Tomas Olovsson

Docent at Department of Computer Science and Engineering, Networks and Systems (Chalmers)

Projects

2016–2019

DEx: Identifiering , GAP-analyser och spridning av forskningsbehov inom fordons IT-säkerhet och Integritet

Tomas Olovsson Department of Computer Science and Engineering, Networks and Systems (Chalmers)
VINNOVA

2016–2019

Holistiskt angreppssätt att förbättra datasäkerhet (HoliSec)

Tomas Olovsson Department of Computer Science and Engineering, Networks and Systems (Chalmers)
VINNOVA

2015–2017

BAuD II: Storskalig insamling och analys av data för kunskapsdriven produktutveckling

Tomas Olovsson Department of Computer Science and Engineering, Networks and Systems (Chalmers)
VINNOVA

2012–2015

Security framework for vehicle communication

Tomas Olovsson Department of Computer Science and Engineering, Networks and Systems (Chalmers)
VINNOVA

2013–2016

HEAling Vulnerabilities to ENhance Software Security and Safety (HEAVENS)

Tomas Olovsson Department of Computer Science and Engineering, Networks and Systems (Chalmers)
VINNOVA

There might be more projects where Tomas Olovsson participates, but you have to be logged in as a Chalmers employee to see them.

Publications

2016

Security and Privacy for Big Data: A Systematic Literature Review

Boel Nelson, Tomas Olovsson,
Proceedings of the 3rd International Workshop on Privacy and Security of Big Data (PSBD 2016), p. 3693-3702
Conference paper - peer reviewed
2016

A risk assessment framework for automotive embedded systems

M.M. Islam, Aljoscha Lautenbach, C. Sandberg et al
CPSS 2016 - Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, Co-located with Asia CCS 2016, p. 3-14
Conference paper - peer reviewed
2015

Improving In-Vehicle Network Architectures Using Automated Partitioning Algorithms

Nasser Nowdehi, Pierre Kleberger, Tomas Olovsson et al
IEEE Vehicular Networking Conference (VNC), Proceedings. Kyoto, December 16-18, 2015. Vol. 2016-January, p. 259 - 266
Conference paper - peer reviewed
2015

Towards designing secure in-vehicle network architectures using community detection algorithms

Pierre Kleberger, Nasser Nowdehi, Tomas Olovsson et al
IEEE Vehicular Networking Conference (VNC), Proceedings. Paderborn, 3-5 Dec. 2014. Vol. 2015-January, p. 69-76
Conference paper - peer reviewed
2014

Securing Vehicle Diagnostics in Repair Shops

Pierre Kleberger, Tomas Olovsson,
Lecture Notes in Computer Science: 33rd International Conference on Computer Safety, Reliability, and Security (SAFECOMP), Florence, September 10-12, 2014.. Vol. 8666, p. 93-108
Conference paper - peer reviewed
2014

A Local Seed Selection Algorithm for Overlapping Community Detection

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas et al
The 2014 IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM), p. 1-8
Conference paper - peer reviewed
2014

Experiences from Implementing the ETSI ITS SecuredMessage Service

Nasser Nowdehi, Tomas Olovsson,
2014 IEEE Intelligent Vehicles Symposium. June 8 - 11, 2014, Dearborn, Michigan, USA, p. 1055-1060
Conference paper - peer reviewed
2014

Overlapping Communities for Identifying Misbehavior in Network Communications

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas et al
Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’14). Vol. 8443, p. 398-409
Conference paper - peer reviewed
2014

A Graph-Based Analysis of Medical Queries of a Swedish Health Care Portal

Farnaz Moradi, Ann-Marie Eklund, Dimitrios Kokkinakis et al
The Fifth International Workshop on Health Text Mining and Information Analysis (Louhi), p. 2-10
Conference paper - peer reviewed
2013

A First Security Analysis of a Secure Intermodal Goods Transport System

JONAS ANGHOLT, Mikael Wackerberg, Tomas Olovsson et al
Report
2013

Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties

Pierre Kleberger, Tomas Olovsson,
32nd International Conference on Computer Safety, Reliability, and Security (SAFECOMP), Toulouse, 24-27 September 2013. Vol. Lecture Notes in Computer Science (8153), p. 70-81
Conference paper - peer reviewed
2012

Mining Network-Level Communication Patterns of Email Traffic for Spotting Unsolicited Email

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas et al
Report
2012

The anti-social behavior of spam

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas et al
Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011, Gothenburg, 6-7 September 2011, p. 57
Conference paper - peer reviewed
2012

An In-Depth Analysis of the Security of the Connected Repair Shop

Pierre Kleberger, Tomas Olovsson, Erland Jonsson et al
The Seventh International Conference on Systems and Networks Communications (ICSNC), Proceedings. Lisbon, 18-23 November, 2012. IARIA., p. 99-107
Conference paper - peer reviewed
2012

Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links

Behrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olovsson et al
Secure IT Systems, Audun Jøsang & Bengt Carlsson, NordSec, Karlskrona, Sweden, October/November 2012. Vol. 7617, p. 184-198
Conference paper - peer reviewed
2012

An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas et al
Proceedings of the 11th International Symposium on Experimental Algorithms,, SEA 2012, Bordeaux, France, June 7-9, 2012. , p. 283-294
Conference paper - peer reviewed
2012

Towards Modeling Legitimate and Unsolicited Email Traffic Using Social Network Properties

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas et al
Proceedings of the Fifth Workshop on Social Network Systems, SNS'12. 5th Workshop on Social Network Systems, Bern,10 April 2012
Conference paper - peer reviewed
2011

Structural and Temporal Properties of Email and Spam Networks

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas et al
Report
2011

Mapping Systems Security Research at Chalmers

Magnus Almgren, Zhang Fu, Erland Jonsson et al
First SysSec Workshop (SysSec 2011), p. 67-70
Conference paper - peer reviewed
2011

A Framework for Assessing the Security of the Connected Car Infrastructure

Pierre Kleberger, Asrin Javaheri, Tomas Olovsson et al
The Sixth International Conference on Systems and Networks Communications (ICSNC), Proceedings. Barcelona, 23-29 October 2011. IARIA., p. 236-241
Conference paper - peer reviewed
2011

Security aspects of the in-vehicle network in the connected car

Pierre Kleberger, Tomas Olovsson, Erland Jonsson et al
IEEE Intelligent Vehicles Symposium, Proceedings. Baden-Baden, 5-9 June 2011, p. 528-533
Conference paper - peer reviewed
2011

On Collection of Large-Scale Multi-Purpose Datasets on Internet Backbone Links

Farnaz Moradi, Magnus Almgren, Wolfgang John et al
The First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2011, Salzburg, Austria, 10 April 2011, p. 62-69
Conference paper - peer reviewed
2010

Analyzing the Social Structure and Dynamics of E-mail and Spam in Massive Backbone Internet Traffic

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas et al
Report
2010

Passive Internet Measurement: Overview and Guidelines based on Experiences

Wolfgang John, Sven Tafvelin, Tomas Olovsson et al
Computer Communications. Vol. 33 (5), p. 533-550
Scientific journal article - peer reviewed
2009

Access management evolves over 20 years

Tomas Olovsson,
Secure Computing Magazine. Vol. 2009 (November), p. 4-5
Journal article - popular science
2009

An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones

Sheikh Mahbub Habib, Jacob Cyril, Tomas Olovsson et al
Journal of Networks. Vol. Vol 4 (No. 10, 2009), p. 968-975
Scientific journal article - peer reviewed
2008

De-perimeterization: How to make it a reality in a cost-effective way

Sheikh Mahbub Habib, jakob cyril, Tomas Olovsson et al
Acia Pacific Networking Group APNG 10th Camp 2008
Conference paper - peer reviewed
2008

A Practical Analysis of the Robustness and Stability of the Network Stack in Smartphones

Sheikh Mahbub Habib, Cyril Jacob, Tomas Olovsson et al
IEEE International Conference on Computer and Information Technology, ICCIT 2008
Conference paper - peer reviewed
2008

Detection of malicious Traffic on Backbone links via Packet Header Analysis

Wolfgang John, Tomas Olovsson,
Campus-Wide Information Systems. Vol. 25 (5), p. 342 - 358
Scientific journal article - peer reviewed
2008

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

Wolfgang John, Sven Tafvelin, Tomas Olovsson et al
PAM '08: Proceedings of the 9th International Conference on Passive and Active Measurement. Vol. 4979/2008, p. 192-201
Conference paper - peer reviewed
2005

The Jericho Forum: De-perimeterisation of network resources

Tomas Olovsson, Jamie Bodley-Scott,
Black Hat Conference 2005 / Jericho Challenge Winner
Conference paper - peer reviewed
1997

Security intrusion process: an empirical model

Erland Jonsson, Tomas Olovsson,
IEEE Aerospace and Electronic Systems Magazine. Vol. 12 (4), p. 7-17
Scientific journal article - peer reviewed
1997

A quantitative model of the security intrusion process based on attacker behavior

Erland Jonsson, Tomas Olovsson,
IEEE Transactions on Software Engineering. Vol. 23 (4), p. 235-245
Scientific journal article - peer reviewed
1996

Security Evaluation of a PC Network based on Intrusion Experiments

Ulf Gustafson, Erland Jonsson, Tomas Olovsson et al
SECURICOM 1996 - 14th Worldwide Congress on Computer and Communications Security Protection
Scientific journal article - peer reviewed
1996

An Empirical Model of the Security Intrusion Process

Erland Jonsson, Tomas Olovsson,
Proceedings of the Eleventh Annual Conference on Computer Assurance, 1996. COMPASS 1996. , p. 176-186
Scientific journal article - peer reviewed
1996

Security Assessment Based on Attacker Behavior

Erland Jonsson, Tomas Olovsson,
Nordic Workshop on Secure Computer Systems, NORDSEC '96
Conference paper - peer reviewed
1996

On the modelling of preventive security based on a PC network intrusion experiment

Ulf Gustafson, Erland Jonsson, Tomas Olovsson et al
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy. Vol. 1172, p. 242-252
Conference paper - peer reviewed
1996

An analysis of a secure system based on trusted components

Ulf Lindqvist, Tomas Olovsson, Erland Jonsson et al
IEEE Proceedings of the Eleventh Annual Conference on Computer Assurance, COMPASS '96, p. 213-223
Conference paper - peer reviewed
1995

Security Evaluation of a PC Network based on Intrusion Experiments

Ulf Gustafson, Erland Jonsson, Tomas Olovsson et al
Proc. 14th Int'l Congress on Computer and Communications Security, SECURICOM '96, Paris, France, p. 187-203
Conference paper - peer reviewed
1995

Towards operational measures of computer security: Experimentation and modelling

Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst et al
Predictably Secure Computing Systems, p. 555-572
Chapter in monograph, book
1994

Security in a Dependability Perspective

Erland Jonsson, Tomas Olovsson,
Nordic Seminar on Dependable Computing Systems 1994 (NSDCS '94), Lyngby, Denmark, p. 175-186
Conference paper - peer reviewed
1994

On measurement of operational security

Sarah Brocklehurst, Bev Littlewood, Tomas Olovsson et al
IEEE Aerospace and Electronic Systems Magazine. Vol. 9 (10), p. 7-16
Scientific journal article - peer reviewed
1993

Data Collection for Security Fault Forecasting - Pilot Experiment

Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst et al
Predictably Dependable Computing Systems (PDCS) First Year Report, p. 515-560
Scientific journal article - peer reviewed
1993

Security and Dependability - A Comparison of Concepts

Tomas Olovsson,
IASTED International Conference on Reliability, Quality Control and Risk Assessment, Cambridge, MA, USA., p. 167-172
Conference paper - peer reviewed
1992

On the Integration of Security and Dependability in Computer Systems

Erland Jonsson, Tomas Olovsson,
IASTED International Conference on Reliability, Quality Control and Risk Assessment Washington DC, USA, 1992, ISBN 0-88986-171-4, p. 93-97
Conference paper - peer reviewed
1992

Security forms for protection against vulnerabilities in computer systems

Tomas Olovsson, Erland Jonsson,
IASTED International conference on Reliability, Quality control and Risk Assessment, Washington DC, USA., p. 138-143
Conference paper - peer reviewed
1992

A Structured Approach to Computer Security

Tomas Olovsson,
Report