1. 2021
  2. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Forthcoming

    Detecting video-game injectors exchanged in game cheating communities

    Blasco Alis, J., Karkallis, P., Pastrana, S. & Suarez de Tangil Rotaeche, G., 19 Jul 2021, (Accepted/In press) 26th European Symposium on Research in Computer Security (ESORICS) 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Forthcoming

    Dos and Don'ts of Machine Learning in Computer Security

    Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., Cavallaro, L. & Rieck, K., 16 Jul 2021, (Accepted/In press) 31st USENIX Security Symposium (USENIX Sec). 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    Active Agency, Access and Power

    Salojarvi, V. & Jensen, R. B., 9 Jul 2021, (Accepted/In press) In: Media, War & Conflict.

    Research output: Contribution to journalArticlepeer-review

  6. Forthcoming

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco Alis, J., 1 Jul 2021, (Accepted/In press) Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., Jul 2021, ISSAC 2021. ACM, p. 289-296 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem

    Albrecht, M. & Heninger, N., 16 Jun 2021, (E-pub ahead of print) EUROCRYPT 2021. Springer, (Lecture Notes in Computer Science; vol. 12696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Forthcoming

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 9 Jun 2021, (Accepted/In press) Proceedings of TrustBUS 2021: September 2021. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 8 Jun 2021, In: Digital Threats: Research and Practice. 2, 3

    Research output: Contribution to journalArticlepeer-review

  11. Forthcoming

    Privacy-preserving biometric matching using homomorphic encryption

    Pradel, G. & Mitchell, C., 6 Jun 2021, (Accepted/In press) Proceedings of IEEE TrustCom 2021: August 2021. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Forthcoming

    Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance

    Albrecht, M., Bai, S., Li, J. & Rowell, J., 21 May 2021, (Accepted/In press) CRYPTO 2021. Springer, (https://eprint.iacr.org/2020/1260.pdf)(Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Forthcoming

    Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices

    Albrecht, M. & Lai, R., 21 May 2021, (Accepted/In press) CRYPTO 2021. Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    Mesh Messaging in Large-scale Protests: Breaking Bridgefy

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 11 May 2021, (E-pub ahead of print) CT-RSA 2021. Springer, p. 375-398 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    On the Success Probability of Solving Unique SVP via BKZ

    Postlethwaite, E. & Virdia, F., 1 May 2021, Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key CryptographyVirtual Event, May 10–13, 2021 Proceedings, Part I. Springer, p. 68-98 31 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  16. E-pub ahead of print

    Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 1 May 2021, (E-pub ahead of print) PKC 2021. Springer, p. 261-289 29 p. (Lecture Notes in Computer Science; vol. 12711).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Shepherd, C., Markantonakis, K. & Jaloyan, G-A., May 2021, IEEE Workshop on the Internet of Safe Things: IEEE Security and Privacy Workshops (in conjunction with IEEE Security & Privacy '21). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Forthcoming

    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 30 Apr 2021, (Accepted/In press) USENIX.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Forthcoming

    "Computer Says No": Exploring social justice in digital services

    Crivellaro, C., Coles-Kemp, L. & Wood, K., 26 Apr 2021, (Accepted/In press) Hope Under Neoliberal Austerity: Responses from Civil Society and Civic Universities. Steer, M., Davoudi, S., Shucksmith, M. & Todd, L. (eds.). Policy Press, p. 89-104 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Oblique: Accelerating Page Loads Using Symbolic Execution

    Ko, R., Mickens, J., Loring, B. & Netravali, R., Apr 2021, NSDI 2021. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 17 p.

    Research output: Contribution to journalArticlepeer-review

  23. Unpublished

    Practical Dynamic Symbolic Execution for JavaScript

    Loring, B., 16 Mar 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  24. E-pub ahead of print

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Higgins, M., Mayes, K. & Teng, F., 10 Mar 2021, (E-pub ahead of print) In: IET Cyber-Physical Systems: Theory & Applications. 6, 1, p. 12-26 15 p.

    Research output: Contribution to journalArticlepeer-review

  25. Submitted

    Improving Convergence and Practicality of Slide-type Reductions

    Li, J. & Walter, M., 9 Mar 2021, (Submitted) In: Submitted.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Privacy-certification standards for extended-reality devices and services

    Happa, J., Steed, A. & Glencross, M., Mar 2021.

    Research output: Contribution to conferencePaperpeer-review

  27. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  28. Forthcoming

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 13 Feb 2021, (Accepted/In press) In: ACM Transactions on Privacy and Security.

    Research output: Contribution to journalArticlepeer-review

  29. E-pub ahead of print

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K. & Markantonakis, K., 12 Feb 2021, (E-pub ahead of print) In: IEEE Internet of Things Journal.

    Research output: Contribution to journalArticlepeer-review

  30. E-pub ahead of print

    Malware vs Anti-Malware Battle - Gotta Evade 'em All!

    Chaffey, E. J. & Sgandurra, D., 9 Feb 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  31. E-pub ahead of print

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 9 Feb 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  32. E-pub ahead of print

    Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns

    Da Silva, J., 9 Feb 2021, (E-pub ahead of print) In: Methodological Innovations.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time

    Kalbantner, J., Markantonakis, K., Hurley-Smith, D., Akram, R. N. & Semal, B., 25 Jan 2021, In: Energies. 14, 3, p. 1-25 25 p., 606.

    Research output: Contribution to journalArticlepeer-review

  34. Published
  35. Published

    Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums

    Butler, S., 2021, Part of the Lecture Notes in Computer Science book series (LNCS, volume 12812). Springer, Vol. 12812. p. 135-153

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Deception in Network Defences using Unpredictability

    Happa, J., Bashford-Rogers, T., Janse van Rensburg, A., Goldsmith, M. & Creese, S., 2021, In: Digital Threats: Research and Practice.

    Research output: Contribution to journalArticlepeer-review

  37. Unpublished
  38. Published
  39. Unpublished

    Post-Quantum Cryptography: Cryptanalysis and Implementation

    Virdia, F., 2021, (Unpublished) 256 p.

    Research output: ThesisDoctoral Thesis

  40. 2020
  41. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, (E-pub ahead of print) p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  43. Published

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 24 Dec 2020, Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. Springer, p. 56-73 18 p. (Lecture Notes in Computer Science; vol. 12580).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Inclusive security: Digital security meets web science

    Coles-Kemp, L., 23 Dec 2020, In: Foundations and Trends in Web Science. 7, 2, p. 88-241 154 p.

    Research output: Contribution to journalReview articlepeer-review

  45. Published

    Improved privacy-preserving training using fixed-Hessian minimisation

    Ogilvie, T., Player, R. & Rowell, J., 15 Dec 2020, Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography: WAHC 2020. p. 6-18 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. E-pub ahead of print

    Quantum cryptanalysis on contracting feistel structures and observation on related-key settings

    Cid, C., Hosoyamada, A., Liu, Y. & Sim, S. M., 8 Dec 2020, (E-pub ahead of print) Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 373-394 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. E-pub ahead of print

    Estimating quantum speedups for lattice sieves

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 5 Dec 2020, (E-pub ahead of print) ASIACRYPT 2020. Springer, p. 583-613 31 p. (Lecture Notes in Computer Science; vol. 12492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Probabilistic Naming of Functions in Stripped Binaries

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, Inc, p. 373-385 13 p. 3427265. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

    van der Merwe, T. (ed.), Mitchell, C. J. (ed.) & Mehrnezhad, M. (ed.), 30 Nov 2020, Springer. 169 p. (Lecture Notes in Computer Science; vol. 12529)

    Research output: Book/ReportAnthology

  50. E-pub ahead of print

    Integerwise Functional Bootstrapping on TFHE

    Okada, H., Kiyomoto, S. & Cid, C., 25 Nov 2020, (E-pub ahead of print) Information Security - 23rd International Conference, ISC 2020, Proceedings. Susilo, W., Deng, R. H., Guo, F., Li, Y. & Intan, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12472 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. E-pub ahead of print

    The Vacuity of the Open Source Security Testing Methodology Manual

    Albrecht, M. & Jensen, R. B., 24 Nov 2020, (E-pub ahead of print) Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings. van der Merwe, T., Mitchell, C. & Mehrnezhad, M. (eds.). Springer, p. 114-147 34 p. (Lecture Notes in Computer Science; vol. 12529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. E-pub ahead of print

    Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles

    Knapp, J. & Quaglia, E., 20 Nov 2020, (E-pub ahead of print) Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer, p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...43 Next