{"id":5,"date":"2016-06-08T05:13:35","date_gmt":"2016-06-08T05:13:35","guid":{"rendered":"http:\/\/users.utu.fi\/shohos\/?page_id=2"},"modified":"2018-10-03T07:50:07","modified_gmt":"2018-10-03T07:50:07","slug":"publications","status":"publish","type":"page","link":"https:\/\/users.utu.fi\/shohos\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<h3>Journal Papers (2):<\/h3>\n<ol>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Sampsa Rauti, Samuel Laur\u00e8n, Jari-Matti M\u00e4kel\u00e4, Johannes Holvitie, Sami Hyrynsalmi, and Ville Lepp\u00e4nen: <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0950584918301484\"><span style=\"color: #0000ff\"><em>Using Diversification and Obfuscation Techniques for Software Security: a Systematic Literature Review<\/em><\/span><\/a>. Journal of Information and Software Technology (IST), 2018.<\/li>\n<li>Sampsa Rauti, Lauri Koivunen, Petteri M\u00e4k,\u00a0<strong>Shohreh Hosseinzadeh<\/strong>, Samuel Laur\u00e9n, Johannes Holvitie, Ville Lepp\u00e4nen. <a href=\"https:\/\/www.mdpi.com\/2224-2708\/7\/1\/12\"><span style=\"color: #0000ff\"><em>Internal Interface Diversification as a Security Measure in Sensor Networks<\/em><\/span><\/a>. Journal of Sensor and Actuator Networks. 2018 Mar 6;7(1):12.<\/li>\n<\/ol>\n<h3>Chapters in edited books (3)<\/h3>\n<ol>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Sami Hyrynsalmi, Ville Lepp\u00e4nen,\u00a0<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780128053959000149\"><span style=\"color: #0000ff\"><em>Obfuscation and Diversification for Securing the Internet of Things (IoT)<\/em><\/span><\/a>. In: Rajkumar Buyya, Amir Vahid Dastjerdi (Eds.),\u00a0Internet of Things: Principles and Paradigms, 259\u2013274, Elsevier, 2016.<\/li>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Samuel Laur\u00e9n, Sampsa Rauti, Sami Hyrynsalmi, Mauro Conti, Ville Lepp\u00e4nen,<em>\u00a0<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-54380-2_8\"><span style=\"color: #0000ff\">Obfuscation and Diversification for Securing Cloud Computing<\/span><\/a><\/em>. In: Victor Chang, Muthu Ramachandran, Robert J. Walters, Gary Wills (Eds.),\u00a0Enterprise Security, Lecture Notes in Computer Science 10131, 179\u2013202, Springer, 2017.<\/li>\n<li><span class=\"authors__name\">Rehana\u00a0Yasmin,\u00a0<\/span><span class=\"authors__name\">Mohammad\u00a0Reza\u00a0Memarian,\u00a0<\/span><span class=\"authors__name\"><strong>Shohreh\u00a0Hosseinzadeh<\/strong>,\u00a0<\/span><span class=\"authors__name\">Mauro\u00a0Conti,\u00a0<\/span><span class=\"authors__name\">Ville\u00a0Lepp\u00e4nen<\/span> (2018) <a href=\"https:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-73951-9_13\"><span style=\"color: #0000ff\"><em>Investigating the Possibility of Data Leakage in Time of Live VM Migration<\/em><\/span><\/a>. In: Dehghantanha A., Conti M., Dargahi T. (eds) Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham<\/li>\n<\/ol>\n<h3>Articles in proceedings (12)<\/h3>\n<ol>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Hans Liljestrand, Ville Lepp\u00e4nen, Andrew Paverd. <a href=\"https:\/\/arxiv.org\/abs\/1808.06478\"><span style=\"color: #0000ff\"><em>Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization<\/em><\/span><\/a>. arXiv preprint arXiv:1808.06478. 2018 Aug 20.<\/li>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Samuel Laur\u00e9n, Ville Lepp\u00e4nen, <span style=\"color: #333399\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7881635\/\"><span style=\"color: #0000ff\"><em>Security in Container-based Virtualization through vTPM<\/em><\/span><\/a>.<\/span> In:\u00a0<em>2016 IEEE\/ACM 9th International Conference on Utility and Cloud Computing (UCC)<\/em>, Shanghai, 2016, pp. 214-219.<\/li>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Sami Hyrynsalmi, Mauro Conti, Ville Lepp\u00e4nen,\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7396208\/\"><span style=\"color: #0000ff\"><em>Security and Privacy in Cloud Computing via Obfuscation and Diversification: a Survey<\/em><\/span><\/a>. In:\u00a02015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 529\u2013535, IEEE, 2015.<\/li>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Sampsa Rauti, Sami Hyrynsalmi, Ville Lepp\u00e4nen,\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7374189\/\"><span style=\"color: #0000ff\"><em>Security in the Internet of Things through Obfuscation and Diversification<\/em><\/span><\/a>. In:\u00a02015 International Conference on Computing, Communication and Security (ICCCS), 1\u20135, IEEE, 2015.<\/li>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Sampsa Rauti, Samuel Laur\u00e8n, Jari-Matti M\u00e4kel\u00e4, Johannes Holvitie, Sami Hyrynsalmi, and Ville Lepp\u00e4nen: <a href=\"https:\/\/dl.acm.org\/citation.cfm?id=2983479\"><span style=\"color: #0000ff\"><em>A survey on aims and environments of Diversification and Obfuscation in Software Security<\/em><\/span><\/a>. In: 17th International Conference on Computer Systems and Technologies (CompSysTech\u201916), Pages 113-120, 2016.<\/li>\n<li><strong>Shohreh Hosseinzadeh<\/strong>, Natalia D\u00edaz Rodr\u00edguez, Seppo Virtanen, Johan Lilius, <a href=\"https:\/\/dl.acm.org\/citation.cfm?id=2928300\"><span style=\"color: #0000ff\"><em>A Semantic Security Framework and Context-Aware Role-Based Access Control Ontology for Smart Spaces<\/em><\/span><\/a>. In: Sven Groppe, Le Gruenwald (Eds.), International Workshop on Semantic Big Data, 8:1\u20138:6, ACM, 2016.<\/li>\n<li>Petteri M\u00e4ki, Sampsa Rauti, <strong>Shohreh Hosseinzadeh<\/strong>, Lauri Koivunen, Ville Lepp\u00e4nen, <a href=\"https:\/\/dl.acm.org\/citation.cfm?id=3007877\"><span style=\"color: #0000ff\"><em>Interface Diversification in IoT Operating Systems<\/em><\/span><\/a>. In:\u00a02016 IEEE\/ACM 9th International Conference on Utility and Cloud Computing (UCC 2016), Pages 304-309.<\/li>\n<li>Samuel Laur\u00e9n, Petteri M\u00e4ki, Sampsa Rauti, <strong>Shohreh Hosseinzadeh<\/strong>, Sami Hyrynsalmi, Ville Lepp\u00e4nen,\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7028170\/\"><span style=\"color: #0000ff\"><em>Symbol Diversification of Linux Binaries<\/em><\/span><\/a>. In: Charles A. Shonigun, Galyna A. Akmayeva (Eds.),\u00a0Proceedings of World Congress on Internet Security (WorldCIS-2014), 75\u201380, Infonomics Society, 2014.<\/li>\n<li>Sampsa Rauti, Samuel Laur\u00e9n, <strong>Shohreh Hosseinzadeh<\/strong>, Jari-Matti M\u00e4kel\u00e4, Sami Hyrynsalmi, Ville Lepp\u00e4nen, <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-27998-5_2\"><span style=\"color: #0000ff\"><em>Diversification of System Calls in Linux Binaries<\/em><\/span><\/a>. In:\u00a0Proceedings of the 6th International Conference on Trustworthy Systems (InTrust 2014), 255\u2013271, Beijing Institute of Technology, 2014.<\/li>\n<li>Sampsa\u00a0Rauti, Samuel\u00a0Laur\u00e9n, Joni\u00a0Uitto, <strong>Shohreh\u00a0Hosseinzadeh<\/strong>, Jukka\u00a0Ruohonen, Sami\u00a0Hyrynsalmi, Ville\u00a0Lepp\u00e4nen, <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-47560-8_10\"><span style=\"color: #0000ff\"><em>A Survey on Internal Interfaces Used by Exploits and Implementations on Interface Diversification<\/em><\/span><\/a>.\u00a0 In: Brumley B., R\u00f6ning J. (eds) Secure IT Systems. NordSec 2016. Lecture Notes in Computer Science, vol 10014. Springer, Cham.<\/li>\n<li>Aki Koivu, Lauri Koivunen, <strong>Shohreh Hosseinzadeh<\/strong>, Samuel Laur\u00e9n, Sami Hyrynsalmi, Sampsa Rauti, Ville Lepp\u00e4nen,\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7917121\/\"><span style=\"color: #0000ff\"><em>Software Security Considerations for IoT<\/em><\/span><\/a>. In:\u00a02016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 392\u2013397, IEEE, 2017.<\/li>\n<li>Marko Saarela, <strong>Shohreh Hosseinzadeh<\/strong>, Sami Hyrynsalmi, and Ville Lepp\u00e4nen, 2017. <a href=\"https:\/\/dl.acm.org\/citation.cfm?id=3134334\"><em><span style=\"color: #0000ff\">Measuring software security from the design of software<\/span><\/em><\/a>. In\u00a0<i>Proceedings of the 18th International Conference on Computer Systems and Technologies<\/i>\u00a0(pp. 179-186). ACM, 2017.<\/li>\n<\/ol>\n<h3><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Journal Papers (2): Shohreh Hosseinzadeh, Sampsa Rauti, Samuel Laur\u00e8n, Jari-Matti M\u00e4kel\u00e4, Johannes Holvitie, Sami Hyrynsalmi, and Ville Lepp\u00e4nen: Using Diversification and Obfuscation Techniques for Software Security: a Systematic Literature Review. Journal of Information and Software Technology (IST), 2018. Sampsa Rauti, Lauri Koivunen, Petteri M\u00e4k,\u00a0Shohreh Hosseinzadeh, Samuel Laur\u00e9n, Johannes Holvitie, Ville Lepp\u00e4nen. Internal Interface Diversification as [&hellip;]<\/p>\n","protected":false},"author":95,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5","page","type-page","status-publish","czr-hentry"],"_links":{"self":[{"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/pages\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":25,"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/pages\/5\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/media?parent=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}