Steven J. Murdoch
Steven J. Murdoch
Department of Computer Science, University College London
Verified email at ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Low-cost traffic analysis of Tor
SJ Murdoch, G Danezis
Security and Privacy, 2005 IEEE Symposium on, 183-195, 2005
6812005
Embedding covert channels into TCP/IP
S Murdoch, S Lewis
Information Hiding, 247-261, 2005
3902005
Hot or not: Revealing hidden services by their clock skew
SJ Murdoch
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2802006
Keep your enemies close: distance bounding against smartcard relay attacks
S Drimer, SJ Murdoch
USENIX Security Symposium, 87-102, 2007
2692007
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
International Workshop on Privacy Enhancing Technologies, 20-35, 2006
2582006
Chip and PIN is Broken
SJ Murdoch, S Drimer, R Anderson, M Bond
2010 IEEE Symposium on Security and Privacy, 433-446, 2010
2432010
Sampled traffic analysis by internet-exchange-level adversaries
SJ Murdoch, P Zieliński
International workshop on privacy enhancing technologies, 167-183, 2007
2202007
Cheri: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
2015 IEEE Symposium on Security and Privacy, 20-37, 2015
1322015
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson
2014 IEEE Symposium on Security and Privacy, 49-64, 2014
1152014
Optimised to fail: Card readers for online banking
S Drimer, S Murdoch, R Anderson
Financial Cryptography and Data Security, 184-200, 2009
1062009
Performance Improvements on Tor or, Why Tor is slow and what we’re going to do about it
R Dingledine, SJ Murdoch
Online: http://www. torproject. org/press/presskit/2009-03-11-performance. pdf, 2009
972009
Verified by visa and mastercard securecode: or, how not to design authentication
SJ Murdoch, R Anderson
International Conference on Financial Cryptography and Data Security, 336-342, 2010
932010
Tools and technology of Internet filtering
SJ Murdoch, R Anderson
Access denied: The practice and policy of global internet filtering 1 (1), 58, 2008
922008
Metrics for security and performance in low-latency anonymity systems
SJ Murdoch, RNM Watson
International Symposium on Privacy Enhancing Technologies Symposium, 115-132, 2008
872008
A case study on measuring statistical data in the tor anonymity network
K Loesing, S Murdoch, R Dingledine
Financial Cryptography and Data Security, 203-215, 2010
862010
An Improved Clock-skew Measurement Technique for Revealing Hidden Services.
S Zander, SJ Murdoch
USENIX Security Symposium, 211-226, 2008
832008
Thinking inside the box: system-level failures of tamper proofing
S Drimer, SJ Murdoch, R Anderson
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 281-295, 2008
762008
Do You See What I See? Differential Treatment of Anonymous Users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ...
552016
Adblocking and counter blocking: A slice of the arms race
R Nithyanand, S Khattak, M Javed, N Vallina-Rodriguez, M Falahrastegar, ...
6th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2016
522016
Covert channel vulnerabilities in anonymity systems
SJ Murdoch
PDF Document, 2007
502007
The system can't perform the operation now. Try again later.
Articles 1–20