Security
There is an increasing variety of computer security research at Oxford, bridging Theory and Automated Verification and Software Engineering. Lowe and Roscoe continue to refine their seminal protocol analysis and verification techniques, which are now capable of verifying or refuting most protocols very rapidly using FDR in conjunction with front ends to support protocol notations, including SOAP. This work has been further expanded by Cremers' arrival. We also work in protocol development and information flow analysis. Achievements include discovery of attacks and other flaws in many protocols, including several which were standardised or at advanced stages of standardisation, such as ISO/IEC 9798, ISO/IEC 11770, and Webservice SecureConversation. Our protocol analysis tools, Casper and Cremers' Scyther, have become widely used in industry and international research. Roscoe's group developed a new family of protocols for bootstrapping ad-hoc networks, leading to three patent applications. Cremers' work includes further tool development including the Tamarin prover, as well as bridging the gap between symbolic analysis tools and computational/cryptographic analysis of protocols. Ker has recently proved a fundamental new result: that steganographic capacity grows as N0.5 rather than linearly.
Faculty
Emeritus Faculty
Research
Past Members
Selected Publications
-
Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing
Andrew J Paverd‚ Andrew P Martin and Ian Brown
In Fifth IEEE International Conference on Smart Grid Communications (SmartGridComm 2014). 2014.
Details about Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | BibTeX data for Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | Download Paverd-SmartGridComm-2014.pdf of Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | Download Paverd-SmartGridComm-2014-slides.pdf of Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | DOI (10.1109/SmartGridComm.2014.7007758) | Link to Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing
-
Security and Privacy in Smart Grid Demand Response Systems
Andrew J Paverd‚ Andrew P Martin and Ian Brown
In Jorge Cuellar, editor, Smart Grid Security. Pages 1−15. Springer International Publishing. 2014.
Details about Security and Privacy in Smart Grid Demand Response Systems | BibTeX data for Security and Privacy in Smart Grid Demand Response Systems | Download (pdf) of Security and Privacy in Smart Grid Demand Response Systems | DOI (10.1007/978-3-319-10329-7_1) | Link to Security and Privacy in Smart Grid Demand Response Systems
-
Analysing the Security Properties of Object−Capability Patterns
Toby Murray
PhD Thesis University of Oxford. 2010.
Details about Analysing the Security Properties of Object−Capability Patterns | BibTeX data for Analysing the Security Properties of Object−Capability Patterns | Download (pdf) of Analysing the Security Properties of Object−Capability Patterns