Tom Chothia

According to our database1, Tom Chothia
  • authored at least 53 papers between 2000 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Types for Location and Data Security in Cloud Environments.
CoRR, 2017

Compositional schedulability analysis of real-time actor-based systems.
Acta Inf., 2017

Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

A Market-Based Approach for Detecting Malware in the Cloud via Introspection.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017

Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality.
Proceedings of the Computer Security - ESORICS 2017, 2017

HumIDIFy: A Tool for Hidden Functionality Detection in Firmware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Types for Location and Data Security in Cloud Environments.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

TRAKS: A Universal Key Management Scheme for ERTMS.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Spinner: Semi-Automatic Detection of Pinning without Hostname Verification.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Learning From Others' Mistakes: Penetration Testing IoT Devices in the Classroom.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

A Formal Security Analysis of ERTMS Train to Trackside Protocols.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2016

Asset-centric Security-Aware Service Selection.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Thwarting Market Specific Attacks in Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Calculating Quantitative Integrity and Secrecy for Imperative Programs.
IJSSE, 2015

Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Automatically Checking Commitment Protocols in ProVerif without False Attacks.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Relay Cost Bounding for Contactless EMV Payments.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Automatically Calculating Quantitative Integrity Measures for Imperative Programs.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

LeakWatch: Estimating Information Leakage from Java Programs.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Probabilistic Point-to-Point Information Leakage.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

A Tool for Estimating Information Leakage.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent.
Proceedings of the Security and Privacy in Communication Networks, 2012

SCAIL: An integrated Starcraft AI system.
Proceedings of the 2012 IEEE Conference on Computational Intelligence and Games, 2012

2011
A Statistical Test for Information Leaks Using Continuous Mutual Information.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Timed Automata Semantics for Analyzing Creol
Proceedings of the Proceedings Ninth International Workshop on the Foundations of Coordination Languages and Software Architectures, 2010

Statistical Measurement of Information Leakage.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

A Traceability Attack against e-Passports.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Analysing Unlinkability and Anonymity Using the Applied Pi Calculus.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Schedulability of asynchronous real-time concurrent objects.
J. Log. Algebr. Program., 2009

A Trusted Infrastructure for P2P-based Marketplaces.
Proceedings of the Proceedings P2P 2009, 2009

Untraceability in the applied pi-calculus.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Modular Schedulability Analysis of Concurrent Objects in Creol.
Proceedings of the Fundamentals of Software Engineering, 2009

From Coordination to Stochastic Models of QoS.
Proceedings of the Coordination Models and Languages, 11th International Conference, 2009

2008
Schedulability and Compatibility of Real Time Asynchronous Objects.
Proceedings of the 29th IEEE Real-Time Systems Symposium, 2008

2007
Capability passing processes.
Sci. Comput. Program., 2007

Keeping Secrets in Resource Aware Components.
Electr. Notes Theor. Comput. Sci., 2007

Q-Automata: Modelling the Resource Usage of Concurrent Components.
Electr. Notes Theor. Comput. Sci., 2007

An End-To-End Approach to Distributed Policy Language Implementation: (Extended Abstract).
Electr. Notes Theor. Comput. Sci., 2007

Securing pseudo identities in an anonymous peer-to-peer file-sharing network.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Component Connectors with QoS Guarantees.
Proceedings of the Coordination Models and Languages, 9th International Conference, 2007

2006
Metrics for Action-labelled Quantitative Transition Systems.
Electr. Notes Theor. Comput. Sci., 2006

Capability-Passing Processes.
Electr. Notes Theor. Comput. Sci., 2006

A Framework for Automatically Checking Anonymity with mu CRL.
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006

Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2006

2005
Type-Based Distributed Access Control vs. Untyped Attackers.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

A Survey of Anonymous Peer-to-Peer File-Sharing.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Abstractions for fault-tolerant global computing.
Theor. Comput. Sci., 2004

2003
Type-Based Distributed Access Control.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2001
Encoding Distributed Areas and Local Communication into the pi-Calculus.
Electr. Notes Theor. Comput. Sci., 2001

2000
A Distributed Pi-Calculus with Local Areas of Communication.
Electr. Notes Theor. Comput. Sci., 2000


  Loading...