Sampsa Rauti
Sampsa Rauti
Verified email at utu.fi
Title
Cited by
Cited by
Year
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
332018
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures
S Rauti, V Leppänen
Proceedings of the 13th International Conference on Computer Systems and …, 2012
272012
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
252015
A survey on anti-honeypot and anti-introspection methods
J Uitto, S Rauti, S Laurén, V Leppänen
World Conference on Information Systems and Technologies, 125-134, 2017
182017
A survey on fake entities as a method to detect and monitor malicious activity
S Rauti, V Leppänen
2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017
182017
Diversification of system calls in linux binaries
S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ...
International Conference on Trusted Systems, 15-35, 2014
182014
Symbol diversification of linux binaries
S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
World Congress on Internet Security (WorldCIS-2014), 74-79, 2014
172014
Analysis of the quality of points of interest in the most popular location-based games
S Laato, T Pietarinen, S Rauti, TH Laine
Proceedings of the 20th International Conference on Computer Systems and …, 2019
142019
Software security considerations for IoT
A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ...
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
142016
Interface diversification in IoT operating systems
P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
122016
Location-based games as exergames-from pokémon to the wizarding world
S Laato, S Hyrynsalmi, S Rauti, AKMN Islam, TH Laine
International Journal of Serious Games 7 (1), 79-95, 2020
112020
The effects playing pokémon go has on physical activity-a systematic literature review
S Laato, S Hyrynsalmi, S Rauti, E Sutinen
112020
Preventing malicious attacks by diversifying Linux shell commands.
J Uitto, S Rauti, JM Mäkelä, V Leppänen
SPLST, 206-220, 2015
112015
Diversifying SQL to prevent injection attacks
S Rauti, J Teuhola, V Leppänen
2015 IEEE Trustcom/BigDataSE/ISPA 1, 344-351, 2015
112015
A Proxy-Like Obfuscator for Web Application Protection.
S Rauti, V Leppänen
International Journal on Information Technologies & Security 6 (1), 2014
102014
A Review of Location-based Games-Do They All Support Exercise, Social Interaction and Cartographical Training?
S Laato, T Pietarinen, S Rauti, M Paloheimo, N Inaba, E Sutinen
Proceedings of the 11th International Conference on Computer Supported …, 2019
92019
An interface diversified honeypot for malware analysis
S Laurén, S Rauti, V Leppänen
Proccedings of the 10th European Conference on Software Architecture …, 2016
92016
Towards a diversification framework for operating system protection
S Rauti, J Holvitie, V Leppänen
Proceedings of the 15th International Conference on Computer Systems and …, 2014
92014
A case study on software vulnerability coordination
J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen
Information and Software Technology 103, 239-257, 2018
82018
Mining social networks of open source CVE coordination
J Ruohonen, S Hyrynsalmi, S Rauti, V Leppänen
Proceedings of the 27th International Workshop on Software Measurement and …, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20