Sampsa Rauti
Sampsa Rauti
Vahvistettu sähköpostiosoite verkkotunnuksessa utu.fi
Nimike
Viittaukset
Viittaukset
Vuosi
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures
S Rauti, V Leppänen
Proceedings of the 13th International Conference on Computer Systems and …, 2012
262012
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
222018
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
202015
A survey on fake entities as a method to detect and monitor malicious activity
S Rauti, V Leppänen
2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017
182017
Diversification of system calls in linux binaries
S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ...
International Conference on Trusted Systems, 15-35, 2014
172014
Symbol diversification of linux binaries
S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
World Congress on Internet Security (WorldCIS-2014), 74-79, 2014
162014
Software security considerations for IoT
A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ...
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
112016
A survey on anti-honeypot and anti-introspection methods
J Uitto, S Rauti, S Laurén, V Leppänen
World Conference on Information Systems and Technologies, 125-134, 2017
102017
Preventing malicious attacks by diversifying Linux shell commands.
J Uitto, S Rauti, JM Mäkelä, V Leppänen
SPLST, 206-220, 2015
102015
Diversifying SQL to prevent injection attacks
S Rauti, J Teuhola, V Leppänen
2015 IEEE Trustcom/BigDataSE/ISPA 1, 344-351, 2015
102015
A Proxy-Like Obfuscator for Web Application Protection.
S Rauti, V Leppänen
International Journal on Information Technologies & Security 6 (1), 2014
102014
Analysis of the quality of points of interest in the most popular location-based games
S Laato, T Pietarinen, S Rauti, TH Laine
Proceedings of the 20th International Conference on Computer Systems and …, 2019
92019
A case study on software vulnerability coordination
J Ruohonen, S Rauti, S Hyrynsalmi, V Leppänen
Information and Software Technology 103, 239-257, 2018
82018
Interface diversification in IoT operating systems
P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
82016
An interface diversified honeypot for malware analysis
S Laurén, S Rauti, V Leppänen
Proccedings of the 10th European Conference on Software Architecture …, 2016
82016
Towards a diversification framework for operating system protection
S Rauti, J Holvitie, V Leppänen
Proceedings of the 15th International Conference on Computer Systems and …, 2014
82014
Man-in-the-browser attacks in modern web browsers
S Rauti, V Leppänen
Emerging Trends in ICT Security, 469-480, 2014
82014
Location-based Games as Exergames-From Pokémon To The Wizarding World
S Laato, S Hyrynsalmi, S Rauti, AKMN Islam, TH Laine
International Journal of Serious Games 7 (1), 79-95, 2020
72020
The effects playing pokémon go has on physical activity-a systematic literature review
S Laato, S Hyrynsalmi, S Rauti, E Sutinen
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
62020
A survey on aims and environments of diversification and obfuscation in software security
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Proceedings of the 17th International Conference on Computer Systems and …, 2016
62016
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20