Skip to main content

Showing 1–23 of 23 results for author: Miettinen, M

.
  1. arXiv:2412.15784  [pdf, other

    cond-mat.mtrl-sci physics.comp-ph

    A detailed examination of polysilicon resistivity incorporating the grain size distribution

    Authors: Mikael Santonen, Antti Lahti, Zahra Jahanshah Rad, Mikko Miettinen, Masoud Ebrahimzadeh, Juha-Pekka Lehtiö, Enni Snellman, Pekka Laukkanen, Marko Punkkinen, Kalevi Kokko, Katja Parkkinen, Markus Eklund

    Abstract: Current transport in polysilicon is a complicated process with many factors to consider. The inhomogeneous nature of polysilicon with its differently shaped and sized grains is one such consideration. We have developed a method that enhances existing resistivity models with a two-dimensional extension that incorporates the grain size distribution using a Voronoi-based resistor network. We obtain g… ▽ More

    Submitted 20 December, 2024; originally announced December 2024.

    Comments: 7 pages, 7 figures, 2 tables

    Journal ref: IEEE Transactions on Electron Devices, Volume: 72, Issue: 3, March 2025

  2. arXiv:2403.12312  [pdf, other

    cond-mat.soft cond-mat.stat-mech physics.bio-ph

    Quantifying the efficiency of principal signal transmission modes in proteins

    Authors: Anil Kumar Sahoo, Richard Schwarzl, Markus S. Miettinen, Roland R. Netz

    Abstract: On the microscopic level, biological signal transmission relies on coordinated structural changes in allosteric proteins that involve sensor and effector modules. The timescales and microscopic details of signal transmission in proteins are often unclear, despite a plethora of structural information on signaling proteins. Based on linear-response theory, we develop a theoretical framework to defin… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  3. arXiv:2308.12072  [pdf, other

    cs.CR

    Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats

    Authors: Philipp Pütz, Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi

    Abstract: The Internet of Things (IoT) market is rapidly growing and is expected to double from 2020 to 2025. The increasing use of IoT devices, particularly in smart homes, raises crucial concerns about user privacy and security as these devices often handle sensitive and critical information. Inadequate security designs and implementations by IoT vendors can lead to significant vulnerabilities. To addre… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

  4. arXiv:2302.07589  [pdf, other

    cs.CR cs.LG

    ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

    Authors: Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi

    Abstract: IoT application domains, device diversity and connectivity are rapidly growing. IoT devices control various functions in smart homes and buildings, smart cities, and smart factories, making these devices an attractive target for attackers. On the other hand, the large variability of different application scenarios and inherent heterogeneity of devices make it very challenging to reliably detect ab… ▽ More

    Submitted 16 February, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: To appear in the 32nd USENIX Security Symposium, August 2022, Anaheim CA, USA

  5. arXiv:2210.07714  [pdf, other

    cs.CR cs.LG

    CrowdGuard: Federated Backdoor Detection in Federated Learning

    Authors: Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Federated Learning (FL) is a promising approach enabling multiple clients to train Deep Neural Networks (DNNs) collaboratively without sharing their local training data. However, FL is susceptible to backdoor (or targeted poisoning) attacks. These attacks are initiated by malicious clients who seek to compromise the learning process by introducing specific behaviors into the learned model that can… ▽ More

    Submitted 22 August, 2023; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. Phillip Rieger and Torsten Krauß contributed equally to this contribution. 19 pages, 8 figures, 5 tables, 4 algorithms, 5 equations

  6. arXiv:2202.06698  [pdf, other

    cs.CR

    Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges

    Authors: Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti

    Abstract: The COVID-19 pandemic has caused many countries to deploy novel digital contact tracing (DCT) systems to boost the efficiency of manual tracing of infection chains. In this paper, we systematically analyze DCT solutions and categorize them based on their design approaches and architectures. We analyze them with regard to effectiveness, security, privacy, and ethical aspects and compare prominent s… ▽ More

    Submitted 26 October, 2022; v1 submitted 14 February, 2022; originally announced February 2022.

    Comments: A core part of this paper is to be published in IEEE Transactions on Emerging Topics in Computing, DOI: 10.1109/TETC.2022.3216473

  7. DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection

    Authors: Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi

    Abstract: Federated Learning (FL) allows multiple clients to collaboratively train a Neural Network (NN) model on their private data without revealing the data. Recently, several targeted poisoning attacks against FL have been introduced. These attacks inject a backdoor into the resulting model that allows adversary-controlled inputs to be misclassified. Existing countermeasures against backdoor attacks are… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: 18 pages, 8 figures; to appear in the Network and Distributed System Security Symposium (NDSS)

  8. arXiv:2101.02281  [pdf, other

    cs.CR

    FLAME: Taming Backdoors in Federated Learning (Extended Version 1)

    Authors: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider

    Abstract: Federated Learning (FL) is a collaborative machine learning approach allowing participants to jointly train a model without having to share their private, potentially sensitive local datasets with others. Despite its benefits, FL is vulnerable to backdoor attacks, in which an adversary injects manipulated model updates into the model aggregation process so that the resulting model will provide tar… ▽ More

    Submitted 5 August, 2023; v1 submitted 6 January, 2021; originally announced January 2021.

    Comments: This extended version incorporates a novel section (Section 10) that provides a comprehensive analysis of recent proposed attacks, notably "3DFed: Adaptive and extensible framework for covert backdoor attack in federated learning" by Li et al. This new section addresses flawed assertions made in the papers that aim to bypass FLAME or misinterpreted its fundamental design principles

  9. arXiv:2009.06774  [pdf, other

    cond-mat.soft

    Decoupling of dipolar and hydrophobic motions in biological membranes

    Authors: Hanne S. Antila, Anika Wurl, O. H. Samuli Ollila, Markus S. Miettinen, Tiago M. Ferreira

    Abstract: Cells use homeostatic mechanisms to maintain an optimal composition of distinct types of phospholipids in cellular membranes. The hydrophilic dipolar layer at the membrane interface, composed of phospholipid headgroups, regulates the interactions between cell membranes and incoming molecules, nanoparticles, and viruses. On the other hand, the membrane hydrophobic core determines membrane thickness… ▽ More

    Submitted 12 July, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

  10. LeakyPick: IoT Audio Spy Detector

    Authors: Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi

    Abstract: Manufacturers of smart home Internet of Things (IoT) devices are increasingly adding voice assistant and audio monitoring features to a wide range of devices including smart speakers, televisions, thermostats, security systems, and doorbells. Consequently, many of these devices are equipped with microphones, raising significant privacy concerns: users may not always be aware of when audio recordin… ▽ More

    Submitted 12 November, 2020; v1 submitted 1 July, 2020; originally announced July 2020.

  11. arXiv:2006.05914  [pdf, other

    cs.CR cs.CY

    Mind the GAP: Security & Privacy Risks of Contact Tracing Apps

    Authors: Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl

    Abstract: Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy, the so-called "Google/Apple Proposal", which we abbreviate by "GAP". We demonstrate that in real-world scenarios the current GAP design is vulnerable to (i) profiling and possibly de-anonymizing infected persons, and (ii) relay-based wormhole… ▽ More

    Submitted 6 November, 2020; v1 submitted 10 June, 2020; originally announced June 2020.

  12. arXiv:1808.03071  [pdf, other

    cs.CR

    Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management

    Authors: Markus Miettinen, Paul C. van Oorschot, Ahmad-Reza Sadeghi

    Abstract: The emerging Internet of Things (IoT) drastically increases the number of connected devices in homes, workplaces and smart city infrastructures. This drives a need for means to not only ensure confidentiality of device-related communications, but for device configuration and management---ensuring that only legitimate devices are granted privileges to a local domain, that only authorized agents hav… ▽ More

    Submitted 9 August, 2018; originally announced August 2018.

  13. Peek-a-Boo: I see your smart home activities, even encrypted!

    Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac

    Abstract: A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploi… ▽ More

    Submitted 13 May, 2020; v1 submitted 8 August, 2018; originally announced August 2018.

    Comments: Update (May 13, 2020): This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8-10, 2020, Linz (Virtual Event), Austria, https://doi.org/10.1145/3395351.3399421

  14. arXiv:1804.07474  [pdf, other

    cs.CR

    DÏoT: A Federated Self-learning Anomaly Detection System for IoT

    Authors: Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi

    Abstract: IoT devices are increasingly deployed in daily life. Many of these devices are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have vulnerable IoT devices that are easy to compromise. This has led to a new category of malware specifically targeting IoT devices. However, existing intrusion detection techniques are not effective in d… ▽ More

    Submitted 10 May, 2019; v1 submitted 20 April, 2018; originally announced April 2018.

    Comments: Accepted version of paper to appear at ICDCS 2019, Dallas, TX, USA, July 2019

    Journal ref: Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS), 2019

  15. arXiv:1706.09165  [pdf, other

    cs.CR

    Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

    Authors: Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti

    Abstract: Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors' cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now offer discounts and financial rewards in exchange f… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

  16. IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Authors: Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma

    Abstract: With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing… ▽ More

    Submitted 13 December, 2016; v1 submitted 15 November, 2016; originally announced November 2016.

  17. arXiv:1309.2131  [pdf, ps, other

    physics.bio-ph cond-mat.soft q-bio.BM

    Towards atomistic resolution structure of phosphatidylcholine glycerol backbone and choline headgroup at different ambient conditions

    Authors: Alexandru Botan, Andrea Catte, Fernando Favela, Patrick Fuchs, Matti Javanainen, Waldemar Kulig, Antti Lamberg, Markus S. Miettinen, Luca Monticelli, Jukka Määttä, Vasily S. Oganesyan, O. H. Samuli Ollila, Marius Retegan, Hubert Santuz, Joona Tynkkynen

    Abstract: Phospholipids are essential building blocks of biological membranes. Despite of vast amount of accurate experimental data the atomistic resolution structures sampled by the glycerol backbone and choline headgroup in phoshatidylcholine bilayers are not known. Atomistic resolution molecular dynamics simulation model would automatically resolve the structures giving an interpretation of experimental… ▽ More

    Submitted 14 January, 2015; v1 submitted 9 September, 2013; originally announced September 2013.

    Comments: The manuscript is discussed at http://nmrlipids.blogspot.fi, authors are in alphaphetical order

  18. ConXsense - Automated Context Classification for Context-Aware Access Control

    Authors: Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan

    Abstract: We present ConXsense, the first framework for context-aware access control on mobile devices based on context classification. Previous context-aware access control systems often require users to laboriously specify detailed policies or they rely on pre-defined policies not adequately reflecting the true preferences of users. We present the design and implementation of a context-aware framework tha… ▽ More

    Submitted 5 June, 2014; v1 submitted 13 August, 2013; originally announced August 2013.

    Comments: Recipient of the Best Paper Award

    ACM Class: D.4.6

    Journal ref: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), pp. 293-304, June 4-6, Kyoto, Japan, ACM, 2014

  19. arXiv:hep-th/9908178  [pdf, ps, other

    hep-th hep-lat hep-ph nucl-th

    Aspects of Duality and Confining Strings

    Authors: Mauri Miettinen, Antti J. Niemi, Yuri Stroganov

    Abstract: We inspect the excitation energy spectrum of a confining string in terms of solitons in an effective field theory model. The spectrum can be characterized by a spectral function, and twisting and bending of the string is manifested by the invariance of this function under a duality transformation. Both general considerations and numerical simulations reveal that the spectral function can be appr… ▽ More

    Submitted 1 September, 1999; v1 submitted 27 August, 1999; originally announced August 1999.

    Comments: refinement of certain arguments

    Journal ref: Phys.Lett. B474 (2000) 303-308

  20. On the Arnold Conjecture and the Atiyah-Patodi-Singer Index Theorem

    Authors: Mauri Miettinen, Antti J. Niemi

    Abstract: The Arnold conjecture yields a lower bound to the number of periodic classical trajectories in a Hamiltonian system. Here we count these trajectories with the help of a path integral, which we inspect using properties of the spectral flow of a Dirac operator in the background of a $\Sp(2N)$ valued gauge field. We compute the spectral flow from the Atiyah-Patodi-Singer index theorem, and apply th… ▽ More

    Submitted 25 August, 1999; v1 submitted 20 August, 1999; originally announced August 1999.

    Comments: 12 pages, references corrected

    Journal ref: Phys.Lett. B461 (1999) 89-94

  21. arXiv:hep-th/9612209  [pdf, ps, other

    hep-th

    Weil Algebras and Supersymmetry

    Authors: Mauri Miettinen

    Abstract: We give a new interpretation for the super loop space that has been used to formulate supersymmetry. The fermionic coordinates in the super loop space are identified as the odd generators of the Weil algebra. Their bosonic superpartners are the auxiliary fields. The general N=1 supermultiplet is interpreted in terms of Weil algebras. As specific examples we consider supersymmetric quantum mechan… ▽ More

    Submitted 20 December, 1996; originally announced December 1996.

    Comments: 12 pages, LaTeX

    Report number: UU-ITP27/96

  22. Antibrackets, Supersymmetric $σ$-Model and Localization

    Authors: Mauri Miettinen

    Abstract: We consider supersymmetrization of Hamiltonian dynamics via antibrackets for systems whose Hamiltonian generates an isometry of the phase space. We find that the models are closely related to the supersymmetric non-linear $σ$-model. We interpret the corres\-ponding path integrals in terms of super loop space equivariant cohomology. It turns out that they can be evaluated exactly using localizati… ▽ More

    Submitted 14 June, 1996; originally announced June 1996.

    Comments: 9, pages, standard LaTex

    Report number: UU-ITP 14-1996

    Journal ref: Phys.Lett. B388 (1996) 309-314

  23. On Localization and Regularization

    Authors: Mauri Miettinen

    Abstract: Different regularizations are studied in localization of path integrals. We discuss the effect of the choice of regularization by evaluating the partition functions for the harmonic oscillator and the Weyl character for SU(2). In particular, we solve the Weyl shift problem that arises in path integral evaluation of the Weyl character by using the Atiyah-Patodi-Singer $η$-invariant and the Borel-… ▽ More

    Submitted 24 August, 1995; originally announced August 1995.

    Comments: 15 pages, LaTeX

    Report number: UU-ITP 14-1995

    Journal ref: J.Math.Phys. 37 (1996) 3141-3152