Tom Chothia

Publications

  1. 2019
  2. Published

    Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course

    Tom Chothia, Chris Novakovic, Andreea Radu & Richard J Thomas, 27 Apr 2019, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 141-172 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11345 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Time protection: the missing OS abstraction

    Tom Chothia, 25 Mar 2019, Proceedings of the Fourteenth EuroSys Conference 2019 (EuroSys '19). Association for Computing Machinery (ACM), p. 1-17 17 p. 1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Breaking all the things: a systematic survey of firmware extraction and modification techniques for IoT devices

    Sebastian Vasile, David Oswald & Tom Chothia, 7 Mar 2019, CARDIS 2018: Smart Card Research and Advanced Applications. Springer, p. 171-185 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Short paper: making contactless EMV robust against rogue readers colluding with relay attackers

    Tom Chothia, 22 Feb 2019, Proceedings of the 23rd International Conference on Financial Cryptography and Data Security (FC'19). 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2018
  7. Published

    Modelling and analysis of a hierarchy of distance bounding attacks

    Tom Chothia, Joeri De Ruiter, 17 Aug 2018, Usenix Security '18. USENIX Association, 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Extending Automated Protocol State Learning for the 802.11 4-Way Handshake

    Tom Chothia & Joeri De Ruiter, 8 Aug 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I. Lopez, J., Zhou, J. & Soriano, M. (eds.). 1 ed. Springer, p. 325-345 21 p. (Lecture Notes in Computer Science; vol. 11098).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A better understanding of machine learning malware misclassifcation

    Tom Chothia & Behzad Bordbar, 1 Jan 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Furnell, S. & Camp, O. (eds.). Springer Verlag, p. 35-58 24 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 2017
  11. E-pub ahead of print

    Why banker Bob (still) can’t get TLS right: A Security Analysis of TLS in Leading UK Banking Apps

    Tom Chothia, Flavio Garcia, 23 Dec 2017, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer, p. 579-597 18 p. (Lecture Notes in Computer Science; vol. 10322).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Spinner: Semi-Automatic Detection of Pinning without Hostname Verification (or why 10M bank users were vulnerable)

    Tom Chothia & Flavio Garcia, 4 Dec 2017, Proceedings of 33rd Annual Computer Security Applications Conference (ACSAC 2017). Association for Computing Machinery , p. 176-188 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    TRAKS: A Universal Key Management Scheme for ERTMS

    Richard J Thomas, Mihai Ordean, Tom Chothia & Joeri De Ruiter, 4 Dec 2017, ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference. Association for Computing Machinery (ACM), p. 327-338

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 Next