Ross J. Anderson

Orcid: 0000-0001-8697-5682

Affiliations:
  • University of Cambridge, UK


According to our database1, Ross J. Anderson authored at least 197 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bugs in our pockets: the risks of client-side scanning.
J. Cybersecur., January, 2024

2023
Automatic Bill of Materials.
CoRR, 2023

Human-Producible Adversarial Examples.
CoRR, 2023

Machine Learning needs its own Randomness Standard: Randomised Smoothing and PRNG-based attacks.
CoRR, 2023

When Vision Fails: Text Attacks Against ViT and OCR.
CoRR, 2023

The Curse of Recursion: Training on Generated Data Makes Models Forget.
CoRR, 2023

No Easy Way Out: The Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment.
CoRR, 2023

Threat Models over Space and Time: A Case Study of E2EE Messaging Applications.
CoRR, 2023

Trojan Source: Invisible Vulnerabilities.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Human-Centric Endpoint Security.
Proceedings of the Security Protocols XXVIII, 2023

One Protocol to Rule Them All? On Securing Interoperable Messaging.
Proceedings of the Security Protocols XXVIII, 2023

If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion).
Proceedings of the Security Protocols XXVIII, 2023

If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard.
Proceedings of the Security Protocols XXVIII, 2023

Boosting Big Brother: Attacking Search Engines with Encodings.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
CoverDrop: Blowing the Whistle Through A News App.
Proc. Priv. Enhancing Technol., 2022

ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks.
CoRR, 2022

Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict.
CoRR, 2022

Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022

Bad Characters: Imperceptible NLP Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Talking Trojan: Analyzing an Industry-Wide Disclosure.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

PostCog: A tool for interdisciplinary research into underground forums at scale.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data.
CoRR, 2021

Manipulating SGD with Data Ordering Attacks.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Markpainting: Adversarial Machine Learning meets Inpainting.
Proceedings of the 38th International Conference on Machine Learning, 2021

Sponge Examples: Energy-Latency Attacks on Neural Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant.
CoRR, 2020

Nudge Attacks on Point-Cloud DNNs.
CoRR, 2020

BatNet: Data transmission between smartphones over ultrasound.
CoRR, 2020

Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

Towards Certifiable Adversarial Sample Detection.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

2019
The gift of the gab: Are rental scammers skilled at the art of persuasion?
CoRR, 2019

Hearing your touch: A new acoustic side channel on smartphones.
CoRR, 2019

Sitatapatra: Blocking the Transfer of Adversarial Samples.
CoRR, 2019

Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019

Snitches Get Stitches: On the Difficulty of Whistleblowing.
Proceedings of the Security Protocols XXVII, 2019

To Compress Or Not To Compress: Understanding The Interactions Between Adversarial Attacks And Neural Network Compression.
Proceedings of Machine Learning and Systems 2019, 2019

2018
The Taboo Trap: Behavioural Detection of Adversarial Samples.
CoRR, 2018

Making security sustainable.
Commun. ACM, 2018

Making Bitcoin Legal.
Proceedings of the Security Protocols XXVI, 2018

Making Bitcoin Legal (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

Covert and Deniable Communications.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Sustainable Security - an Internet of Durable Goods.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

What You Get is What You C: Controlling Side Effects in Mainstream C Compilers.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
J. Cybersecur., 2017

Reconciling Multiple Objectives - Politics or Markets?
Proceedings of the Security Protocols XXV, 2017

Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

DigiTally: Piloting Offline Payments for Phones.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards.
Proc. Priv. Enhancing Technol., 2016

SMAPs: Short Message Authentication Protocols.
Proceedings of the Security Protocols XXIV, 2016

SMAPs: Short Message Authentication Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

Are Payment Card Contracts Unfair? (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Taking down websites to prevent crime.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only).
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud.
IEEE Secur. Priv., 2015

Be Prepared: The EMV Preplay Attack.
IEEE Secur. Priv., 2015

Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

Keys under doormats.
Commun. ACM, 2015

Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Do You Believe in Tinker Bell? The Social Externalities of Trust.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

2014
Reading this may harm your computer: The psychology of malware warnings.
Comput. Hum. Behav., 2014

EMV: why payment systems fail.
Commun. ACM, 2014

Collaborating with the Enemy on Network Management.
Proceedings of the Security Protocols XXII, 2014

Collaborating with the Enemy on Network Management (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Security Protocols and Evidence: Where Many Payment Systems Fail.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
An Experimental Evaluation of Robustness of Networks.
IEEE Syst. J., 2013

Why quantum computing is hard - and quantum cryptography is not provably secure
CoRR, 2013

Authentication for Resilience: The Case of SDN.
Proceedings of the Security Protocols XXI, 2013

Rendezvous: a search engine for binary code.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

PIN skimmer: inferring PINs through the camera and microphone.
Proceedings of the SPSM'13, 2013

Measuring the Cost of Cybercrime.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
How Certification Systems Fail: Lessons from the Ware Report.
IEEE Secur. Priv., 2012

Centrality prediction in dynamic human contact networks.
Comput. Networks, 2012

Measuring the Cost of Cybercrime.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Aurasium: Practical Policy Enforcement for Android Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Protocol Governance: The Elite, or the Mob? (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Protocol Governance: The Elite, or the Mob?
Proceedings of the Security Protocols XX, 2012

Social Authentication: Harder Than It Looks.
Proceedings of the Financial Cryptography and Data Security, 2012

A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs.
Proceedings of the Financial Cryptography and Data Security, 2012

Ethics Committees and IRBs: Boon, or Bane, or More Research Needed?
Proceedings of the Financial Cryptography and Data Security, 2012

Security economics: a personal perspective.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Resilience of the Internet Interconnection Ecosystem.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Can We Fix the Security Economics of Federated Authentication?
Proceedings of the Security Protocols XIX, 2011

Towards a security architecture for substations.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

Cryptology: Where Is the New Frontier?
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV.
Proceedings of the Financial Cryptography and Data Security, 2011

The Dependability of Complex Socio-technical Systems.
Proceedings of the Fundamental Approaches to Software Engineering, 2011

2010
On the Security Economics of Electricity Metering.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

It's the Anthropology, Stupid!
Proceedings of the Security Protocols XVIII, 2010

It's the Anthropology, Stupid! (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Chip and PIN is Broken.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Failures of Tamper-Proofing in PIN Entry Devices.
IEEE Secur. Priv., 2009

Technical perspective - A chilly sense of security.
Commun. ACM, 2009

Security Economics and Critical National Infrastructure.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

The Trust Economy of Brief Encounters.
Proceedings of the Security Protocols XVII, 2009

Eight friends are enough: social graph approximation via public listings.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

Optimised to Fail: Card Readers for Online Banking.
Proceedings of the Financial Cryptography and Data Security, 2009

Certification and Evaluation: A Security Economics Perspective.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

Security Economics and European Policy.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Security Economics and European Policy.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

What Next after Anonymity?
Proceedings of the Security Protocols XVI, 2008

What Next After Anonymity? (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Thinking Inside the Box: System-Level Failures of Tamper Proofing.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Fast Exclusion of Errant Devices from Vehicular Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Information Security Economics - and Beyond.
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008

Security, Functionality and Scale?
Proceedings of the Data and Applications Security XXII, 2008

Security engineering - a guide to building dependable distributed systems (2. ed.).
Wiley, ISBN: 978-0-470-06852-6, 2008

2007
Silver Bullet Talks with Ross Anderson.
IEEE Secur. Priv., 2007

Software Security: State of the Art.
IEEE Secur. Priv., 2007

Robbing the Bank with a Theorem Prover - (Abstract).
Proceedings of the Security Protocols, 2007

On the Security of the EMV Secure Messaging API (Extended Abstract).
Proceedings of the Security Protocols, 2007

Position Statement in RFID S&P Panel: RFID and the Middleman.
Proceedings of the Financial Cryptography and Data Security, 2007

New Strategies for Revocation in Ad-Hoc Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Information Security Economics - and Beyond.
Proceedings of the Advances in Cryptology, 2007

Dynamic Topologies for Robust Scale-Free Networks.
Proceedings of the Bio-Inspired Computing and Communication, 2007

2006
Combining Crypto with Biometrics Effectively.
IEEE Trans. Computers, 2006

Cryptographic Processors-A Survey.
Proc. IEEE, 2006

The Man-in-the-Middle Defence.
Proceedings of the Security Protocols, 2006

The Man-in-the-Middle Defence.
Proceedings of the Security Protocols, 2006

Phish and Chips.
Proceedings of the Security Protocols, 2006

Protecting domestic power-line communications.
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006

2005
The Economics of Resisting Censorship.
IEEE Secur. Priv., 2005

Guest Editors' Introduction: Economics of Information Security.
IEEE Secur. Priv., 2005

The topology of covert conflict.
IACR Cryptol. ePrint Arch., 2005

How Much Is Location Privacy Worth?
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

The Initial Costs and Maintenance Costs of Protocols.
Proceedings of the Security Protocols, 2005

Sybil-Resistant DHT Routing.
Proceedings of the Computer Security, 2005

2004
Cryptography and Competition Policy - Issues with 'Trusted Computing'.
Proceedings of the Economics of Information Security, 2004

Password Memorability and Security: Empirical Results.
IEEE Secur. Priv., 2004

The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

The Dancing Bear: A New Way of Composing Ciphers.
Proceedings of the Security Protocols, 2004

Key Infection: Smart Trust for Smart Dust.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

2003
Balanced self-checking asynchronous logic for smart card applications.
Microprocess. Microsystems, 2003

What We Can Learn from API Security.
Proceedings of the Security Protocols, 2003

Cryptography and competition policy: issues with 'trusted computing'.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

2002
Free Speech Online and Offline.
Computer, 2002

On a New Way to Read Data from Memory.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Optical Fault Induction Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

Improving Smart Card Security Using Self-Timed Circuits.
Proceedings of the 8th International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC 2002), 2002

2001
API-Level Attacks on Embedded Systems.
Computer, 2001

Security policies.
Adv. Comput., 2001

Protecting Embedded Systems - The Next Ten Years.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

Why Information Security is Hard-An Economic Perspective.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

Security engineering - a guide to building dependable distributed systems.
Wiley, ISBN: 978-0-471-38922-4, 2001

2000
Roundtable on Information Security Policy.
IEEE Softw., 2000

Jikzi - a new framework for security policy, trusted publishing and electronic commerce.
Comput. Commun., 2000

Government Access to Keys - Panel Discussion.
Proceedings of the Security Protocols, 2000

The Correctness of Crypto Transaction Sets (Discussion).
Proceedings of the Security Protocols, 2000

The Correctness of Crypto Transaction Sets.
Proceedings of the Security Protocols, 2000

Privacy Technology Lessons from Healthcare.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

The Case for Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Information hiding-a survey.
Proc. IEEE, 1999

The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.
Proceedings of the Security Protocols, 1999

Jikzi: A New Framework for Secure Publishing.
Proceedings of the Security Protocols, 1999

The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.
Proceedings of the Information Hiding, Third International Workshop, 1999

Evaluation of Copyright Marking Systems.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering).
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
A New Family of Authentication Protocols.
ACM SIGOPS Oper. Syst. Rev., 1998

On the limits of steganography.
IEEE J. Sel. Areas Commun., 1998

How to Build Robust Shared Control Systems.
Des. Codes Cryptogr., 1998

The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Attacks on Copyright Marking Systems.
Proceedings of the Information Hiding, 1998

Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.
Proceedings of the Information Hiding, 1998

The Steganographic File System.
Proceedings of the Information Hiding, 1998

Serpent: A New Block Cipher Proposal.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

On the Security of Digital Tachographs.
Proceedings of the Computer Security, 1998

Serpent and Smartcards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
The risks of key recovery, key escrow, and trusted third-party encryption.
World Wide Web J., 1997

Secure Books: Protecting the Distribution of Knowledge.
Proceedings of the Security Protocols, 1997

Low Cost Attacks on Tamper Resistant Devices.
Proceedings of the Security Protocols, 1997

Chameleon - A New Kind of Stream Cipher.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

The GCHQ Protocol and Its Problems.
Proceedings of the Advances in Cryptology, 1997

An Update on the BMA Security Policy.
Proceedings of the Personal Medical Information - Security, Engineering, and Ethics, 1997

1996
On the Reliability of Electronic Payment Systems.
IEEE Trans. Software Eng., 1996

NetCard - A Practical Electronic-Cash System.
Proceedings of the Security Protocols, 1996

A Security Policy Model for Clinical Information Systems.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

The Newton Channel.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

Stretching the Limits of Steganography.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

Two Practical and Provably Secure Block Ciphers: BEARS and LION.
Proceedings of the Fast Software Encryption, 1996

TIGER: A Fast New Hash Function.
Proceedings of the Fast Software Encryption, 1996

Minding your p's and q's.
Proceedings of the Advances in Cryptology, 1996

1995
Cryptographic credit control in pre-payment metering systems.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

Robustness Principles for Public Key Protocols.
Proceedings of the Advances in Cryptology, 1995

Crypto in Europe - Markets, Law and Policy.
Proceedings of the Cryptography: Policy and Algorithms, 1995

Programming Satan's Computer.
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995

1994
Whither Cryptography.
Inf. Manag. Comput. Secur., 1994

Why Cryptosystems Fail.
Commun. ACM, 1994

On Fibonacci Keystream Generators.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Searching for the Optimum Correlation Attack.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Liability and Computer Security: Nine Principles.
Proceedings of the Computer Security, 1994

1993
A Modern Rotor Machine.
Proceedings of the Fast Software Encryption, 1993

1992
UEPS - A Second Generation Electronic Wallet.
Proceedings of the Computer Security, 1992

1991
Tree Functions and Cipher Systems.
Cryptologia, 1991

1990
Solving a Class of Stream Ciphers.
Cryptologia, 1990


  Loading...