Publications


This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.



Research area: Secure programming


2013


Wahlberg T, Paakkola P, Wieser C, Laakso M & Röning J (2013)
Kepler - Raising Browser Security Awareness. 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops (ICSTW) , 435-440 .
Info

2010


Halunen, Kimmo and Kortelainen, Juha and Kortelainen, Tuomas (2010)
Boyd, C. and Susilo, W. (2010)
Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions Eighth Australasian Information Security Conference (AISC 2010), ACS, Brisbane, Australia, 105:86-93.
Link Info

Halunen, Kimmo and Röning, Juha (2010)
Echizen, Isao and Kunihiro, Noboru and Sasaki, Ryoichi (2010)
Preimage Attacks against Variants of Very Smooth Hash Advances in Information and Computer Security, Springer Berlin / Heidelberg, 6434:251-266, 10.1007/978-3-642-16825-3_17.
Link Info

Jocelyn Aubert and Thomas Schaberreiter and Christophe Incoul and Djamel Khadraoui and Benjamin Gateau (2010)
Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures ARES, IEEE Computer Society, 262-267.
Link Info

Kortelainen, Juha, Halunen, Kimmo and Kortelainen, Tuomas (2010)
Multicollision attacks and generalized iterated hash functions Journal of Mathematical Cryptology.
Link Info

Pekka Pietikainen and Kati Karjalainen and Juha Roning and Juhani Eronen (2010)
Socio-technical Security Assessment of a VoIP System IEEE Computer Society, Los Alamitos, CA, USA, 141-147.
Info

R. Puuperä, K. Halunen (2010)
Tackling the Growing Complexity in Information Systems, Security in Futures Security in Change, 2010, proceedings not published yet .
Info

T. Kortelainen, J. Kortelainen, K. Halunen (2010)
Variants of Multicollision Attacks on Iterated Hash Functions, accepted to Inscrypt 2010 Springer-Verlag.
Info

Tokola T, Halunen K & Röning J (2010)
Benefits and arrangements of Bachelor's thesis in information engineering. Koli Calling 2009, accepted.
Info

2009


Anttila J, Kajava J, Röning J & Savola R (2009)
Tiedon valtaväylillä on turvallista kulkea ja toimia. , (1):55-61.
Info

Anttila J, Kajava J, Savola R & Röning J (2009)
Liiketoimintaprosessit - organisaation turvallisuuden ydinaihe. , (3):11-14.
Info

Anttila J, Kajava J, Savola R & Röning J (2009)
Tietoturvallisuuden hallinta ja varmistus - liiketoimintaprosessien kautta. , (4):19-23.
Info

Eronen J, Karjalainen K, Puuperä R, Kuusela E, Halunen K, Laakso M & Röning J (2009)
Software vulnerability vs. critical infrastructure - a case study of antivirus software. International Journal on Advances in Security, 2(1):72 - 89, ISSN 1942-2636.
Link Info

Eronen J, Pahlman S & Kuusela E (2009)
Järjestelmien tietoturvaan ei löydy oikotietä. (There is no shortcut to the software security.) Tietosuoja, 3:20-22.
Info

Halunen K, Rikula P & Röning J (2009)
Finding preimages of multiple passwords secured with VSH. Proc. ARES 2009, IEEE Computer Society Press, Los Alamitos, 499-503, ISBN 978-1-4244-3572-2 .
Info

Kajava J, Anttila J & Röning J (2009)
EU:n arktinen informaatiokeskus - Suomen ehdotus keskusteltavana. , (7):32-33.
Info

Kajava J, Anttila J & Röning J (2009)
Standardit auttavat tulevaisuuden osaajaa menestymään. , 8:28-29.
Info

Kajava J, Anttila J & Röning J (2009)
Liiketoiminnan johtamisessa tarvitaan tietoturvallisuuden hallinnan kansainvälisiä standardeja. , (6):34-37.
Info

Sánchez I, Kuusela E, Turpeinen S, Röning J & Riekki J (2009)
Botnet-inspired architecture for interactive spaces. Proc. of the 8th International Conference on Mobile and Ubiquitous Multimedia (MUM 09). 22-25 November, Cambridge, UK, 91-100, ISBN 978-1-60558-846-9.
Info

2008


Askola K, Puuperä R, Pietikäinen P, Eronen J, Laakso M, Halunen K & Röning J (2008)
Vulnerability Dependencies in Antivirus Software. Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '08), Cap Esterel, France, 273-278 , ISBN: 978-0-7695-3329-2.
Info

Halunen K, Rikula P & Röning J (2008)
On the Security of VSH in Password Schemes. Third International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, 828-833.
Info

Kajava J, Anttila J & Röning J (2008)
Miten tietoturvallisuuden hallinnan standardit voivat tukea kansainvälistä bisnestä? Suomen Turvallisuusalan Vuosikirja 2008-2009, Paulapress, 106-111.
Link Info

Kajava J, Anttila J, Röning J & Savola R (2008)
Taidolla tietoyhteiskunnan verkoissa. .
Info

Oulu University Secure Programming Group (2008)
Turvallisempien ohjelmistojen puolesta. Tietosuoja 3: 12-13.
Info

Pietikäinen P, Viide J & Röning J (2008)
Exploiting Causality and Communication Patterns in Network Data Analysis. 16th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2008), Cluj-Napoca, Transylvania, Romania, 114-119, ISBN: 978-1-4244-2028-5.
Info

Savola R, Röning J, Sederholm C, Heinonen J, Uusitalo I, Wieser C, Mantere M, Karppinen K, Karinsalo A & Karjalainen K (2008)
Tietoturvaa kaikille raudoille. Prosessori 12: 30-31.
Info

Schaberreiter T, Wieser C, Sánchez I, Riekki J & Röning J (2008)
An Enumeration of Rfid Related Threats. .
Info

Viide J, Helin A, Laakso M, Pietikäinen P, Seppänen M, Halunen K, Puuperä R & Röning J (2008)
Experiences with Model Inference Assisted Fuzzing. Proc. 2nd USENIX Workshop on Offensive Technologies (WOOT '08), San Jose, CA, 6 p.
Info

2007


Pelaez J, Fernandez E & Wieser C (2007)
Patterns for VoIP Signaling Protocol Architectures. Proc. 12th European Conference on Pattern Languages of Programs (EuroPLOP), Bavaria, Germany.
Info

Pelaez J, Fernandez E, Larrondo-Petrie M & Wieser C (2007)
Attack Patterns in VoIP. Proc. 14th Conference on Pattern Languages of Programs (PLoP), Illinois, USA.
Info

Tokola T, Puuperä R & Röning J. (2007)
Reshaping the introductory programming course Proc. of the ReflekTori 2007, Symposium of Enginering Education, Teaching and Learning Development Unit, Helsinki University of Technology, Finland, December 3-4, 138-140.
Info

Tokola T, Puuperä R, Askola K, Hietikko T & Röning J. (2007)
Student attitude towards automatic and manual exercise and evaluation systems Proceedings of the 19th Annual Workshop of the Psychology of Programming Interest Group, Joensuu, Finland, July 2-6, 2007, pp. 129-143.
Info

2006


Ahonen P, Karjalainen K, Kuusela E, Lehtonen S, Puuperä R, Röning J, Savola R, Tokola T, Uusitalo I. (2006)
Information Security in Wireless Networks. LUOTI-julkaisuja 9/2006.
Link Info

Eronen J & Röning J (2006)
Graphingwiki - a semantic wiki extension for visualising and inferring protocol depency. Proc. 1st SemWiki Workshop, June 11-14, Budva, Montenegro , 1-15.
Info

Kajava, J., Anttila, J., Varonen, R., Savola, R., Röning, J. (2006)
Information Security Standards and Global Business Proceedings of International Conference on Industrial Technology (ICIT 2006), December 15-17, 2006, Mumbai, India, pp. 2091-2095. .
Info

Kajava, J., Anttila, J., Varonen, R., Savola, R., Röning, J. (2006)
Senior Executives Commitment to Information Security - from Motivation to Responsibility International Conference on Computational Intelligence and Security (CIS2006), November 3-6, 2006, Guangzhou, China, pp. 1519-1522.
Info

Pietikäinen Pekka & Huttunen Lari. (2006)
Behavioral Study of Bot Obedience using Causal Relationship Analysis. Proc. 18th Annual FIRST Conference, Baltimore, MD. June 25-30, 2006.
Info

Tokola T. (2006)
Automaattinen esilabrajärjestelmä .
Info

Wieser C & Röning J. (2006)
Über die Verwundbarkeit von IP-Telefonie-Systemen. Proc. 13th Workshop Sicherheit in vernetzten Systemen, Hamburg, Germany, 1st-2nd March 2006.
Info

Wieser C, Röning J & Takanen A. (2006)
Security analysis and experiments for VoIP RTP media streams. Proc. 8th International Symposium on Systems and Information Security (SSI2006). Sao Jose dos Campos, Sao Paolo, Brazil, 08th-10th Nov, 2006.
Info

2005


Ahonen P, Eronen J, Holappa J, Kajava J, Kaksonen T, Karjalainen K, Koivisto J-P, Kuusela E, Ollikainen V, Rapeli M, Röning J, Sademies A ja Savola R. (2005)
Digi-tv:n tietoturvauhkat ja ratkaisut. Palvelunkehittäjän näkökulma. LUOTI-julkaisuja 2/2005.
Link Info

Ahonen P, Eronen J, Holappa J, Kaksonen T, Kajava J, Karjalainen K, Karppinen K, Rapeli M, Röning J, Sademies A, Savola R, Uusitalo I ja Wiander T. (2005)
Mobiilimaailman tietoturvauhkat ja ratkaisut. Palvelunkehittäjän näkökulma. LUOTI-julkaisuja 1/2005.
Info

2004


Havana T & Röning J (2004)
Attitudes and perceptions related to information security - Case: Rotuaari Proc. 30th Euromicro Conference, Rennes, France, 538 - 543.
Link Info

Takanen A, Vuorijärvi P, Laakso M & Röning J (2004)
Agents of responsibility in software vulnerability processes. Ethics and Information Technology, 6(2):93-110(18).
Link Info

2003


Havana T and Röning J. (2003)
Communication in Software Vulnerability Process. In proceedings of the 15th FIRST Conference on Computer Security Incident Handling. Ottawa, Canada, 2003.
Info

Havana T. (2003)
Communication in the Software Vulnerability Process. M.Sc. Thesis. 2003.
Info

2002


Havana T and Takanen A. (2002)
The Story Behind the SNMP Vulnerabilities. The Quarterly Newsletter of SNMP Technology, Comment, and Events. December 2002.
Info

Röning J, Kaksonen R and Takanen A. (2002)
Tietoverkkojen turvariskit - Ohjelmistovirheet uhka verkoille. Prosessori. January 2002.
Info

2001


Laakso M, Takanen A, Röning J. (2001)
Introducing constructive vulnerability disclosures In proceedings of the 13th FIRST Conference on Computer Security Incident Handling. Toulouse. June 17-22, 2001.
Link Info

2000


Takanen A, Laakso M, Eronen J & Röning J (2000)
Running malicious code by exploiting buffer overflows: a survey of publicly available exploits. Proc. 9th Annual EICAR Conference, March 4-7, Brussels, Belgium, 158-180.
Link Info