Diversification and obfuscation techniques for software security: A systematic literature review S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ... Information and Software Technology 104, 72-93, 2018 | 28 | 2018 |
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures S Rauti, V Leppänen Proceedings of the 13th International Conference on Computer Systems and …, 2012 | 26 | 2012 |
Security in the internet of things through obfuscation and diversification S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen 2015 International Conference on Computing, Communication and Security …, 2015 | 23 | 2015 |
A survey on fake entities as a method to detect and monitor malicious activity S Rauti, V Leppänen 2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017 | 18 | 2017 |
Diversification of system calls in linux binaries S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ... International Conference on Trusted Systems, 15-35, 2014 | 17 | 2014 |
Symbol diversification of linux binaries S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen World Congress on Internet Security (WorldCIS-2014), 74-79, 2014 | 17 | 2014 |
A survey on anti-honeypot and anti-introspection methods J Uitto, S Rauti, S Laurén, V Leppänen World Conference on Information Systems and Technologies, 125-134, 2017 | 15 | 2017 |
Analysis of the quality of points of interest in the most popular location-based games S Laato, T Pietarinen, S Rauti, TH Laine Proceedings of the 20th International Conference on Computer Systems and …, 2019 | 13 | 2019 |
Software security considerations for IoT A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ... 2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016 | 13 | 2016 |
Interface diversification in IoT operating systems P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen Proceedings of the 9th International Conference on Utility and Cloud …, 2016 | 11 | 2016 |
Preventing malicious attacks by diversifying Linux shell commands. J Uitto, S Rauti, JM Mäkelä, V Leppänen SPLST, 206-220, 2015 | 10 | 2015 |
Diversifying SQL to prevent injection attacks S Rauti, J Teuhola, V Leppänen 2015 IEEE Trustcom/BigDataSE/ISPA 1, 344-351, 2015 | 10 | 2015 |
A Proxy-Like Obfuscator for Web Application Protection. S Rauti, V Leppänen International Journal on Information Technologies & Security 6 (1), 2014 | 10 | 2014 |
Location-based games as exergames-from pokémon to the wizarding world S Laato, S Hyrynsalmi, S Rauti, AKMN Islam, TH Laine International Journal of Serious Games 7 (1), 79-95, 2020 | 9 | 2020 |
The effects playing pokémon go has on physical activity-a systematic literature review S Laato, S Hyrynsalmi, S Rauti, E Sutinen | 9 | 2020 |
A Review of Location-based Games-Do They All Support Exercise, Social Interaction and Cartographical Training? S Laato, T Pietarinen, S Rauti, M Paloheimo, N Inaba, E Sutinen Proceedings of the 11th International Conference on Computer Supported …, 2019 | 9 | 2019 |
An interface diversified honeypot for malware analysis S Laurén, S Rauti, V Leppänen Proccedings of the 10th European Conference on Software Architecture …, 2016 | 9 | 2016 |
Towards a diversification framework for operating system protection S Rauti, J Holvitie, V Leppänen Proceedings of the 15th International Conference on Computer Systems and …, 2014 | 9 | 2014 |
Man-in-the-browser attacks in modern web browsers S Rauti, V Leppänen Emerging Trends in ICT Security, 469-480, 2014 | 8 | 2014 |
A case study on software vulnerability coordination J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen Information and Software Technology 103, 239-257, 2018 | 7 | 2018 |