Linus Karlsson

Doctoral Student
More filtering options
  1. 2019
  2. Contributions to Preventive Measures in Cyber Security

    Linus Karlsson, 2019 Sep 30, Department of Electrical and Information Technology, Lund University. 205 p.

    Research output: ThesisDoctoral Thesis (compilation)

  3. A Recommender System for User-Specific Vulnerability Scoring

    Linus Karlsson, Pegah Nikbakht Bideh & Martin Hell, 2019 Aug, (Accepted/In press) CRiSIS 2019. Springer

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. Privacy-enabled Recommendations for Software Vulnerabilities

    Linus Karlsson & Nicolae Paladi, 2019, (Accepted/In press) The 17th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2019). IEEE--Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. 2018
  6. Trust Anchors in Software Defined Networks

    Nicolae Paladi, Linus Karlsson & Elbashir, K., 2018 Aug 7, 23rd European Symposium on Research in Computer Security, ESORICS 2018. Springer, Vol. 11099. p. 485-505 20 p. (Lecture Notes in Computer Science; vol. 11009).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  7. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 Jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, p. 273-294 22 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

    Cobleigh, A., Martin Hell, Linus Karlsson, Reimer, O., Jonathan Sönnerup & Wisenhoff, D., 2018, IEEE 22nd International Enterprise Distributed Object Computing Workshop. IEEE--Institute of Electrical and Electronics Engineers Inc., 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  9. 2017
  10. Safeguarding VNF Credentials with Intel SGX

    Nicolae Paladi & Linus Karlsson, 2017 Aug 22, SIGCOMM Posters and Demos '17. Association for Computing Machinery (ACM), p. 144-146

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 Feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  12. 2016
  13. Enabling Key Migration Between Non-Compatible TPM Versions

    Linus Karlsson & Martin Hell, 2016, Trust and Trustworthy Computing. Springer, Vol. 9824. p. 101-118 8 p. (Lecture Notes in Computer Science; vol. 9824).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. 2014
  15. eavesROP: Listening for ROP Payloads in Data Streams

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, Information Security/Lecture Notes in Computer Science. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (eds.). Springer, Vol. 8783. p. 413-424 (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  16. eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)

    Jämthagen, C., Linus Karlsson, Paul Stankovski & Martin Hell, 2014, (Unpublished) [Publisher information missing].

    Research output: Book/ReportReport

  17. Using TPM Secure Storage in Trusted High Availability Systems

    Martin Hell, Linus Karlsson, Ben Smeets & Mirosavljevic, J., 2014, Trusted Systems/Lecture Notes in Computer Science. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer, Vol. 9473. p. 243-258 (Lecture Notes in Computer Science; vol. 9473).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding