Sami Hyrynsalmi

Learn More
Multi-homing, a strategy where a developer is publishing products for multiple platforms, is studied in this paper using descriptive analysis. The data of over 850,000 applications and their developers were collected from Apple App Store, Google Play, and Microsoft’s Windows Phone Marketplace. The developers publishing for several software ecosystems were(More)
A software defect that exposes a software system to a cyber security attack is known as a software vulnerability. A software security exploit is an engineered software solution that successfully exploits the vulnerability. Exploits are used to break into computer systems, but exploits are currently used also for security testing, security analytics,(More)
A major reason for the popularity of agile and lean software methods is their capability to function in resource scarce and requirement erratic environments. Both of these characteristics cause accumulation of technical debt, something that is the end result of either intentional or unintentional decisions. The ability of these methods to function with(More)
Mobile application stores have revolutionised the dynamics of mobile ecosystems. Research on mobile application ecosystems has been significantly driven by data that is focused on the visualisation of an ecosystem’s dynamics. This is a valuable step towards understanding the nature of the ecosystems, but it is limited in its explanatory power. Thus, a(More)
There is a wide area of applications that use embedded systems, and the number of such systems keeps growing. The required functionality and complexity of embedded systems are also constantly increasing, and development of such products is becoming increasingly harder. This requires new thinking on the product development processes, and one such emerging(More)
In this paper, we advocate large-scale diversification as a method to protect operating systems and render malicious programs ineffective. The idea is to diversify all the indirect library entry points to the system calls on a specific computer. As a result, it becomes very difficult for a piece of malware to access resources. The diversification of(More)
Internet of Things (IoT) is composed of heterogeneous embedded and wearable sensors and devices that collect and share information over the Internet. This may contain private information of the users. Thus, securing the information and preserving the privacy of the users are of paramount importance. In this paper we look into the possibility of applying the(More)