
Professor, Ohjelmistojärjestelmät ja -teknologia at Aalto University School of Business
Biography
Aalto University School of Business
Peer-reviewed scientific articles
Journal article-refereed, Original researchOff-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
Marchal, S.; Armano, G.; Gröndahl, T.; Saari, K.; Singh, Nidhi; Asokan, N.2017 in IEEE TRANSACTIONS ON COMPUTERS (IEEE Computer Society)ISSN: 0018-9340ABAKA A novel attribute-based k-anonymous collaborative solution for LBSs
Dargahi, Tooska; Ambrosin, Moreno; Conti, Mauro; Asokan, N.2016 in COMPUTER COMMUNICATIONS (Elsevier)ISSN: 0140-3664Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability
Truong, Hien Thi Thu; Gao, Xiang; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri2015 in PERVASIVE AND MOBILE COMPUTING (Elsevier)ISSN: 1574-1192Mobile Trusted Computing
Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian2014 in PROCEEDINGS OF THE IEEE (Institute of Electrical and Electronics Engineers Inc.)ISSN: 0018-9219The Untapped Potential of Trusted Execution Environments on Mobile Devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.2014 in IEEE SECURITY AND PRIVACY (Institute of Electrical and Electronics Engineers Inc.)ISSN: 1540-7993Controlling Resource Hogs in Mobile Delay-tolerant Networks
Solis, John; Asokan, Nadarajah; Kostiainen, Kari; Ginzboorg, Philip; Ott, Jörg2010 in COMPUTER COMMUNICATIONS (Elsevier)ISSN: 0140-3664Standards for security associations in personal networks: a comparative analysis
Suomalainen, Jani; Valkonen, Jukka; Asokan, N.2009 in INTERNATIONAL JOURNAL OF SECURITY AND NETWORKS (Inderscience Enterprises Ltd)Book section, Chapters in research booksSecurity Associations for Wireless Devices
Asokan, N.; Nyberg, Kaisa2009 Conference proceedingsLO-FAT Low-Overhead Control Flow ATtestation in Hardware
Dessouky, Ghada; Zeitouni, Shaza; Nyman, Thomas; Paverd, Andrew; Davi, Lucas; Koeberl, Patrick; Asokan, N.; Sadeghi, Ahmad-Reza2017 ISBN: 9781450349277STASH: Securing transparent authentication schemes using prover-side proximity verification
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Asokan, N; Martinovic, Ivan2017 ISBN: 978-1-5090-1732-4Implementing prover-side proximity verification for strengthening transparent authentication
Juuti, Mika; Vaas, Christian; Liljestrand, Hans; Sluganovic, Ivo; Asokan, N; Martinovic, Ivan2017 ISBN: 978-1-5090-1732-4IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, M.; Marchal, S.; Hafeez, I.; Frassetto, T.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers
Nyman, Thomas; Ekberg, Jan-Erik; Davi, Lucas; Asokan, N2017 in Lecture Notes in Computer Science (Springer International Publishing)ISBN: 978-3-319-66331-9ISSN: 0302-9743The circle game Scalable private membership test using trusted hardware
Tamrakar, Sandeep; Liu, Jian; Paverd, Andrew; Ekberg, Jan-Erik; Pinkas, Benny; Asokan, N.2017 ISBN: 9781450349444Profiling Users by Modeling Web Transactions
Tomsu, Radek; Marchal, S.; Asokan, N.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene2016 ISBN: 978-1-4503-4139-4Invited - Things, trouble, trust On building trust in IoT systems
Abera, Tigist; Asokan, N.; Davi, Lucas; Koushanfar, Farinaz; Paverd, Andrew; Sadeghi, Ahmad Reza; Tsudik, Gene2016 in Proceedings : ACM IEEE Design Automation Conference (Institute of Electrical and Electronics Engineers Inc.)ISBN: 978-1-4673-8729-3 ISSN: 0738-100XReal-Time Client-Side Phishing Prevention Add-On
Armano, Giovanni; Marchal, Samuel; Asokan, N2016 ISBN: 9781509014828Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks
Huhta, Otto; Shrestha, Prakash; Udar, Swapnil; Juuti, Mika; Saxena, Nitesh; Asokan, N2016 ISBN: 1-891562-41-XProtecting Password Databases Using Trusted Hardware
Krawiecka, Klaudia; Paverd, Andrew; Asokan, N.2016 ISBN: 978-1-4503-4670-2Exploring the Use of Intel SGX for Secure Many-Party Applications
Küçük, Kubilay Ahmet; Paverd, Andrew; Martin, Andrew; Asokan, N.; Simpson, Andrew; Ankele, Robin2016 ISBN: 978-1-4503-4670-2Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets
Marchal, Samuel; Saari, Kalle; Singh, Nidhi; Asokan, N2016 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5090-1483-5 ISSN: 1063-6927Poster Friend or foe? Context authentication for trust domain separation in IoT environments
Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad Reza2016 ISBN: 9781450342704Characterizing SEAndroid policies in the wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishankar; Asokan, N.2016 ISBN: 9789897581670On improving tie strength estimates by aggregating multiple communication channels
Yousefnezhad, Narges; Nagy, Marcin; Asokan, N.2016 ISBN: 9783901882838Checksum gestures: continuous gestures as an out-of-band channel for secure pairing
Ahmed, Imtiaj; Ye, Yina; Bhattacharya, Sourav; Asokan, N.; Jacucci, Giulio; Nurmi, Petteri; Tarkoma, Sasu2015 ISBN: 978-1-4503-3574-4SEDA Scalable embedded device attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian2015 ISBN: 978-1-4503-3832-5LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling
Bhattacharya, Sourav; Huhta, Otto; Asokan, N.2015 ISBN: 978-3-319-22845-7Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, N.2015 ISBN: 978-3-662-47853-0Secure Deduplication of Encrypted Data without Additional Independent Servers
Liu, Jian; Asokan, N.; Pinkas, Benny2015 ISBN: 978-1-4503-3832-5Open-TEE - An Open Virtual Trusted Execution Environment
McGillion, Brian; Dettenborn, Tanel; Nyman, Thomas; Asokan, N.2015 ISBN: 978-1-4673-7952-6ISSN: 2324-9013I Know Where You are: Proofs of Presence Resilient to Malicious Provers
Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha2015 ISBN: 978-1-4503-3245-3How Far Removed Are You?Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh; De Cristofaro, Emiliano; Asokan, N; Ott, Jörg; Sadeghi, Ahmad-Reza2015 ISBN: 978-1-4503-3623-9On Making Emerging Trusted Execution Environments Accessible to Developers
Nyman, Thomas; McGillion, Brian; Asokan, N.2015 ISBN: 978-3-319-22845-7On mobile malware infections
Asokan, N.2014 ISBN: 978-1-4503-2972-9Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
Miettinen, Markus; Asokan, N.; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Sobhani, Majid2014 ISSN: 1543-7221ConXsense Automated Context Classification for Context-Aware Access Control
Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N.2014 ISBN: 978-1-4503-2800-5Citizen Electronic Identities using TPM 2.0
Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.2014 ISBN: 978-1-4503-3149-4Security of OS-Level Virtualization Technologies
Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.2014 ISBN: 978-3-319-11598-6ISSN: 0302-9743Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing
Shrestha, Babins; Saxena, Nitesh; Truong, Hien Thi Thu; Asokan, N.2014 Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
Truong, Hien Thi Thu; Xiang, Gao; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri2014 in International Conference on Pervasive Computing and Communications (ASSOCIATION FOR COMPUTING MACHINERY)ISBN: 978-1-4799-3445-4ISSN: 2474-2503The company you keep: mobile malware infection rates and inexpensive risk indicators
Truong, Hien Thi Thu; Lagerspetz, Eemil; Nurmi, Petteri; Oliner, Adam; Tarkoma, Sasu; Asokan, N.; Bhattacharya, Sourav2014 ISBN: 978-1-4503-2744-2CrowdShare: Secure Mobile Resource Sharing
Asokan, N; Dmitrienko, Alexandra; Nagy, Marcin; Reshetova, Elena; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stelle, Stanislaus2013 PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts
Nagy, Marcin; Asokan, N.; Ott, Jörg2013 in Lecture Notes in Computer Science (ASSOCIATION FOR COMPUTING MACHINERY)ISBN: 978-3-642-41488-6ISSN: 0302-9743Do I Know You? Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Nagy, Marcin; De Cristofaro, Emiliano; Dmitrienko, Alexandra; Asokan, N; Sadeghi, Ahmad-Reza2013 Best-effort authentication for opportunistic networks
Solis, J.; Ginzboorg, P.; Asokan, N.; Ott, J.2011 ISBN: 978-1-4673-0010-0Identity verification schemes for public transport ticketing with NFC phones
Tamrakar, Sandeep; Ekberg, Jan-Erik; Asokan, N.2011 ISBN: 978-1-4503-1001-7Can Hand-held Computers Still Be Better Smart Cards?
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka; Asokan, N.; Aura, Tuomas2010 Security Associations in Personal Networks: A Comparative Analysis
Suomalainen, Jani; Valkonen, Jukka; Asokan, N.2007 Usability Analysis of Secure Pairing Method
Uzun, Ersin; Karvonen, Kristiina; Asokan, N.2007 ISBN: 978-3-540-77365-8ISSN: 0302-9743Ad-Hoc Security Associations for Groups
Valkonen, Jukka; Asokan, N.; Nyberg, Kaisa2006 Man-in-the-Middle in Tunnelled Authentication Protocols
ASokan, N.; Niemi, Valtteri; Nyberg, Kaisa2005 ISBN: 3-540-28389-7Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri2003 Non-refereed scientific articles
Unrefereed conference proceedingsTrusted execution environments on mobile devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.2013 ISBN: 978-1-4503-2477-9Scientific books (monographs)
BookMobile Platform Security
Asokan, N.; Davi, Lucas; Dmitrienko, Alexandra; Heuser, Stephan; Kostiainen, Kari; Reshetova, Elena; Sadeghi, Ahmad-Reza2014 ISBN: 978-1-6270-5097-5Book (editor)CCS'13 co-located workshop summary for SPSM 2013
Enck, Willaim; Felt Porter, Adrienne; Asokan, N.2013 ISBN: 978-1-4503-2491-5Publications intended for professional communities
Published development or research reportTRec: Relay-Resilient Transparent Authentication using Trajectory Recognition
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Martinovic, Ivan; Asokan, N2016 SELint: an SEAndroid policy analysis tool
Reshetova, Elena; Bonazzi, Filippo; Asokan, N2016 Characterizing SEAndroid Policies in the Wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishnkar; Asokan, N.2015 Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri2001
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
ABAKA A novel attribute-based k-anonymous collaborative solution for LBSs
Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability
Mobile Trusted Computing
The Untapped Potential of Trusted Execution Environments on Mobile Devices
Controlling Resource Hogs in Mobile Delay-tolerant Networks
Standards for security associations in personal networks: a comparative analysis
Security Associations for Wireless Devices
Conference proceedingsLO-FAT Low-Overhead Control Flow ATtestation in Hardware
Dessouky, Ghada; Zeitouni, Shaza; Nyman, Thomas; Paverd, Andrew; Davi, Lucas; Koeberl, Patrick; Asokan, N.; Sadeghi, Ahmad-Reza2017 ISBN: 9781450349277STASH: Securing transparent authentication schemes using prover-side proximity verification
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Asokan, N; Martinovic, Ivan2017 ISBN: 978-1-5090-1732-4Implementing prover-side proximity verification for strengthening transparent authentication
Juuti, Mika; Vaas, Christian; Liljestrand, Hans; Sluganovic, Ivo; Asokan, N; Martinovic, Ivan2017 ISBN: 978-1-5090-1732-4IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, M.; Marchal, S.; Hafeez, I.; Frassetto, T.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers
Nyman, Thomas; Ekberg, Jan-Erik; Davi, Lucas; Asokan, N2017 in Lecture Notes in Computer Science (Springer International Publishing)ISBN: 978-3-319-66331-9ISSN: 0302-9743The circle game Scalable private membership test using trusted hardware
Tamrakar, Sandeep; Liu, Jian; Paverd, Andrew; Ekberg, Jan-Erik; Pinkas, Benny; Asokan, N.2017 ISBN: 9781450349444Profiling Users by Modeling Web Transactions
Tomsu, Radek; Marchal, S.; Asokan, N.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene2016 ISBN: 978-1-4503-4139-4Invited - Things, trouble, trust On building trust in IoT systems
Abera, Tigist; Asokan, N.; Davi, Lucas; Koushanfar, Farinaz; Paverd, Andrew; Sadeghi, Ahmad Reza; Tsudik, Gene2016 in Proceedings : ACM IEEE Design Automation Conference (Institute of Electrical and Electronics Engineers Inc.)ISBN: 978-1-4673-8729-3 ISSN: 0738-100XReal-Time Client-Side Phishing Prevention Add-On
Armano, Giovanni; Marchal, Samuel; Asokan, N2016 ISBN: 9781509014828Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks
Huhta, Otto; Shrestha, Prakash; Udar, Swapnil; Juuti, Mika; Saxena, Nitesh; Asokan, N2016 ISBN: 1-891562-41-XProtecting Password Databases Using Trusted Hardware
Krawiecka, Klaudia; Paverd, Andrew; Asokan, N.2016 ISBN: 978-1-4503-4670-2Exploring the Use of Intel SGX for Secure Many-Party Applications
Küçük, Kubilay Ahmet; Paverd, Andrew; Martin, Andrew; Asokan, N.; Simpson, Andrew; Ankele, Robin2016 ISBN: 978-1-4503-4670-2Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets
Marchal, Samuel; Saari, Kalle; Singh, Nidhi; Asokan, N2016 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5090-1483-5 ISSN: 1063-6927Poster Friend or foe? Context authentication for trust domain separation in IoT environments
Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad Reza2016 ISBN: 9781450342704Characterizing SEAndroid policies in the wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishankar; Asokan, N.2016 ISBN: 9789897581670On improving tie strength estimates by aggregating multiple communication channels
Yousefnezhad, Narges; Nagy, Marcin; Asokan, N.2016 ISBN: 9783901882838Checksum gestures: continuous gestures as an out-of-band channel for secure pairing
Ahmed, Imtiaj; Ye, Yina; Bhattacharya, Sourav; Asokan, N.; Jacucci, Giulio; Nurmi, Petteri; Tarkoma, Sasu2015 ISBN: 978-1-4503-3574-4SEDA Scalable embedded device attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian2015 ISBN: 978-1-4503-3832-5LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling
Bhattacharya, Sourav; Huhta, Otto; Asokan, N.2015 ISBN: 978-3-319-22845-7Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, N.2015 ISBN: 978-3-662-47853-0Secure Deduplication of Encrypted Data without Additional Independent Servers
Liu, Jian; Asokan, N.; Pinkas, Benny2015 ISBN: 978-1-4503-3832-5Open-TEE - An Open Virtual Trusted Execution Environment
McGillion, Brian; Dettenborn, Tanel; Nyman, Thomas; Asokan, N.2015 ISBN: 978-1-4673-7952-6ISSN: 2324-9013I Know Where You are: Proofs of Presence Resilient to Malicious Provers
Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha2015 ISBN: 978-1-4503-3245-3How Far Removed Are You?Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh; De Cristofaro, Emiliano; Asokan, N; Ott, Jörg; Sadeghi, Ahmad-Reza2015 ISBN: 978-1-4503-3623-9On Making Emerging Trusted Execution Environments Accessible to Developers
Nyman, Thomas; McGillion, Brian; Asokan, N.2015 ISBN: 978-3-319-22845-7On mobile malware infections
Asokan, N.2014 ISBN: 978-1-4503-2972-9Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
Miettinen, Markus; Asokan, N.; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Sobhani, Majid2014 ISSN: 1543-7221ConXsense Automated Context Classification for Context-Aware Access Control
Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N.2014 ISBN: 978-1-4503-2800-5Citizen Electronic Identities using TPM 2.0
Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.2014 ISBN: 978-1-4503-3149-4Security of OS-Level Virtualization Technologies
Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.2014 ISBN: 978-3-319-11598-6ISSN: 0302-9743Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing
Shrestha, Babins; Saxena, Nitesh; Truong, Hien Thi Thu; Asokan, N.2014 Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
Truong, Hien Thi Thu; Xiang, Gao; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri2014 in International Conference on Pervasive Computing and Communications (ASSOCIATION FOR COMPUTING MACHINERY)ISBN: 978-1-4799-3445-4ISSN: 2474-2503The company you keep: mobile malware infection rates and inexpensive risk indicators
Truong, Hien Thi Thu; Lagerspetz, Eemil; Nurmi, Petteri; Oliner, Adam; Tarkoma, Sasu; Asokan, N.; Bhattacharya, Sourav2014 ISBN: 978-1-4503-2744-2CrowdShare: Secure Mobile Resource Sharing
Asokan, N; Dmitrienko, Alexandra; Nagy, Marcin; Reshetova, Elena; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stelle, Stanislaus2013 PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts
Nagy, Marcin; Asokan, N.; Ott, Jörg2013 in Lecture Notes in Computer Science (ASSOCIATION FOR COMPUTING MACHINERY)ISBN: 978-3-642-41488-6ISSN: 0302-9743Do I Know You? Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Nagy, Marcin; De Cristofaro, Emiliano; Dmitrienko, Alexandra; Asokan, N; Sadeghi, Ahmad-Reza2013 Best-effort authentication for opportunistic networks
Solis, J.; Ginzboorg, P.; Asokan, N.; Ott, J.2011 ISBN: 978-1-4673-0010-0Identity verification schemes for public transport ticketing with NFC phones
Tamrakar, Sandeep; Ekberg, Jan-Erik; Asokan, N.2011 ISBN: 978-1-4503-1001-7Can Hand-held Computers Still Be Better Smart Cards?
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka; Asokan, N.; Aura, Tuomas2010 Security Associations in Personal Networks: A Comparative Analysis
Suomalainen, Jani; Valkonen, Jukka; Asokan, N.2007 Usability Analysis of Secure Pairing Method
Uzun, Ersin; Karvonen, Kristiina; Asokan, N.2007 ISBN: 978-3-540-77365-8ISSN: 0302-9743Ad-Hoc Security Associations for Groups
Valkonen, Jukka; Asokan, N.; Nyberg, Kaisa2006 Man-in-the-Middle in Tunnelled Authentication Protocols
ASokan, N.; Niemi, Valtteri; Nyberg, Kaisa2005 ISBN: 3-540-28389-7Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri2003 Non-refereed scientific articles
Unrefereed conference proceedingsTrusted execution environments on mobile devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.2013 ISBN: 978-1-4503-2477-9Scientific books (monographs)
BookMobile Platform Security
Asokan, N.; Davi, Lucas; Dmitrienko, Alexandra; Heuser, Stephan; Kostiainen, Kari; Reshetova, Elena; Sadeghi, Ahmad-Reza2014 ISBN: 978-1-6270-5097-5Book (editor)CCS'13 co-located workshop summary for SPSM 2013
Enck, Willaim; Felt Porter, Adrienne; Asokan, N.2013 ISBN: 978-1-4503-2491-5Publications intended for professional communities
Published development or research reportTRec: Relay-Resilient Transparent Authentication using Trajectory Recognition
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Martinovic, Ivan; Asokan, N2016 SELint: an SEAndroid policy analysis tool
Reshetova, Elena; Bonazzi, Filippo; Asokan, N2016 Characterizing SEAndroid Policies in the Wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishnkar; Asokan, N.2015 Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri2001
LO-FAT Low-Overhead Control Flow ATtestation in Hardware
STASH: Securing transparent authentication schemes using prover-side proximity verification
Implementing prover-side proximity verification for strengthening transparent authentication
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers
The circle game Scalable private membership test using trusted hardware
Profiling Users by Modeling Web Transactions
C-FLAT: Control-Flow Attestation for Embedded Systems Software
Invited - Things, trouble, trust On building trust in IoT systems
Real-Time Client-Side Phishing Prevention Add-On
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks
Protecting Password Databases Using Trusted Hardware
Exploring the Use of Intel SGX for Secure Many-Party Applications
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets
Poster Friend or foe? Context authentication for trust domain separation in IoT environments
Characterizing SEAndroid policies in the wild
On improving tie strength estimates by aggregating multiple communication channels
Checksum gestures: continuous gestures as an out-of-band channel for secure pairing
SEDA Scalable embedded device attestation
LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling
Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Secure Deduplication of Encrypted Data without Additional Independent Servers
Open-TEE - An Open Virtual Trusted Execution Environment
I Know Where You are: Proofs of Presence Resilient to Malicious Provers
How Far Removed Are You?Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
On Making Emerging Trusted Execution Environments Accessible to Developers
On mobile malware infections
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
ConXsense Automated Context Classification for Context-Aware Access Control
Citizen Electronic Identities using TPM 2.0
Security of OS-Level Virtualization Technologies
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
The company you keep: mobile malware infection rates and inexpensive risk indicators
CrowdShare: Secure Mobile Resource Sharing
PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts
Do I Know You? Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Best-effort authentication for opportunistic networks
Identity verification schemes for public transport ticketing with NFC phones
Can Hand-held Computers Still Be Better Smart Cards?
Security Associations in Personal Networks: A Comparative Analysis
Usability Analysis of Secure Pairing Method
Ad-Hoc Security Associations for Groups
Man-in-the-Middle in Tunnelled Authentication Protocols
Secure Vickrey Auctions without Threshold Trust
Trusted execution environments on mobile devices
Scientific books (monographs)
BookMobile Platform Security
Asokan, N.; Davi, Lucas; Dmitrienko, Alexandra; Heuser, Stephan; Kostiainen, Kari; Reshetova, Elena; Sadeghi, Ahmad-Reza2014 ISBN: 978-1-6270-5097-5Book (editor)CCS'13 co-located workshop summary for SPSM 2013
Enck, Willaim; Felt Porter, Adrienne; Asokan, N.2013 ISBN: 978-1-4503-2491-5Publications intended for professional communities
Published development or research reportTRec: Relay-Resilient Transparent Authentication using Trajectory Recognition
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Martinovic, Ivan; Asokan, N2016 SELint: an SEAndroid policy analysis tool
Reshetova, Elena; Bonazzi, Filippo; Asokan, N2016 Characterizing SEAndroid Policies in the Wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishnkar; Asokan, N.2015 Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri2001
Mobile Platform Security
CCS'13 co-located workshop summary for SPSM 2013
Publications intended for professional communities
Published development or research reportTRec: Relay-Resilient Transparent Authentication using Trajectory Recognition
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Martinovic, Ivan; Asokan, N2016 SELint: an SEAndroid policy analysis tool
Reshetova, Elena; Bonazzi, Filippo; Asokan, N2016 Characterizing SEAndroid Policies in the Wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishnkar; Asokan, N.2015 Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri2001
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition
SELint: an SEAndroid policy analysis tool
Characterizing SEAndroid Policies in the Wild
Secure Vickrey Auctions without Threshold Trust
Videos
N. Asokan: "Contextual security"
Read about executive education
Other experts
Chris Kyle
Degree Ph.D., Auckland University, 1994 Specialties Toponomology, society, law and culture of Westminster and London, the social history of parliaments in early modern Britain Personal Website http://chrisrkyle.googlepages.com/home Research Interests The toponomology, society...
John Mondragon
John Mondragon is an Assistant Professor of Finance and Donald P. Jacobs Scholar. His research focuses on household finance and empirical macroeconomics. His recent work has focused on the effects of regulations on household leverage in the mortgage market, how the collapse in house prices crisis...
Looking for an expert?
Contact us and we'll find the best option for you.