First Grant scheme: New Techniques for Finding and Analysing Information Leaks

Project Details

Short titleFirst Grant scheme: New Techniques for Finding and Analysing Information Leaks
StatusFinished
Effective start/end date2/04/121/08/13

Funding

  • Engineering & Physical Science Research Council

Fingerprint

Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
  • LeakWatch: Estimating information leakage from java programs

    Chothia, T., Kawamoto, Y. & Novakovic, C., 2014, Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Kutyłowski, M. & Vaidya, J. (eds.). PART 2 ed. Springer, Vol. 8713 LNCS. p. 219-236 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Citations (Scopus)
  • The Unbearable Lightness of Monitoring: Indirect and Direct Peer Monitoring in BitTorrent

    Chothia, T., Cova, M., Novakovic, C. & Toro, C., 2012, Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Keromytis, AD. & Di Pietro, R. (eds.). Springer, p. 185-202 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
    2 Citations (Scopus)
    344 Downloads (Pure)