1. 2021
  2. Published

    Principles of Effective Cybersecurity Wargames

    Callaghan, P. & Ertan, A., Dec 2021, Infosecurity Magazine.

    Research output: Other contribution

  3. E-pub ahead of print

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Sanso, A., 1 Dec 2021, (E-pub ahead of print) p. 160-184. 25 p.

    Research output: Contribution to conferencePaperpeer-review

  4. Published

    argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries

    Sivakumaran, P. & Blasco, J., 6 Dec 2021, Proceedings of the 37th Annual Computer Security Applications Conference: ACSAC 2021. Association for Computing Machinery (ACM), p. 861-876 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Report and Trace Ring Signatures

    Fraser, A. & Quaglia, E., 9 Dec 2021, 20th International Conference On Cryptology And Network Security: CANS 2021. Springer, [Cham], Vol. 13099. p. 179-199 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Sensemaking, systemic competition, and the social compact

    Ashdown, N., 21 Dec 2021, Futures Student Essay Competition. UK Ministry of Defence, p. 38-46

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. 2022
  8. Published
  9. Unpublished

    Advanced Privacy Notions for Electronic Voting and Digital Signatures

    Fraser, A., 2022, (Unpublished) 283 p.

    Research output: ThesisDoctoral Thesis

  10. Published

    Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism

    Bhudia, A., Cartwright, A., Cartwright, E., Hernandez-Castro, J. & Hurley-Smith, D., 2022, IEEE International Conference on Omni-layer Intelligent Systems (COINS2022): Distributed Ledger Technologies and Blockchain. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Unpublished
  12. Published

    Four Attacks and a Proof for Telegram

    Albrecht, M., Marekova, L., Paterson, K. & Stepanovs, I., 2022, IEEE S&P 2022. Vol. 1. p. 223-242 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Malware in Motion

    Choudhury, R., Luo, Z. & Nguyen, K., 2022, p. 595-602.

    Research output: Contribution to conferencePaperpeer-review

  14. Unpublished

    Microarchitectural Covert Channels in Multitenant Computing Environments}

    Semal, B., 2022, (Unpublished)

    Research output: ThesisDoctoral Thesis

  15. Unpublished

    Software Analysis Through Binary Function Identification

    Patrick-Evans, J., 2022, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  16. Published

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 2022, IEEE Symposium on Security and Privacy (IEEE S&P). p. 1165-1183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Zoom Obscura: Counterfunctional Design for Video-Conferencing

    Elsden, C., Chatting, D., Duggan, M., Dwyer, A. C. & Thornton, P., 2022, p. 1-17.

    Research output: Contribution to conferencePaperpeer-review

  18. Published

    Changing Cybersecurity Behaviors in the Workplace: A Critique of the Evidence

    Ertan, A., 16 Jan 2022, Infosecurity Magazine.

    Research output: Other contribution

  19. Published

    Securing emergent behaviour in swarm robotics

    Chen, L. & Ng, S-L., Feb 2022, In: Journal of Information Security and Applications. 64, 103047.

    Research output: Contribution to journalArticlepeer-review

  20. Forthcoming

    Watch over your TV: A Security and Privacy Analysis of the Android TV ecosystem

    Tileria Palacios, M. & Blasco Alis, J., 1 Feb 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  21. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published
  23. Published

    New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

    Thomas-Brans, F., Heckmann, T., Markantonakis, K. & Sauveron, D., 11 Mar 2022, In: IEEE Access. 10, p. 33742 - 33757

    Research output: Contribution to journalArticlepeer-review

  24. E-pub ahead of print
  25. Forthcoming

    TIDE: A novel approach to constructing timed-release encryption

    Loe, A. F., Medley, L., O'Connell, C. & Quaglia, E. A., 15 Apr 2022, (Accepted/In press) ACISP 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A qualitative exploration of the role of employment in desistance and subsequent identity change - ex-prisoners’ lived experiences

    Rhoden, N., Senker, S. & Glorney, E., 19 Apr 2022, In: The Journal of Forensic Practice. 24, 2, p. 168-183

    Research output: Contribution to journalArticlepeer-review

  27. E-pub ahead of print

    Valued Authorization Policy Existence Problem: Theory and Experiments

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., Nov 2022, In: ACM Transactions on Privacy and Security. 25, 4, 28.

    Research output: Contribution to journalArticlepeer-review