Asokan

Professor, Ohjelmistojärjestelmät ja -teknologia at Aalto University School of Business

Schools

  • Aalto University School of Business

Expertise

Links

Aalto University School of Business

Peer-reviewed scientific articles

Journal article-refereed, Original research

Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application

Marchal, S.; Armano, G.; Gröndahl, T.; Saari, K.; Singh, Nidhi; Asokan, N.
2017 in IEEE TRANSACTIONS ON COMPUTERS (IEEE Computer Society)
ISSN: 0018-9340

ABAKA A novel attribute-based k-anonymous collaborative solution for LBSs

Dargahi, Tooska; Ambrosin, Moreno; Conti, Mauro; Asokan, N.
2016 in COMPUTER COMMUNICATIONS (Elsevier)
ISSN: 0140-3664

Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability

Truong, Hien Thi Thu; Gao, Xiang; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri
2015 in PERVASIVE AND MOBILE COMPUTING (Elsevier)
ISSN: 1574-1192

Mobile Trusted Computing

Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
2014 in PROCEEDINGS OF THE IEEE (Institute of Electrical and Electronics Engineers Inc.)
ISSN: 0018-9219

The Untapped Potential of Trusted Execution Environments on Mobile Devices

Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.
2014 in IEEE SECURITY AND PRIVACY (Institute of Electrical and Electronics Engineers Inc.)
ISSN: 1540-7993

Controlling Resource Hogs in Mobile Delay-tolerant Networks

Solis, John; Asokan, Nadarajah; Kostiainen, Kari; Ginzboorg, Philip; Ott, Jörg
2010 in COMPUTER COMMUNICATIONS (Elsevier)
ISSN: 0140-3664

Standards for security associations in personal networks: a comparative analysis

Suomalainen, Jani; Valkonen, Jukka; Asokan, N.
2009 in INTERNATIONAL JOURNAL OF SECURITY AND NETWORKS (Inderscience Enterprises Ltd)

Book section, Chapters in research books

Security Associations for Wireless Devices

Asokan, N.; Nyberg, Kaisa
2009

Conference proceedings

LO-FAT Low-Overhead Control Flow ATtestation in Hardware

Dessouky, Ghada; Zeitouni, Shaza; Nyman, Thomas; Paverd, Andrew; Davi, Lucas; Koeberl, Patrick; Asokan, N.; Sadeghi, Ahmad-Reza
2017
ISBN: 9781450349277

STASH: Securing transparent authentication schemes using prover-side proximity verification

Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Asokan, N; Martinovic, Ivan
2017
ISBN: 978-1-5090-1732-4

Implementing prover-side proximity verification for strengthening transparent authentication

Juuti, Mika; Vaas, Christian; Liljestrand, Hans; Sluganovic, Ivo; Asokan, N; Martinovic, Ivan
2017
ISBN: 978-1-5090-1732-4

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT

Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.
2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)
ISBN: 978-1-5386-1791-5
ISSN: 1063-6927

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

Miettinen, M.; Marchal, S.; Hafeez, I.; Frassetto, T.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.
2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)
ISBN: 978-1-5386-1791-5
ISSN: 1063-6927

CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers

Nyman, Thomas; Ekberg, Jan-Erik; Davi, Lucas; Asokan, N
2017 in Lecture Notes in Computer Science (Springer International Publishing)
ISBN: 978-3-319-66331-9
ISSN: 0302-9743

The circle game Scalable private membership test using trusted hardware

Tamrakar, Sandeep; Liu, Jian; Paverd, Andrew; Ekberg, Jan-Erik; Pinkas, Benny; Asokan, N.
2017
ISBN: 9781450349444

Profiling Users by Modeling Web Transactions

Tomsu, Radek; Marchal, S.; Asokan, N.
2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)
ISBN: 978-1-5386-1791-5
ISSN: 1063-6927

C-FLAT: Control-Flow Attestation for Embedded Systems Software

Abera, Tigist; Asokan, N; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene
2016
ISBN: 978-1-4503-4139-4

Invited - Things, trouble, trust On building trust in IoT systems

Abera, Tigist; Asokan, N.; Davi, Lucas; Koushanfar, Farinaz; Paverd, Andrew; Sadeghi, Ahmad Reza; Tsudik, Gene
2016 in Proceedings : ACM IEEE Design Automation Conference (Institute of Electrical and Electronics Engineers Inc.)
ISBN: 978-1-4673-8729-3
ISSN: 0738-100X

Real-Time Client-Side Phishing Prevention Add-On

Armano, Giovanni; Marchal, Samuel; Asokan, N
2016
ISBN: 9781509014828

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks

Huhta, Otto; Shrestha, Prakash; Udar, Swapnil; Juuti, Mika; Saxena, Nitesh; Asokan, N
2016
ISBN: 1-891562-41-X

Protecting Password Databases Using Trusted Hardware

Krawiecka, Klaudia; Paverd, Andrew; Asokan, N.
2016
ISBN: 978-1-4503-4670-2

Exploring the Use of Intel SGX for Secure Many-Party Applications

Küçük, Kubilay Ahmet; Paverd, Andrew; Martin, Andrew; Asokan, N.; Simpson, Andrew; Ankele, Robin
2016
ISBN: 978-1-4503-4670-2

Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets

Marchal, Samuel; Saari, Kalle; Singh, Nidhi; Asokan, N
2016 in International Conference on Distributed Computing Systems. Proceedings (IEEE)
ISBN: 978-1-5090-1483-5
ISSN: 1063-6927

Poster Friend or foe? Context authentication for trust domain separation in IoT environments

Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad Reza
2016
ISBN: 9781450342704

Characterizing SEAndroid policies in the wild

Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishankar; Asokan, N.
2016
ISBN: 9789897581670

On improving tie strength estimates by aggregating multiple communication channels

Yousefnezhad, Narges; Nagy, Marcin; Asokan, N.
2016
ISBN: 9783901882838

Checksum gestures: continuous gestures as an out-of-band channel for secure pairing

Ahmed, Imtiaj; Ye, Yina; Bhattacharya, Sourav; Asokan, N.; Jacucci, Giulio; Nurmi, Petteri; Tarkoma, Sasu
2015
ISBN: 978-1-4503-3574-4

SEDA Scalable embedded device attestation

Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
2015
ISBN: 978-1-4503-3832-5

LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling

Bhattacharya, Sourav; Huhta, Otto; Asokan, N.
2015
ISBN: 978-3-319-22845-7

Smart and Secure Cross-Device Apps for the Internet of Advanced Things

Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, N.
2015
ISBN: 978-3-662-47853-0

Secure Deduplication of Encrypted Data without Additional Independent Servers

Liu, Jian; Asokan, N.; Pinkas, Benny
2015
ISBN: 978-1-4503-3832-5

Open-TEE - An Open Virtual Trusted Execution Environment

McGillion, Brian; Dettenborn, Tanel; Nyman, Thomas; Asokan, N.
2015
ISBN: 978-1-4673-7952-6
ISSN: 2324-9013

I Know Where You are: Proofs of Presence Resilient to Malicious Provers

Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha
2015
ISBN: 978-1-4503-3245-3

How Far Removed Are You?Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL

Nagy, Marcin; Bui, Thanh; De Cristofaro, Emiliano; Asokan, N; Ott, Jörg; Sadeghi, Ahmad-Reza
2015
ISBN: 978-1-4503-3623-9

On Making Emerging Trusted Execution Environments Accessible to Developers

Nyman, Thomas; McGillion, Brian; Asokan, N.
2015
ISBN: 978-3-319-22845-7

On mobile malware infections

Asokan, N.
2014
ISBN: 978-1-4503-2972-9

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices

Miettinen, Markus; Asokan, N.; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Sobhani, Majid
2014
ISSN: 1543-7221

ConXsense Automated Context Classification for Context-Aware Access Control

Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N.
2014
ISBN: 978-1-4503-2800-5

Citizen Electronic Identities using TPM 2.0

Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.
2014
ISBN: 978-1-4503-3149-4

Security of OS-Level Virtualization Technologies

Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.
2014
ISBN: 978-3-319-11598-6
ISSN: 0302-9743

Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing

Shrestha, Babins; Saxena, Nitesh; Truong, Hien Thi Thu; Asokan, N.
2014

Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication

Truong, Hien Thi Thu; Xiang, Gao; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri
2014 in International Conference on Pervasive Computing and Communications (ASSOCIATION FOR COMPUTING MACHINERY)
ISBN: 978-1-4799-3445-4
ISSN: 2474-2503

The company you keep: mobile malware infection rates and inexpensive risk indicators

Truong, Hien Thi Thu; Lagerspetz, Eemil; Nurmi, Petteri; Oliner, Adam; Tarkoma, Sasu; Asokan, N.; Bhattacharya, Sourav
2014
ISBN: 978-1-4503-2744-2

CrowdShare: Secure Mobile Resource Sharing

Asokan, N; Dmitrienko, Alexandra; Nagy, Marcin; Reshetova, Elena; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stelle, Stanislaus
2013

PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts

Nagy, Marcin; Asokan, N.; Ott, Jörg
2013 in Lecture Notes in Computer Science (ASSOCIATION FOR COMPUTING MACHINERY)
ISBN: 978-3-642-41488-6
ISSN: 0302-9743

Do I Know You? Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications

Nagy, Marcin; De Cristofaro, Emiliano; Dmitrienko, Alexandra; Asokan, N; Sadeghi, Ahmad-Reza
2013

Best-effort authentication for opportunistic networks

Solis, J.; Ginzboorg, P.; Asokan, N.; Ott, J.
2011
ISBN: 978-1-4673-0010-0

Identity verification schemes for public transport ticketing with NFC phones

Tamrakar, Sandeep; Ekberg, Jan-Erik; Asokan, N.
2011
ISBN: 978-1-4503-1001-7

Can Hand-held Computers Still Be Better Smart Cards?

Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka; Asokan, N.; Aura, Tuomas
2010

Security Associations in Personal Networks: A Comparative Analysis

Suomalainen, Jani; Valkonen, Jukka; Asokan, N.
2007

Usability Analysis of Secure Pairing Method

Uzun, Ersin; Karvonen, Kristiina; Asokan, N.
2007
ISBN: 978-3-540-77365-8
ISSN: 0302-9743

Ad-Hoc Security Associations for Groups

Valkonen, Jukka; Asokan, N.; Nyberg, Kaisa
2006

Man-in-the-Middle in Tunnelled Authentication Protocols

ASokan, N.; Niemi, Valtteri; Nyberg, Kaisa
2005
ISBN: 3-540-28389-7

Secure Vickrey Auctions without Threshold Trust

Lipmaa, Helger; Asokan, N.; Niemi, Valtteri
2003

Non-refereed scientific articles

Unrefereed conference proceedings

Trusted execution environments on mobile devices

Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.
2013
ISBN: 978-1-4503-2477-9

Scientific books (monographs)

Book

Mobile Platform Security

Asokan, N.; Davi, Lucas; Dmitrienko, Alexandra; Heuser, Stephan; Kostiainen, Kari; Reshetova, Elena; Sadeghi, Ahmad-Reza
2014
ISBN: 978-1-6270-5097-5

Book (editor)

CCS'13 co-located workshop summary for SPSM 2013

Enck, Willaim; Felt Porter, Adrienne; Asokan, N.
2013
ISBN: 978-1-4503-2491-5

Publications intended for professional communities

Published development or research report

TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition

Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Martinovic, Ivan; Asokan, N
2016

SELint: an SEAndroid policy analysis tool

Reshetova, Elena; Bonazzi, Filippo; Asokan, N
2016

Characterizing SEAndroid Policies in the Wild

Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishnkar; Asokan, N.
2015

Secure Vickrey Auctions without Threshold Trust

Lipmaa, Helger; Asokan, N.; Niemi, Valtteri
2001

Videos

Other experts

Looking for an expert?

Contact us and we'll find the best option for you.

Something went wrong. We're trying to fix this error.