Tom Chothia

Publications

  1. 2020
  2. Published

    Catch me if you can: an in-depth study of CVE discovery time and inconsistencies for managing risks in critical infrastructures

    Richard J Thomas, Tom Chothia, 9 Nov 2020, CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy. Association for Computing Machinery (ACM), p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2019
  4. Published

    Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course

    Tom Chothia, Chris Novakovic, Andreea Radu & Richard J Thomas, 27 Apr 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 141-172 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11345 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Time protection: the missing OS abstraction

    Tom Chothia, 25 Mar 2019, EuroSys '19: Proceedings of the Fourteenth EuroSys Conference 2019. Association for Computing Machinery (ACM), p. 1-17 17 p. 1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    Breaking all the things: a systematic survey of firmware extraction and modification techniques for IoT devices

    Sebastian Vasile, David Oswald & Tom Chothia, 7 Mar 2019, CARDIS 2018: Smart Card Research and Advanced Applications. Springer, p. 171-185 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Short paper: making contactless EMV robust against rogue readers colluding with relay attackers

    Tom Chothia, 22 Feb 2019, Proceedings of the 23rd International Conference on Financial Cryptography and Data Security (FC'19). 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 2018
  9. Published

    Modelling and analysis of a hierarchy of distance bounding attacks

    Tom Chothia, Joeri De Ruiter, 17 Aug 2018, Usenix Security '18. USENIX Association, 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Extending Automated Protocol State Learning for the 802.11 4-Way Handshake

    Tom Chothia & Joeri De Ruiter, 8 Aug 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I. Lopez, J., Zhou, J. & Soriano, M. (eds.). 1 ed. Springer, p. 325-345 21 p. (Lecture Notes in Computer Science; vol. 11098).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A better understanding of machine learning malware misclassifcation

    Tom Chothia & Behzad Bordbar, 1 Jan 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Furnell, S. & Camp, O. (eds.). Springer Verlag, p. 35-58 24 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. 2017
  13. E-pub ahead of print

    Why banker Bob (still) can’t get TLS right: A Security Analysis of TLS in Leading UK Banking Apps

    Tom Chothia, Flavio Garcia, 23 Dec 2017, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer, p. 579-597 18 p. (Lecture Notes in Computer Science; vol. 10322).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Spinner: Semi-Automatic Detection of Pinning without Hostname Verification (or why 10M bank users were vulnerable)

    Tom Chothia & Flavio Garcia, 4 Dec 2017, Proceedings of 33rd Annual Computer Security Applications Conference (ACSAC 2017). Association for Computing Machinery , p. 176-188 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 Next