Tom Chothia

According to our database1, Tom Chothia authored at least 67 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Symbolic modelling of remote attestation protocols for device and app integrity on Android.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Practical EMV Relay Protection.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties.
Proceedings of the Security and Trust Management - 16th International Workshop, 2020

Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

Security Analysis and Implementation of Relay-Resistant Contactless Payments.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course.
Trans. Edutainment, 2019

Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.
Proceedings of the Financial Cryptography and Data Security, 2019

Time Protection: The Missing OS Abstraction.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2018
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Phishing Attacks: Learning by Doing.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

Extending Automated Protocol State Learning for the 802.11 4-Way Handshake.
Proceedings of the Computer Security, 2018

Breaking All the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2018

2017
Compositional schedulability analysis of real-time actor-based systems.
Acta Informatica, 2017

Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

A Market-Based Approach for Detecting Malware in the Cloud via Introspection.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017

A Better Understanding of Machine Learning Malware Misclassifcation.
Proceedings of the Information Systems Security and Privacy, 2017

Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps.
Proceedings of the Financial Cryptography and Data Security, 2017

Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality.
Proceedings of the Computer Security - ESORICS 2017, 2017

HumIDIFy: A Tool for Hidden Functionality Detection in Firmware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Types for Location and Data Security in Cloud Environments.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

TRAKS: A Universal Key Management Scheme for ERTMS.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Spinner: Semi-Automatic Detection of Pinning without Hostname Verification.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Learning From Others' Mistakes: Penetration Testing IoT Devices in the Classroom.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

A Formal Security Analysis of ERTMS Train to Trackside Protocols.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2016

Asset-centric Security-Aware Service Selection.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Thwarting Market Specific Attacks in Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Calculating Quantitative Integrity and Secrecy for Imperative Programs.
Int. J. Secur. Softw. Eng., 2015

Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Automatically Checking Commitment Protocols in ProVerif without False Attacks.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Relay Cost Bounding for Contactless EMV Payments.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Automatically Calculating Quantitative Integrity Measures for Imperative Programs.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

LeakWatch: Estimating Information Leakage from Java Programs.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Probabilistic Point-to-Point Information Leakage.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

A Tool for Estimating Information Leakage.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent.
Proceedings of the Security and Privacy in Communication Networks, 2012

SCAIL: An integrated Starcraft AI system.
Proceedings of the 2012 IEEE Conference on Computational Intelligence and Games, 2012

2011
A Statistical Test for Information Leaks Using Continuous Mutual Information.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Timed Automata Semantics for Analyzing Creol
Proceedings of the Proceedings Ninth International Workshop on the Foundations of Coordination Languages and Software Architectures, 2010

Statistical Measurement of Information Leakage.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

A Traceability Attack against e-Passports.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Analysing Unlinkability and Anonymity Using the Applied Pi Calculus.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Schedulability of asynchronous real-time concurrent objects.
J. Log. Algebraic Methods Program., 2009

A Trusted Infrastructure for P2P-based Marketplaces.
Proceedings of the Proceedings P2P 2009, 2009

Untraceability in the applied pi-calculus.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Modular Schedulability Analysis of Concurrent Objects in Creol.
Proceedings of the Fundamentals of Software Engineering, 2009

From Coordination to Stochastic Models of QoS.
Proceedings of the Coordination Models and Languages, 11th International Conference, 2009

2008
Schedulability and Compatibility of Real Time Asynchronous Objects.
Proceedings of the 29th IEEE Real-Time Systems Symposium, 2008

2007
Keeping Secrets in Resource Aware Components.
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages, 2007

Securing pseudo identities in an anonymous peer-to-peer file-sharing network.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Component Connectors with QoS Guarantees.
Proceedings of the Coordination Models and Languages, 9th International Conference, 2007

2006
Q-Automata: Modelling the Resource Usage of Concurrent Components.
Proceedings of the Fifth International Workshop on the Foundations of Coordination Languages and Software Architectures, 2006

An End-To-End Approach to Distributed Policy Language Implementation: (Extended Abstract).
Proceedings of the First International Workshop on Security and Rewriting Techniques, 2006

A Framework for Automatically Checking Anonymity with <i>mu</i> CRL.
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006

Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2006

2005
Metrics for Action-labelled Quantitative Transition Systems.
Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages, 2005

Capability-Passing Processes.
Proceedings of the 4th International Workshop on the Foundations of Coordination Languages and Software Architectures, 2005

Type-Based Distributed Access Control vs. Untyped Attackers.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

A Survey of Anonymous Peer-to-Peer File-Sharing.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Abstractions for fault-tolerant global computing.
Theor. Comput. Sci., 2004

2003
Type-Based Distributed Access Control.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2001
Encoding Distributed Areas and Local Communication into the pi-Calculus.
Proceedings of the 8th International Workshop on Expressiveness in Concurrency, 2001

2000
A Distributed Pi-Calculus with Local Areas of Communication.
Proceedings of the 4th International Workshop on High-Level Concurrent Languages, 2000


  Loading...