Richard Thomas

Publications

  1. Published

    A Formal Security Analysis of ERTMS Train to Trackside Protocols

    Tom Chothia, Joeri De Ruiter & Richard J Thomas, 15 Jun 2016, Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification. Springer, p. 53-68 Chapter 4. (Lecture Notes in Computer Science; vol. 9707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    An attack against message authentication in the ERTMS train to trackside communication protocols

    Tom Chothia, Mihai Ordean, Joeri De Ruiter & Richard J Thomas, 2 Apr 2017, ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery , p. 743-756

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Catch me if you can: an in-depth study of CVE discovery time and inconsistencies for managing risks in critical infrastructures

    Richard J Thomas, Tom Chothia, 9 Nov 2020, CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy. Association for Computing Machinery (ACM), p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course

    Tom Chothia, Chris Novakovic, Andreea-Ina Radu & Richard J Thomas, 27 Apr 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 141-172 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11345 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story

    Tom Chothia, Andreea-Ina Radu & Richard J Thomas, 15 Aug 2017, 2017 USENIX Workshop on Advances in Security Education (ASE 17). Vancouver, BC: USENIX Association

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems

    Richard J Thomas & Tom Chothia, 17 Dec 2020, Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, 2020, Revised Selected Papers. Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A., Gritzalis, S., Meng, W. & Furnell, S. (eds.). Springer, p. 100-116 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12501 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    TRAKS: A Universal Key Management Scheme for ERTMS

    Richard J Thomas, Mihai Ordean, Tom Chothia & Joeri De Ruiter, 4 Dec 2017, ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference. Association for Computing Machinery (ACM), p. 327-338

    Research output: Chapter in Book/Report/Conference proceedingConference contribution