Shohreh Hosseinzadeh
Shohreh Hosseinzadeh
Department of Information Technology, University of Turku
Verified email at utu.fi
Title
Cited by
Cited by
Year
A semantic security framework and context-aware role-based access control ontology for smart spaces
S Hosseinzadeh, S Virtanen, N Díaz-Rodríguez, J Lilius
Proceedings of the International Workshop on Semantic Big Data, 1-6, 2016
332016
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
312018
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
252015
Diversification of system calls in linux binaries
S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ...
International Conference on Trusted Systems, 15-35, 2014
182014
Symbol diversification of linux binaries
S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
World Congress on Internet Security (WorldCIS-2014), 74-79, 2014
172014
Software security considerations for IoT
A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ...
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
142016
Security in container-based virtualization through vTPM
S Hosseinzadeh, S Laurén, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
142016
Security and privacy in cloud computing via obfuscation and diversification: A survey
S Hosseinzadeh, S Hyrynsalmi, M Conti, V Leppänen
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
142015
Interface diversification in IoT operating systems
P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
122016
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd
arXiv preprint arXiv:1808.06478, 2018
102018
Obfuscation and Diversification for Securing the Internet of Things (IoT)
S Hosseinzadeh, S Hyrynsalmi, V Leppänen
Internet of Things: Principles and Paradigms, 259–274, 2016
102016
A survey on aims and environments of diversification and obfuscation in software security
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Proceedings of the 17th International Conference on Computer Systems and …, 2016
62016
Internal Interface Diversification as a Security Measure in Sensor Networks
S Rauti, L Koivunen, P Mäki, S Hosseinzadeh, S Laurén, J Holvitie, ...
Journal of Sensor and Actuator Networks 7 (1), 12, 2018
52018
A survey on internal interfaces used by exploits and implications on interface diversification
S Rauti, S Lauren, J Uitto, S Hosseinzadeh, J Ruohonen, S Hyrynsalmi, ...
Nordic Conference on Secure IT Systems, 152-168, 2016
52016
Obfuscation and diversification for securing cloud computing
S Hosseinzadeh, S Laurén, S Rauti, S Hyrynsalmi, M Conti, V Leppänen
International Workshop on Enterprise Security, 179-202, 2015
42015
Investigating the possibility of data leakage in time of live VM migration
R Yasmin, MR Memarian, S Hosseinzadeh, M Conti, V Leppänen
Cyber Threat Intelligence, 259-279, 2018
32018
A scalable distributed M3 platform on a low-power cluster
A Berg, P Karvinen, S Grönroos, F Wickström, S Hosseinzadeh, N Dıaz, ...
Open International M3 Semantic Interoperability Workshop 21, 49-58, 2013
32013
M3 interoperability for remote rehabilitation with kinect
ND Rodríguez, S Grönroos, F Wickström, P Karvinen, A Berg, ...
Open International M3 Semantic Interoperability Workshop 21, 153-163, 2013
22013
Recent trends in applying TPM to cloud computing
S Hosseinzadeh, B Sequeiros, PRM Inácio, V Leppänen
Security and Privacy 3 (1), e93, 2020
2020
Measuring software security from the design of software
M Saarela, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
Proceedings of the 18th International Conference on Computer Systems and …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20