Browse by UCL people
Group by: Type | Date
Number of items: 35.
Article
Anderson, R;
Murdoch, SJ;
(2014)
EMV: Why Payment Systems Fail.
Communications of the ACM
, 57
(6)
24 - 28.
10.1145/2602321.
|
Bano, S;
Richter, P;
Javed, M;
Sundaresan, S;
Durumeric, Z;
Murdoch, S;
Mortier, R;
(2018)
Scanning the Internet for Liveness.
ACM SIGCOMM Computer Communication Review
, 48
(2)
pp. 2-9.
10.1145/3213232.3213234.
|
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, S;
Sasse, MA;
(2017)
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
Journal of Cybersecurity
, 3
(2)
pp. 109-125.
10.1093/cybsec/tyx011.
|
Bohm, Nicholas;
Christie, James;
Ladkin, Peter Bernard;
Littlewood, Bev;
Marshall, Paul;
Mason, Stephen;
Newby, Martin;
... Thomas, Martyn; + view all
(2022)
Briefing Note: The legal rule that computers are presumed
to be operating correctly – unforeseen and unjust
consequences.
Digital Evidence and Electronic Signature Law Review
, 19
pp. 123-127.
10.14296/deeslr.v19i0.5476.
|
Bond, M;
Choudary, O;
Murdoch, SJ;
Skorobogatov, S;
Anderson, R;
(2015)
Be prepared: The EMV pre-play attack.
IEEE Security & Privacy
|
Davitt, Killian;
Ristea, Dan;
Russell, Duncan;
Murdoch, Steven J;
(2024)
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser.
Proceedings on Privacy Enhancing Technologies
, 2024
(1)
pp. 343-356.
10.56553/popets-2024-0020.
(In press).
|
Elahi, T;
Doucette, JA;
Hosseini, H;
Murdoch, SJ;
Goldberg, I;
(2016)
A Framework for the Game-theoretic Analysis of Censorship Resistance.
Proceedings on Privacy Enhancing Technologies
, 2016
(4)
pp. 83-101.
10.1515/popets-2016-0030.
|
Haddadi, H;
Nithyanand, R;
Khattak, S;
Javed, M;
Vallina-Rodriguez, N;
Falahrastegar, M;
Powles, JE;
... Murdoch, SJ; + view all
(2016)
The Adblocking Tug-of-War.
;login: The USENIX Magazine
, 41
(4)
pp. 41-43.
|
Herbert, SJ;
Murdoch, SJ;
Punskaya, E;
(2014)
Optimising node selection probabilities in multi-hop M/D/1 queuing networks to reduce latency of Tor.
Electronics Letters
, 50
(17)
pp. 1205-1206.
10.1049/el.2014.2136.
|
Khattak, S;
Elahi, T;
Simon, L;
Swanson, CM;
Murdoch, SJ;
Goldberg, I;
(2016)
SoK: Making Sense of Censorship Resistance Systems.
Proceedings on Privacy Enhancing Technologies
, 2016
(4)
pp. 37-61.
10.1515/popets-2016-0028.
|
Murdoch, SJ;
(2016)
Insecure by Design: Protocols for Encrypted Phone Calls.
Computer
, 49
(3)
pp. 25-33.
10.1109/MC.2016.70.
|
Watson, RNM;
Norton, RM;
Woodruff, J;
Moore, SW;
Neumann, PG;
Anderson, J;
Chisnall, D;
... Vadera, M; + view all
(2016)
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture.
IEEE Micro
, 36
(5)
pp. 38-49.
10.1109/MM.2016.84.
|
Book chapter
Murdoch, Steven J.;
Seng, Daniel;
Schafer, Burkhard;
Mason, Stephen;
(2021)
The sources and characteristics of electronic evidence and artificial intelligence.
In: Mason, S and Seng, D, (eds.)
Electronic Evidence and Electronic Signatures.
(pp. 1-50).
University of London Press: London, UK.
|
Proceedings paper
Abadi, A;
Murdoch, S;
Zacharias, T;
(2021)
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited.
In:
Computer Security – ESORICS 2021. ESORICS 2021. Proceedings, Part II.
(pp. pp. 721-742).
Springer: Cham, Switzerland.
|
Abadi, Aydin;
Ristea, Dan;
Grigor, Artem;
Murdoch, Steven;
(2025)
Scalable Time-Lock Puzzle.
In:
(Proceedings) ACM ASIA Conference on Computer and Communications Security.
Association for Computing Machinery (ACM): Hanoi, Vietnam.
(In press).
|
Azouvi, S;
Hicks, A;
Murdoch, SJ;
(2018)
Incentives in Security Protocols.
In: Matyáš, V and Švenda, P and Stajano, F and Christianson, B and Anderson, J, (eds.)
Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers.
(pp. pp. 132-141).
Springer: Cham, Switzerland.
|
Becker, I;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, MA;
(2016)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
In:
Proceedings of the 15th Annual Workshop on the Economics of Information Security (WEIS).
Workshop on the Economics of Information Security (WEIS): Berkeley, CA, USA.
(In press).
|
Bond, M;
Choudary, O;
Murdoch, SJ;
Skorobogatov, S;
Anderson, R;
(2014)
Chip and Skim: cloning EMV cards with the pre-play attack.
In:
Proceedings of the 35th IEEE Symposium on Security and Privacy 2014.
(pp. pp. 49-64).
IEEE: San Jose, CA, USA.
|
Gutmann, A;
Murdoch, SJ;
(2019)
Taken Out of Context: Security Risks with Security Code AutoFill in iOS & macOS.
In:
Proceedings of Who Are You?! Adventures in Authentication Workshop (WAY 2019).
USENIX: Santa Clara, CA, USA.
(In press).
|
Hicks, A;
Murdoch, S;
(2020)
Transparency Enhancing Technologies to Make Security Protocols Work for Humans.
In:
Cambridge International Workshop on Security Protocols Security Protocols 2019: Security Protocols XXVII.
(pp. pp. 3-10).
Springer: Cambridge, UK.
|
Ife, CC;
Shen, Y;
Murdoch, SJ;
Stringhini, G;
(2021)
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown.
In:
RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses.
(pp. pp. 340-353).
ACM: San Sebastian, Spain.
|
Ife, CC;
Shen, Y;
Murdoch, S;
Stringhini, G;
(2019)
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
In: Galbraith, Steven and Russello, Giovanni and Susilo, Willy, (eds.)
The Proceedings of the ACM ASIA Conference on Computer and Communications Security - Asia CCS '19.
(pp. pp. 168-180).
Association for Computing Machinery: New York, NY, USA.
|
Khattak, S;
Fifield, D;
Afroz, S;
Javed, M;
Sundaresan, S;
Paxson, V;
Murdoch, SJ;
(2016)
Do You See What I See? Differential Treatment of Anonymous Users.
In:
Proceedings of the NDSS Symposium 2016.
Internet Society
|
Murdoch, SJ;
(2014)
Quantifying and measuring anonymity.
In: Garcia-Alfaro, J and Lioudakis, G and Cuppens-Boulahia, N and Foley, S and Fitzgerald, WM, (eds.)
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers.
(pp. 3 - 13).
Springer Berlin Heidelberg: Berlin, Germany.
|
Murdoch, SJ;
Anderson, R;
(2014)
Security Protocols and Evidence: Where Many Payment Systems Fail.
In: Christin, N and SafaviNaini, R, (eds.)
Proceedings of the International Conference on Financial Cryptography and Data Security FC 2014.
(pp. pp. 21-32).
Springer: Berlin, Heidelberg.
|
Murdoch, SJ;
Becker, I;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Hutchings, A;
Sasse, MA;
(2016)
Are Payment Card Contracts Unfair?
In: Grossklags, J and Preneel, B, (eds.)
International Conference on Financial Cryptography and Data Security FC 2016: Financial Cryptography and Data Security.
(pp. pp. 600-608).
Springer
|
Murdoch, Steven;
(2018)
Incentives in Security Protocols (Transcript of Discussion).
In: Matyáš, V and Švenda, P and Stajano, F and Christianson, B and Anderson, J, (eds.)
Proceedings of Cambridge International Workshop on Security Protocols - Security Protocols XXVI. Security Protocols 2018. Lecture Notes in Computer Science, vol 11286.
(pp. pp. 142-149).
Springer: Cham.
|
Nithyanand, R;
Khattak, S;
Javed, M;
Vallina-Rodriguez, N;
Falahrastegar, M;
Powles, JE;
Cristofaro, ED;
... Murdoch, SJ; + view all
(2016)
Adblocking and Counter Blocking: A Slice of the Arms Race.
In:
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16).
USENIX: Austin, TX, USA.
|
Watson, RNM;
Neumann, PG;
Woodruff, J;
Anderson, J;
Anderson, R;
Dave, N;
Laurie, B;
... Saidi, H; + view all
(2012)
CHERI: a research platform deconflating hardware virtualisation and protection.
In: McIlroy, R and Singer, J, (eds.)
(Proceedings) RESoLVE 2012 (Runtime Environments, Systems, Layering and Virtualized Environments) Workshop, 3 March 2012, London, UK.
|
Watson, RNM;
Woodruff, J;
Neumann, PG;
Moore, SW;
Anderson, J;
Chisnall, D;
Dave, N;
... Vadera, M; + view all
(2015)
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
In: Peisert, S and Bauer, L and Shmatikov, V, (eds.)
Proceedings of 2015 IEEE Symposium on Security and Privacy.
(pp. pp. 20-37).
IEEE: San Jose, CA, USA.
|
Report
Bohm, Nicholas;
Christie, James;
Ladkin, Peter Bernard;
Littlewood, Bev;
Marshall, Paul;
Mason, Stephen;
Newby, Martin;
+ view all
(2022)
The legal rule that computers are presumed to be operating correctly – unforeseen and unjust consequences.
Bentham's Gaze, Information Security Research & Education, University College London (UCL): London, UK.
|
Thesis
|
Murdoch, SJ;
(2008)
Covert Channel Vulnerabilities in Anonymity Systems.
Doctoral thesis (Ph.D), University of Cambridge.
|
Dataset
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, A;
(2017)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
[Dataset].
UCL Computer Science: London, UK.
|
Becker, IF;
Hutchings, A;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Murdoch, SJ;
Sasse, MA;
(2016)
International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms.
[Dataset].
UCL Computer Science
|
Murdoch, SJ;
Becker, I;
Abu-Salma, R;
Anderson, R;
Bohm, N;
Hutchings, A;
Sasse, A;
(2015)
Are payment card contracts unfair?
[Dataset].
UCL Department of Computer Science: London, UK.
|