The goal of the Secure Systems research group is to create new technologies and design and analysis methods for the development of secure computing and communication systems. The new technologies should be, at the same time, secure, easy to use, and inexpensive to deploy. As is typical for security research, our results also include the discovery of novel attacks and previously unknown classes of vulnerabilities in existing systems. Security against malicious attacks is a basic requirement for all network-connected services and products, and scientific research can provide both fundamental understanding of the security issues and practical solutions that enable product development.
- September 4: Saara Matala, Doctor of Technology and historian, who wrote the historical insight into the development of mobile trusted execution environments (TEEs) in Nokia smartphones 15+ years ago, believes that the better grasp people have of social matters, the better decisions they make. ’My personal mission is to spread the word that a well-rounded understanding of society makes for better engineers better equipped to solve the elaborate problems ahead.’ Read more of Saara’s thoughts from Aalto News.
- August 14: Hans Liljestrand will present “PAC it up: Towards Pointer Integrity using ARM Pointer Authentication” paper today at USENIX Security ’19.
- August 2: Mika Juuti, M.Sc. (Tech.), will defend the dissertation “Access Control and Machine Learning: Evasion and Defenses” at the Aalto University School of Science on August 19. In this dissertation, machine learning-reliant access control systems were examined.
- July 16: Lachlan Gunn presents his “Circumventing Cryptographic Deniability with Remote Attestation” paper today at the 19th Privacy Enhancing Technologies Symposium (PETS 2019) in Stockholm, Sweden.
- June 26: Our new blog post gives historical insight into the development of mobile trusted execution environments (TEEs) in Nokia smartphones 15+ years ago.
- June 19: Mika Juuti will present his PRADA: Protecting Against DNN Model Stealing Attacks paper today at the 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden.
- June 13: In our new blog post we show several ways that pointer authentication can be used to improve security, and prevent attackers from turning programmer errors into remote-code-execution vulnerabilities.
- June 6: Hans Liljestrand presented his PACStack (https://PACStack.github.io) poster and Thomas Nyman his HardScope (https://arxiv.org/abs/1705.10295 ) paper at DAC 2019.
Read older news from the News archive