Publications

Journal Papers (2):

  1. Shohreh Hosseinzadeh, Sampsa Rauti, Samuel Laurèn, Jari-Matti Mäkelä, Johannes Holvitie, Sami Hyrynsalmi, and Ville Leppänen: Using Diversification and Obfuscation Techniques for Software Security: a Systematic Literature Review. Journal of Information and Software Technology (IST), 2018.
  2. Sampsa Rauti, Lauri Koivunen, Petteri Mäk, Shohreh Hosseinzadeh, Samuel Laurén, Johannes Holvitie, Ville Leppänen. Internal Interface Diversification as a Security Measure in Sensor Networks. Journal of Sensor and Actuator Networks. 2018 Mar 6;7(1):12.

Chapters in edited books (3)

  1. Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen, Obfuscation and Diversification for Securing the Internet of Things (IoT). In: Rajkumar Buyya, Amir Vahid Dastjerdi (Eds.), Internet of Things: Principles and Paradigms, 259–274, Elsevier, 2016.
  2. Shohreh Hosseinzadeh, Samuel Laurén, Sampsa Rauti, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen, Obfuscation and Diversification for Securing Cloud Computing. In: Victor Chang, Muthu Ramachandran, Robert J. Walters, Gary Wills (Eds.), Enterprise Security, Lecture Notes in Computer Science 10131, 179–202, Springer, 2017.
  3. Rehana Yasmin, Mohammad Reza Memarian, Shohreh HosseinzadehMauro Conti, Ville Leppänen (2018) Investigating the Possibility of Data Leakage in Time of Live VM Migration. In: Dehghantanha A., Conti M., Dargahi T. (eds) Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham

Articles in proceedings (12)

  1. Shohreh Hosseinzadeh, Hans Liljestrand, Ville Leppänen, Andrew Paverd. Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization. arXiv preprint arXiv:1808.06478. 2018 Aug 20.
  2. Shohreh Hosseinzadeh, Samuel Laurén, Ville Leppänen, Security in Container-based Virtualization through vTPM. In: 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC), Shanghai, 2016, pp. 214-219.
  3. Shohreh Hosseinzadeh, Sami Hyrynsalmi, Mauro Conti, Ville Leppänen, Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey. In: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 529–535, IEEE, 2015.
  4. Shohreh Hosseinzadeh, Sampsa Rauti, Sami Hyrynsalmi, Ville Leppänen, Security in the Internet of Things through Obfuscation and Diversification. In: 2015 International Conference on Computing, Communication and Security (ICCCS), 1–5, IEEE, 2015.
  5. Shohreh Hosseinzadeh, Sampsa Rauti, Samuel Laurèn, Jari-Matti Mäkelä, Johannes Holvitie, Sami Hyrynsalmi, and Ville Leppänen: A survey on aims and environments of Diversification and Obfuscation in Software Security. In: 17th International Conference on Computer Systems and Technologies (CompSysTech’16), Pages 113-120, 2016.
  6. Shohreh Hosseinzadeh, Natalia Díaz Rodríguez, Seppo Virtanen, Johan Lilius, A Semantic Security Framework and Context-Aware Role-Based Access Control Ontology for Smart Spaces. In: Sven Groppe, Le Gruenwald (Eds.), International Workshop on Semantic Big Data, 8:1–8:6, ACM, 2016.
  7. Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Lauri Koivunen, Ville Leppänen, Interface Diversification in IoT Operating Systems. In: 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC 2016), Pages 304-309.
  8. Samuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen, Symbol Diversification of Linux Binaries. In: Charles A. Shonigun, Galyna A. Akmayeva (Eds.), Proceedings of World Congress on Internet Security (WorldCIS-2014), 75–80, Infonomics Society, 2014.
  9. Sampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen, Diversification of System Calls in Linux Binaries. In: Proceedings of the 6th International Conference on Trustworthy Systems (InTrust 2014), 255–271, Beijing Institute of Technology, 2014.
  10. Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen, A Survey on Internal Interfaces Used by Exploits and Implementations on Interface Diversification.  In: Brumley B., Röning J. (eds) Secure IT Systems. NordSec 2016. Lecture Notes in Computer Science, vol 10014. Springer, Cham.
  11. Aki Koivu, Lauri Koivunen, Shohreh Hosseinzadeh, Samuel Laurén, Sami Hyrynsalmi, Sampsa Rauti, Ville Leppänen, Software Security Considerations for IoT. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 392–397, IEEE, 2017.
  12. Marko Saarela, Shohreh Hosseinzadeh, Sami Hyrynsalmi, and Ville Leppänen, 2017. Measuring software security from the design of software. In Proceedings of the 18th International Conference on Computer Systems and Technologies (pp. 179-186). ACM, 2017.