Analysis of Docker Security T Bui arXiv preprint arXiv:1501.02967, 2015 | 331 | 2015 |
Man-in-the-Machine: Exploiting Ill-Secured Communication inside the Computer T Bui, SP Rao, M Antikainen, VM Bojan, T Aura 27th USENIX Security Symposium (USENIX Security 18), 1511-1525, 2018 | 34 | 2018 |
Client-side Vulnerabilities in Commercial VPNs T Bui, S Rao, M Antikainen, T Aura Nordic Conference on Secure IT Systems, 103-119, 2019 | 22 | 2019 |
Pitfalls of Open Architecture: How Friends Can Exploit Your Cryptocurrency Wallet T Bui, SP Rao, M Antikainen, T Aura Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019 | 19 | 2019 |
Application of Public Ledgers to Revocation in Distributed Access Control T Bui, T Aura International Conference on Information and Communications Security, 781-792, 2018 | 14 | 2018 |
XSS Vulnerabilities in Cloud-Application Add-ons T Bui, S Rao, M Antikainen, T Aura Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 12 | 2020 |
Analysis of Topology Poisoning Attacks in Software-Defined Networking T Bui, M Antikainen, T Aura Nordic Conference on Secure IT Systems, 87-102, 2019 | 9 | 2019 |
Key Exchange with the Help of a Public Ledger T Bui, T Aura Cambridge International Workshop on Security Protocols, 123-136, 2017 | 9 | 2017 |
How Far Removed Are You? Scalable Privacy-preserving Estimation of Social Path Length with Social PaL M Nagy, T Bui, E De Cristofaro, N Asokan, J Ott, AR Sadeghi Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 5 | 2015 |
GPASS: A Password Manager with Group-based Access Control T Bui, T Aura Nordic Conference on Secure IT Systems, 229-244, 2017 | 3 | 2017 |
SpotShare and nearbyPeople: Applications of the Social PaL Framework M Nagy, T Bui, S Udar, N Asokan, J Ott Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 3 | 2015 |
Doctoral Dissertation: Security Failures in Modern Software T Bui Aalto University, 2021 | | 2021 |