Markku Antikainen
Markku Antikainen
Verified email at aalto.fi
TitleCited byYear
Spook in your network: Attacking an sdn with a compromised openflow switch
M Antikainen, T Aura, M Särelä
Nordic Conference on Secure IT Systems, 229-244, 2014
582014
Denial-of-service attacks in OpenFlow SDN networks
R Kandoi, M Antikainen
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
572015
Denial-of-service attacks in Bloom-filter-based forwarding
M Antikainen, T Aura, M Sarela
Networking, IEEE/ACM Transactions on 22 (5), 1463-1476, 2014
342014
Commitment-based device pairing with synchronized drawing
M Sethi, M Antikainen, T Aura
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
202014
Domain Isolation in a Multi-Tenant Software-Defined Network
A Ranjbar, M Antikainen, T Aura
8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
42015
Canopy: publish/subscribe with upgraph combination
S Tarkoma, M Antikainen
2010 INFOCOM IEEE Conference on Computer Communications Workshops, 1-6, 2010
42010
XBF: scaling up bloom-filter-based source routing
M Antikainen, L Wang, D Trossen, A Sathiaseelan
arXiv preprint arXiv:1602.05853, 2016
32016
On the security of in-packet bloom-filter forwarding (master thesis). aalto university. espoo, finland
M Antikainen
Master’s thesis, Aalto University, Espoo, Finland, June June, 2011
32011
Toward Secure Edge Networks Taming Device to Device (D2D) Communication in IoT
I Hafeez, AY Ding, M Antikainen, S Tarkoma
arXiv preprint arXiv:1712.05958, 2017
22017
A large-scale analysis of download portals and freeware installers
A Geniola, M Antikainen, T Aura
Nordic Conference on Secure IT Systems, 209-225, 2017
22017
Poster: IoTURVA: Securing Device-to-Device Communications for IoT
I Hafeez, AY Ding, M Antikainen, S Tarkoma
Proceedings of the 23rd Annual International Conference on Mobile Computing …, 2017
22017
On the Security of In-Packet Bloom-Filter Forwarding
M Antikainen
Aalto University, Kungliga Tekniska Högskolan, 2011
22011
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
T Bui, SP Rao, M Antikainen, VM Bojan, T Aura
27th USENIX Security Symposium (USENIX Security 18), 2018
12018
Commitment-based device-pairing protocol with synchronized drawings and comparison metrics
M Antikainen, M Sethi, S Matetic, T Aura
Pervasive and Mobile Computing 16, 205-219, 2015
12015
IoT-KEEPER: Securing IoT Communications in Edge Networks
I Hafeez, M Antikainen, AY Ding, S Tarkoma
arXiv preprint arXiv:1810.08415, 2018
2018
Real-Time IoT Device Activity Detection in Edge Networks
I Hafeez, AY Ding, M Antikainen, S Tarkoma
International Conference on Network and System Security, 221-236, 2018
2018
Man-in-the-Machine
T Bui, SP Rao, M Antikainen, VM Bojan, T Aura
Proceedings of the 27th USENIX Security Symposium August 15-17, Baltimore …, 2018
2018
Last mile authentication problem -- Exploiting the missing link in end-to-end secure communication
S Rao, T Bui, M Antikainen, T Aura
https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Thanh …, 2018
2018
Automated analysis of freeware installers promoted by download portals
A Geniola, M Antikainen, T Aura
computers & security 77, 209-225, 2018
2018
Security in Emerging Networking Technologies-Views on Internet of Things and Software-Defined Networking
M Antikainen
Aalto University, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20