default search action
Steven J. Murdoch
Person information
- affiliation: University College London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Killian Davitt, Dan Ristea, Duncan Russell, Steven J. Murdoch:
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser. Proc. Priv. Enhancing Technol. 2024(1): 343-356 (2024) - [i20]Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. CoRR abs/2401.10765 (2024) - [i19]Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. IACR Cryptol. ePrint Arch. 2024: 90 (2024) - 2023
- [c40]Aydin Abadi, Steven J. Murdoch:
Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims. AsiaCCS 2023: 855-869 - [c39]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Recurring Contingent Service Payment. EuroS&P 2023: 724-756 - [i18]Aydin Abadi, Steven J. Murdoch:
Earn While You Reveal: Private Set Intersection that Rewards Participants. CoRR abs/2301.03889 (2023) - [i17]Aydin Abadi, Dan Ristea, Steven J. Murdoch:
Delegated Time-Lock Puzzle. CoRR abs/2308.01280 (2023) - [i16]Aydin Abadi, Steven J. Murdoch:
Earn While You Reveal: Private Set Intersection that Rewards Participants. IACR Cryptol. ePrint Arch. 2023: 30 (2023) - [i15]Aydin Abadi, Dan Ristea, Steven J. Murdoch:
Delegated Time-Lock Puzzle. IACR Cryptol. ePrint Arch. 2023: 1183 (2023) - [i14]Aydin Abadi, Steven J. Murdoch:
Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation. IACR Cryptol. ePrint Arch. 2023: 1347 (2023) - 2022
- [c38]Aydin Abadi, Changyu Dong, Steven J. Murdoch, Sotirios Terzis:
Multi-party Updatable Delegated Private Set Intersection. Financial Cryptography 2022: 100-119 - [i13]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Recurring Contingent Service Payment. CoRR abs/2208.00283 (2022) - [i12]Steven J. Murdoch, Aydin Abadi:
A Forward-secure Efficient Two-factor Authentication Protocol. CoRR abs/2208.02877 (2022) - [i11]Aydin Abadi, Steven J. Murdoch:
Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims. IACR Cryptol. ePrint Arch. 2022: 107 (2022) - [i10]Steven J. Murdoch, Aydin Abadi:
A Forward-secure Efficient Two-factor Authentication Protocol. IACR Cryptol. ePrint Arch. 2022: 1006 (2022) - 2021
- [c37]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited. ESORICS (2) 2021: 721-742 - [c36]Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini:
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown. RAID 2021: 340-353 - [i9]Colin C. Ife, Yun Shen, Gianluca Stringhini, Steven J. Murdoch:
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown. CoRR abs/2104.01631 (2021) - [i8]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited. IACR Cryptol. ePrint Arch. 2021: 1009 (2021) - [i7]Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Recurring Contingent Payment for Proofs of Retrievability. IACR Cryptol. ePrint Arch. 2021: 1145 (2021)
2010 – 2019
- 2019
- [c35]Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini:
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web. AsiaCCS 2019: 168-180 - [c34]Alexander Hicks, Steven J. Murdoch:
Transparency Enhancing Technologies to Make Security Protocols Work for Humans. Security Protocols Workshop 2019: 3-10 - [c33]Steven J. Murdoch:
Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion). Security Protocols Workshop 2019: 11-19 - [i6]Colin C. Ife, Toby Davies, Steven J. Murdoch, Gianluca Stringhini:
Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime. CoRR abs/1910.06380 (2019) - 2018
- [j14]Shehar Bano, Philipp Richter, Mobin Javed, Srikanth Sundaresan, Zakir Durumeric, Steven J. Murdoch, Richard Mortier, Vern Paxson:
Scanning the Internet for Liveness. Comput. Commun. Rev. 48(2): 2-9 (2018) - [c32]Sarah Azouvi, Alexander Hicks, Steven J. Murdoch:
Incentives in Security Protocols. Security Protocols Workshop 2018: 132-141 - [c31]Steven J. Murdoch:
Incentives in Security Protocols (Transcript of Discussion). Security Protocols Workshop 2018: 142-149 - [i5]Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch:
VAMS: Verifiable Auditing of Access to Confidential Data. CoRR abs/1805.04772 (2018) - 2017
- [j13]Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017) - 2016
- [j12]Steven J. Murdoch:
Insecure by Design: Protocols for Encrypted Phone Calls. Computer 49(3): 25-33 (2016) - [j11]Robert N. M. Watson, Robert M. Norton, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Ed Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son, Munraj Vadera:
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro 36(5): 38-49 (2016) - [j10]Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg:
SoK: Making Sense of Censorship Resistance Systems. Proc. Priv. Enhancing Technol. 2016(4): 37-61 (2016) - [j9]Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg:
A Framework for the Game-theoretic Analysis of Censorship Resistance. Proc. Priv. Enhancing Technol. 2016(4): 83-101 (2016) - [j8]Hamed Haddadi, Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Steven J. Murdoch:
The Adblocking Tug-of-War. login Usenix Mag. 41(4) (2016) - [c30]Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - [c29]Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch:
Do You See What I See? Differential Treatment of Anonymous Users. NDSS 2016 - [c28]Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch:
Adblocking and Counter Blocking: A Slice of the Arms Race. FOCI 2016 - [i4]Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch:
Ad-Blocking and Counter Blocking: A Slice of the Arms Race. CoRR abs/1605.05077 (2016) - 2015
- [j7]Mike Bond, Marios O. Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Be Prepared: The EMV Preplay Attack. IEEE Secur. Priv. 13(2): 56-64 (2015) - [j6]Apu Kapadia, Steven J. Murdoch:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2015(1): 1-3 (2015) - [j5]Apu Kapadia, Steven J. Murdoch:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2015(2): 1-3 (2015) - [c27]Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. IEEE Symposium on Security and Privacy 2015: 20-37 - 2014
- [j4]Ross J. Anderson, Steven J. Murdoch:
EMV: why payment systems fail. Commun. ACM 57(6): 24-28 (2014) - [c26]Steven J. Murdoch, Ross J. Anderson:
Security Protocols and Evidence: Where Many Payment Systems Fail. Financial Cryptography 2014: 21-32 - [c25]Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: Cloning EMV Cards with the Pre-play Attack. IEEE Symposium on Security and Privacy 2014: 49-64 - [e1]Emiliano De Cristofaro, Steven J. Murdoch:
Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings. Lecture Notes in Computer Science 8555, Springer 2014, ISBN 978-3-319-08505-0 [contents] - [i3]Tariq Elahi, Steven J. Murdoch, Ian Goldberg:
Censorship Resistance: Let a Thousand Flowers Bloom? CoRR abs/1412.1859 (2014) - [i2]Sheharbano Khattak, Laurent Simon, Steven J. Murdoch:
Systemization of Pluggable Transports for Censorship Resistance. CoRR abs/1412.7448 (2014) - 2013
- [j3]Steven J. Murdoch, Hal Roberts:
Internet Censorship and Control [Guest editors' introduction]. IEEE Internet Comput. 17(3): 6-9 (2013) - [c24]Steven J. Murdoch:
Quantifying and Measuring Anonymity. DPM/SETOP 2013: 3-13 - [c23]Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie:
Towards a Theory of Application Compartmentalisation. Security Protocols Workshop 2013: 19-27 - 2012
- [j2]Steven J. Murdoch, Mike Bond, Ross J. Anderson:
How Certification Systems Fail: Lessons from the Ware Report. IEEE Secur. Priv. 10(6): 40-44 (2012) - [i1]Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: cloning EMV cards with the pre-play attack. CoRR abs/1209.2531 (2012) - 2011
- [c22]Ross J. Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch, Frank Stajano:
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. Financial Cryptography 2011: 220-234 - 2010
- [c21]Karsten Loesing, Steven J. Murdoch, Roger Dingledine:
A Case Study on Measuring Statistical Data in the Tor Anonymity Network. Financial Cryptography Workshops 2010: 203-215 - [c20]Steven J. Murdoch, Ross J. Anderson:
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. Financial Cryptography 2010: 336-342 - [c19]Claudia Díaz, Steven J. Murdoch, Carmela Troncoso:
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks. Privacy Enhancing Technologies 2010: 184-201 - [c18]Steven J. Murdoch, Saar Drimer, Ross J. Anderson, Mike Bond:
Chip and PIN is Broken. IEEE Symposium on Security and Privacy 2010: 433-446
2000 – 2009
- 2009
- [j1]Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Failures of Tamper-Proofing in PIN Entry Devices. IEEE Secur. Priv. 7(6): 39-45 (2009) - [c17]Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Optimised to Fail: Card Readers for Online Banking. Financial Cryptography 2009: 184-200 - 2008
- [b1]Steven J. Murdoch:
Covert channel vulnerabilities in anonymity systems. University of Cambridge, UK, 2008 - [c16]Steven J. Murdoch, Robert N. M. Watson:
Metrics for Security and Performance in Low-Latency Anonymity Systems. Privacy Enhancing Technologies 2008: 115-132 - [c15]Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Thinking Inside the Box: System-Level Failures of Tamper Proofing. SP 2008: 281-295 - [c14]Steven J. Murdoch:
Hardened Stateless Session Cookies. Security Protocols Workshop 2008: 93-101 - [c13]Steven J. Murdoch:
Hardened Stateless Session Cookies (Transcript of Discussion). Security Protocols Workshop 2008: 102-106 - [c12]Ross J. Anderson, Steven J. Murdoch:
What Next after Anonymity? Security Protocols Workshop 2008: 220-222 - [c11]Sebastian Zander, Steven J. Murdoch:
An Improved Clock-skew Measurement Technique for Revealing Hidden Services. USENIX Security Symposium 2008: 211-226 - 2007
- [c10]Steven J. Murdoch, Piotr Zielinski:
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. Privacy Enhancing Technologies 2007: 167-183 - [c9]Tuomas Aura, Michael Roe, Steven J. Murdoch:
Securing network location awareness with authenticated DHCP. SecureComm 2007: 391-402 - [c8]Saar Drimer, Steven J. Murdoch:
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. USENIX Security Symposium 2007 - 2006
- [c7]Steven J. Murdoch:
Hot or not: revealing hidden services by their clock skew. CCS 2006: 27-36 - [c6]Richard Clayton, Steven J. Murdoch, Robert N. M. Watson:
Ignoring the Great Firewall of China. Privacy Enhancing Technologies 2006: 20-35 - [c5]Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven J. Murdoch, Ross J. Anderson, Ronald L. Rivest:
Phish and Chips. Security Protocols Workshop 2006: 40-48 - 2005
- [c4]Steven J. Murdoch, Stephen Lewis:
Embedding Covert Channels into TCP/IP. Information Hiding 2005: 247-261 - [c3]Andrei Serjantov, Steven J. Murdoch:
Message Splitting Against the Partial Adversary. Privacy Enhancing Technologies 2005: 26-39 - [c2]Steven J. Murdoch, George Danezis:
Low-Cost Traffic Analysis of Tor. S&P 2005: 183-195 - 2004
- [c1]Steven J. Murdoch, Piotr Zielinski:
Covert Channels for Collusion in Online Computer Games. Information Hiding 2004: 355-370
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint