Seguir
Shohreh Hosseinzadeh
Shohreh Hosseinzadeh
Department of Information Technology, University of Turku
Dirección de correo verificada de utu.fi
Título
Citado por
Citado por
Año
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
1062018
A semantic security framework and context-aware role-based access control ontology for smart spaces
S Hosseinzadeh, S Virtanen, N Díaz-Rodríguez, J Lilius
Proceedings of the International Workshop on Semantic Big Data, 1-6, 2016
502016
Security in container-based virtualization through vTPM
S Hosseinzadeh, S Laurén, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
392016
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd
arXiv preprint arXiv:1808.06478, 2018
302018
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
302015
Security and privacy in cloud computing via obfuscation and diversification: A survey
S Hosseinzadeh, S Hyrynsalmi, M Conti, V Leppänen
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
222015
Diversification of system calls in linux binaries
S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ...
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
222015
Interface diversification in IoT operating systems
P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
212016
Symbol diversification of linux binaries
S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
World Congress on Internet Security (WorldCIS-2014), 74-79, 2014
202014
Software security considerations for IoT
A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ...
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
192016
Obfuscation and Diversification for Securing the Internet of Things (IoT)
S Hosseinzadeh, S Hyrynsalmi, V Leppänen
Internet of Things: Principles and Paradigms, 259–274, 2016
172016
Recent trends in applying TPM to cloud computing
S Hosseinzadeh, B Sequeiros, PRM Inácio, V Leppänen
Security and Privacy 3 (1), e93, 2020
162020
A survey on aims and environments of diversification and obfuscation in software security
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Proceedings of the 17th International Conference on Computer Systems and …, 2016
102016
Internal interface diversification as a security measure in sensor networks
S Rauti, L Koivunen, P Mäki, S Hosseinzadeh, S Laurén, J Holvitie, ...
Journal of Sensor and Actuator Networks 7 (1), 12, 2018
82018
Investigating the possibility of data leakage in time of live VM migration
R Yasmin, MR Memarian, S Hosseinzadeh, M Conti, V Leppänen
Cyber Threat Intelligence, 259-279, 2018
72018
A survey on internal interfaces used by exploits and implications on interface diversification
S Rauti, S Lauren, J Uitto, S Hosseinzadeh, J Ruohonen, S Hyrynsalmi, ...
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
52016
Obfuscation and diversification for securing cloud computing
S Hosseinzadeh, S Laurén, S Rauti, S Hyrynsalmi, M Conti, V Leppänen
Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC …, 2017
42017
A scalable distributed M3 platform on a low-power cluster
A Berg, P Karvinen, S Grönroos, F Wickström, ND Rodrıguez, ...
Open International M3 Semantic Interoperability Workshop 21, 49-58, 2013
22013
Measuring software security from the design of software
M Saarela, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
Proceedings of the 18th International Conference on Computer Systems and …, 2017
12017
Diversification of System Calls in Linux Binaries
JM Mäkelä, S Hyrynsalmi, V Leppänen
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2016
2016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20