UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL people

Group by: Type | Date
Number of items: 35.

Article

Anderson, R; Murdoch, SJ; (2014) EMV: Why Payment Systems Fail. Communications of the ACM , 57 (6) 24 - 28. 10.1145/2602321. Green open access
file

Bano, S; Richter, P; Javed, M; Sundaresan, S; Durumeric, Z; Murdoch, S; Mortier, R; (2018) Scanning the Internet for Liveness. ACM SIGCOMM Computer Communication Review , 48 (2) pp. 2-9. 10.1145/3213232.3213234. Green open access
file

Becker, IF; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, S; Sasse, MA; (2017) International comparison of bank fraud reimbursement: customer perceptions and contractual terms. Journal of Cybersecurity , 3 (2) pp. 109-125. 10.1093/cybsec/tyx011. Green open access
file

Bohm, Nicholas; Christie, James; Ladkin, Peter Bernard; Littlewood, Bev; Marshall, Paul; Mason, Stephen; Newby, Martin; ... Thomas, Martyn; + view all (2022) Briefing Note: The legal rule that computers are presumed to be operating correctly – unforeseen and unjust consequences. Digital Evidence and Electronic Signature Law Review , 19 pp. 123-127. 10.14296/deeslr.v19i0.5476. Green open access
file

Bond, M; Choudary, O; Murdoch, SJ; Skorobogatov, S; Anderson, R; (2015) Be prepared: The EMV pre-play attack. IEEE Security & Privacy Green open access
file

Davitt, Killian; Ristea, Dan; Russell, Duncan; Murdoch, Steven J; (2024) CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser. Proceedings on Privacy Enhancing Technologies , 2024 (1) pp. 343-356. 10.56553/popets-2024-0020. (In press). Green open access
file

Elahi, T; Doucette, JA; Hosseini, H; Murdoch, SJ; Goldberg, I; (2016) A Framework for the Game-theoretic Analysis of Censorship Resistance. Proceedings on Privacy Enhancing Technologies , 2016 (4) pp. 83-101. 10.1515/popets-2016-0030. Green open access
file

Haddadi, H; Nithyanand, R; Khattak, S; Javed, M; Vallina-Rodriguez, N; Falahrastegar, M; Powles, JE; ... Murdoch, SJ; + view all (2016) The Adblocking Tug-of-War. ;login: The USENIX Magazine , 41 (4) pp. 41-43. Green open access
file

Herbert, SJ; Murdoch, SJ; Punskaya, E; (2014) Optimising node selection probabilities in multi-hop M/D/1 queuing networks to reduce latency of Tor. Electronics Letters , 50 (17) pp. 1205-1206. 10.1049/el.2014.2136. Green open access
file

Khattak, S; Elahi, T; Simon, L; Swanson, CM; Murdoch, SJ; Goldberg, I; (2016) SoK: Making Sense of Censorship Resistance Systems. Proceedings on Privacy Enhancing Technologies , 2016 (4) pp. 37-61. 10.1515/popets-2016-0028. Green open access
file

Murdoch, SJ; (2016) Insecure by Design: Protocols for Encrypted Phone Calls. Computer , 49 (3) pp. 25-33. 10.1109/MC.2016.70. Green open access
file

Watson, RNM; Norton, RM; Woodruff, J; Moore, SW; Neumann, PG; Anderson, J; Chisnall, D; ... Vadera, M; + view all (2016) Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro , 36 (5) pp. 38-49. 10.1109/MM.2016.84. Green open access
file

Book chapter

Murdoch, Steven J.; Seng, Daniel; Schafer, Burkhard; Mason, Stephen; (2021) The sources and characteristics of electronic evidence and artificial intelligence. In: Mason, S and Seng, D, (eds.) Electronic Evidence and Electronic Signatures. (pp. 1-50). University of London Press: London, UK. Green open access
file

Proceedings paper

Abadi, A; Murdoch, S; Zacharias, T; (2021) Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited. In: Computer Security – ESORICS 2021. ESORICS 2021. Proceedings, Part II. (pp. pp. 721-742). Springer: Cham, Switzerland. Green open access
file

Abadi, Aydin; Ristea, Dan; Grigor, Artem; Murdoch, Steven; (2025) Scalable Time-Lock Puzzle. In: (Proceedings) ACM ASIA Conference on Computer and Communications Security. Association for Computing Machinery (ACM): Hanoi, Vietnam. (In press). Green open access
file

Azouvi, S; Hicks, A; Murdoch, SJ; (2018) Incentives in Security Protocols. In: Matyáš, V and Švenda, P and Stajano, F and Christianson, B and Anderson, J, (eds.) Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. (pp. pp. 132-141). Springer: Cham, Switzerland. Green open access
file

Becker, I; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, SJ; Sasse, MA; (2016) International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. In: Proceedings of the 15th Annual Workshop on the Economics of Information Security (WEIS). Workshop on the Economics of Information Security (WEIS): Berkeley, CA, USA. (In press). Green open access
file

Bond, M; Choudary, O; Murdoch, SJ; Skorobogatov, S; Anderson, R; (2014) Chip and Skim: cloning EMV cards with the pre-play attack. In: Proceedings of the 35th IEEE Symposium on Security and Privacy 2014. (pp. pp. 49-64). IEEE: San Jose, CA, USA. Green open access
file

Gutmann, A; Murdoch, SJ; (2019) Taken Out of Context: Security Risks with Security Code AutoFill in iOS & macOS. In: Proceedings of Who Are You?! Adventures in Authentication Workshop (WAY 2019). USENIX: Santa Clara, CA, USA. (In press). Green open access
file

Hicks, A; Murdoch, S; (2020) Transparency Enhancing Technologies to Make Security Protocols Work for Humans. In: Cambridge International Workshop on Security Protocols Security Protocols 2019: Security Protocols XXVII. (pp. pp. 3-10). Springer: Cambridge, UK. Green open access
file

Ife, CC; Shen, Y; Murdoch, SJ; Stringhini, G; (2021) Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown. In: RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses. (pp. pp. 340-353). ACM: San Sebastian, Spain. Green open access
file

Ife, CC; Shen, Y; Murdoch, S; Stringhini, G; (2019) Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web. In: Galbraith, Steven and Russello, Giovanni and Susilo, Willy, (eds.) The Proceedings of the ACM ASIA Conference on Computer and Communications Security - Asia CCS '19. (pp. pp. 168-180). Association for Computing Machinery: New York, NY, USA. Green open access
file

Khattak, S; Fifield, D; Afroz, S; Javed, M; Sundaresan, S; Paxson, V; Murdoch, SJ; (2016) Do You See What I See? Differential Treatment of Anonymous Users. In: Proceedings of the NDSS Symposium 2016. Internet Society Green open access
file

Murdoch, SJ; (2014) Quantifying and measuring anonymity. In: Garcia-Alfaro, J and Lioudakis, G and Cuppens-Boulahia, N and Foley, S and Fitzgerald, WM, (eds.) Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers. (pp. 3 - 13). Springer Berlin Heidelberg: Berlin, Germany. Green open access
file

Murdoch, SJ; Anderson, R; (2014) Security Protocols and Evidence: Where Many Payment Systems Fail. In: Christin, N and SafaviNaini, R, (eds.) Proceedings of the International Conference on Financial Cryptography and Data Security FC 2014. (pp. pp. 21-32). Springer: Berlin, Heidelberg. Green open access
file

Murdoch, SJ; Becker, I; Abu-Salma, R; Anderson, R; Bohm, N; Hutchings, A; Sasse, MA; (2016) Are Payment Card Contracts Unfair? In: Grossklags, J and Preneel, B, (eds.) International Conference on Financial Cryptography and Data Security FC 2016: Financial Cryptography and Data Security. (pp. pp. 600-608). Springer Green open access
file

Murdoch, Steven; (2018) Incentives in Security Protocols (Transcript of Discussion). In: Matyáš, V and Švenda, P and Stajano, F and Christianson, B and Anderson, J, (eds.) Proceedings of Cambridge International Workshop on Security Protocols - Security Protocols XXVI. Security Protocols 2018. Lecture Notes in Computer Science, vol 11286. (pp. pp. 142-149). Springer: Cham. Green open access
file

Nithyanand, R; Khattak, S; Javed, M; Vallina-Rodriguez, N; Falahrastegar, M; Powles, JE; Cristofaro, ED; ... Murdoch, SJ; + view all (2016) Adblocking and Counter Blocking: A Slice of the Arms Race. In: Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16). USENIX: Austin, TX, USA. Green open access
file

Watson, RNM; Neumann, PG; Woodruff, J; Anderson, J; Anderson, R; Dave, N; Laurie, B; ... Saidi, H; + view all (2012) CHERI: a research platform deconflating hardware virtualisation and protection. In: McIlroy, R and Singer, J, (eds.) (Proceedings) RESoLVE 2012 (Runtime Environments, Systems, Layering and Virtualized Environments) Workshop, 3 March 2012, London, UK. Green open access
file

Watson, RNM; Woodruff, J; Neumann, PG; Moore, SW; Anderson, J; Chisnall, D; Dave, N; ... Vadera, M; + view all (2015) CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. In: Peisert, S and Bauer, L and Shmatikov, V, (eds.) Proceedings of 2015 IEEE Symposium on Security and Privacy. (pp. pp. 20-37). IEEE: San Jose, CA, USA. Green open access
file

Report

Bohm, Nicholas; Christie, James; Ladkin, Peter Bernard; Littlewood, Bev; Marshall, Paul; Mason, Stephen; Newby, Martin; + view all (2022) The legal rule that computers are presumed to be operating correctly – unforeseen and unjust consequences. Bentham's Gaze, Information Security Research & Education, University College London (UCL): London, UK. Green open access
file

Thesis

Murdoch, SJ; (2008) Covert Channel Vulnerabilities in Anonymity Systems. Doctoral thesis (Ph.D), University of Cambridge.

Dataset

Becker, IF; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, SJ; Sasse, A; (2017) International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. [Dataset]. UCL Computer Science: London, UK. Green open access
file

Becker, IF; Hutchings, A; Abu-Salma, R; Anderson, R; Bohm, N; Murdoch, SJ; Sasse, MA; (2016) International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. [Dataset]. UCL Computer Science Green open access
file

Murdoch, SJ; Becker, I; Abu-Salma, R; Anderson, R; Bohm, N; Hutchings, A; Sasse, A; (2015) Are payment card contracts unfair? [Dataset]. UCL Department of Computer Science: London, UK. Green open access
file

This list was generated on Sun Feb 1 05:25:59 2026 GMT.