Publications
-
DeepSec: Deciding Equivalence Properties for Security Protocols − Improved theory and practice
Vincent Cheval‚ Steve Kremer and Itsaka Rakotonirina
In TheoretiCS. Vol. 3. 2024.
Details about DeepSec: Deciding Equivalence Properties for Security Protocols − Improved theory and practice | BibTeX data for DeepSec: Deciding Equivalence Properties for Security Protocols − Improved theory and practice | DOI (10.46298/THEORETICS.24.4) | Link to DeepSec: Deciding Equivalence Properties for Security Protocols − Improved theory and practice
-
Symbolic protocol verification with dice
Vincent Cheval‚ Raphaëlle Crubillé and Steve Kremer
In J. Comput. Secur.. Vol. 31. No. 5. Pages 501–538. 2023.
Details about Symbolic protocol verification with dice | BibTeX data for Symbolic protocol verification with dice | DOI (10.3233/JCS-230037) | Download (pdf) of Symbolic protocol verification with dice
-
Election Verifiability with ProVerif
Vincent Cheval‚ Véronique Cortier and Alexandre Debant
In 36th IEEE Computer Security Foundations Symposium‚ CSF 2023‚ Dubrovnik‚ Croatia‚ July 10−14‚ 2023. Pages 43–58. IEEE. 2023.
Details about Election Verifiability with ProVerif | BibTeX data for Election Verifiability with ProVerif | DOI (10.1109/CSF57540.2023.00032) | Download (pdf) of Election Verifiability with ProVerif
-
Automatic verification of transparency protocols
Vincent Cheval‚ José Moreira and Mark Ryan
In 8th IEEE European Symposium on Security and Privacy‚ EuroS&P 2023‚ Delft‚ Netherlands‚ July 3−7‚ 2023. Pages 107–121. IEEE. 2023.
Details about Automatic verification of transparency protocols | BibTeX data for Automatic verification of transparency protocols | DOI (10.1109/EUROSP57164.2023.00016) | Download (pdf) of Automatic verification of transparency protocols
-
Indistinguishability Beyond Diff−Equivalence in ProVerif
Vincent Cheval and Itsaka Rakotonirina
In 36th IEEE Computer Security Foundations Symposium‚ CSF 2023‚ Dubrovnik‚ Croatia‚ July 10−14‚ 2023. Pages 184–199. IEEE. 2023.
Distinguished paper award
Details about Indistinguishability Beyond Diff−Equivalence in ProVerif | BibTeX data for Indistinguishability Beyond Diff−Equivalence in ProVerif | DOI (10.1109/CSF57540.2023.00036) | Download (pdf) of Indistinguishability Beyond Diff−Equivalence in ProVerif
-
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
Vincent Cheval‚ Cas Cremers‚ Alexander Dax‚ Lucca Hirschi‚ Charlie Jacomme and Steve Kremer
In Joseph A. Calandrino and Carmela Troncoso, editors, 32nd USENIX Security Symposium‚ USENIX Security 2023‚ Anaheim‚ CA‚ USA‚ August 9−11‚ 2023. Pages 5899–5916. USENIX Association. 2023.
Distinguish Paper Award
Details about Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | BibTeX data for Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses | Download (pdf) of Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
-
Iris: Dynamic Privacy Preserving Search in Structured Peer−to−Peer Networks
Angeliki Aktypi and Kasper Rasmussen
arXiv preprint. October, 2023.
Details about Iris: Dynamic Privacy Preserving Search in Structured Peer−to−Peer Networks | BibTeX data for Iris: Dynamic Privacy Preserving Search in Structured Peer−to−Peer Networks | Link to Iris: Dynamic Privacy Preserving Search in Structured Peer−to−Peer Networks
-
SAPIC+: protocol verifiers of the world‚ unite!
Vincent Cheval‚ Charlie Jacomme‚ Steve Kremer and Robert Künnemann
In Kevin R. B. Butler and Kurt Thomas, editors, 31st USENIX Security Symposium‚ USENIX Security 2022‚ Boston‚ MA‚ USA‚ August 10−12‚ 2022. Pages 3935–3952. USENIX Association. 2022.
Details about SAPIC+: protocol verifiers of the world‚ unite! | BibTeX data for SAPIC+: protocol verifiers of the world‚ unite! | Link to SAPIC+: protocol verifiers of the world‚ unite!
-
Symbolic protocol verification with dice: process equivalences in the presence of probabilities
Vincent Cheval‚ Raphaëlle Crubillé and Steve Kremer
In 35th IEEE Computer Security Foundations Symposium‚ CSF 2022‚ Haifa‚ Israel‚ August 7−10‚ 2022. Pages 319–334. IEEE. 2022.
Details about Symbolic protocol verification with dice: process equivalences in the presence of probabilities | BibTeX data for Symbolic protocol verification with dice: process equivalences in the presence of probabilities | DOI (10.1109/CSF54842.2022.9919644) | Download (pdf) of Symbolic protocol verification with dice: process equivalences in the presence of probabilities
-
ProVerif with Lemmas‚ Induction‚ Fast Subsumption‚ and Much More
Bruno Blanchet‚ Vincent Cheval and Véronique Cortier
In 43rd IEEE Symposium on Security and Privacy‚ SP 2022‚ San Francisco‚ CA‚ USA‚ May 22−26‚ 2022. Pages 69–86. IEEE. 2022.
Details about ProVerif with Lemmas‚ Induction‚ Fast Subsumption‚ and Much More | BibTeX data for ProVerif with Lemmas‚ Induction‚ Fast Subsumption‚ and Much More | DOI (10.1109/SP46214.2022.9833653) | Download (pdf) of ProVerif with Lemmas‚ Induction‚ Fast Subsumption‚ and Much More
-
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello
Karthikeyan Bhargavan‚ Vincent Cheval and Christopher A. Wood
In Heng Yin‚ Angelos Stavrou‚ Cas Cremers and Elaine Shi, editors, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security‚ CCS 2022‚ Los Angeles‚ CA‚ USA‚ November 7−11‚ 2022. Pages 365–379. ACM. 2022.
Details about A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello | BibTeX data for A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello | DOI (10.1145/3548606.3559360) | Download (pdf) of A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello
-
Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing
Angeliki Aktypi‚ Dimitris Karnikis‚ Nikos Vasilakis and Kasper Rasmussen
In Proceedings of the 17th International Conference on Availability‚ Reliability and Security (ARES '22). ACM. August, 2022.
Details about Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing | BibTeX data for Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing | DOI (10.1145/3538969.3538983)
-
Towards Models for Privacy Preservation in the Face of Metadata Exploitation
Marine Eviette and Andrew Simpson
2021.
Details about Towards Models for Privacy Preservation in the Face of Metadata Exploitation | BibTeX data for Towards Models for Privacy Preservation in the Face of Metadata Exploitation
-
The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols
Vincent Cheval‚ Steve Kremer and Itsaka Rakotonirina
In Vivek Nigam‚ Tajana Ban Kirigin‚ Carolyn L. Talcott‚ Joshua D. Guttman‚ Stepan L. Kuznetsov‚ Boon Thau Loo and Mitsuhiro Okada, editors, Logic‚ Language‚ and Security − Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday. Vol. 12300 of Lecture Notes in Computer Science. Pages 127–145. Springer. 2020.
Details about The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols | BibTeX data for The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols | DOI (10.1007/978-3-030-62077-6_10) | Download (pdf) of The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols
-
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network
Angeliki Aktypi‚ Kubra Kalkan and Kasper B. Rasmussen
In Proceedings of the 10th ACM Conference on Data and Application Security and Privacy (CODASPY '20). ACM. March, 2020.
Details about SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network | BibTeX data for SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network | DOI (10.1145/3374664.3375739)
-
If you can't understand it‚ you can't properly assess it! The reality of assessing security risks in Internet of Things systems
Jason R. C. Nurse‚ Petar Radanliev‚ Sadie Creese and David De Roure
In Living in the Internet of Things: Cybersecurity of the IoT Conference. IET. 2018.
To appear
Details about If you can't understand it‚ you can't properly assess it! The reality of assessing security risks in Internet of Things systems | BibTeX data for If you can't understand it‚ you can't properly assess it! The reality of assessing security risks in Internet of Things systems | Download (pdf) of If you can't understand it‚ you can't properly assess it! The reality of assessing security risks in Internet of Things systems
-
An Ethics Framework for Research into Heterogeneous Systems
Jassim Happa‚ Jason R C Nurse‚ Michael Goldsmith‚ Sadie Creese and Rebecca Williams
In Living in the Internet of Things: Cybersecurity of the IoT Conference. IET. 2018.
To appear
Details about An Ethics Framework for Research into Heterogeneous Systems | BibTeX data for An Ethics Framework for Research into Heterogeneous Systems
-
Sonification in Security Operations Centres: What do Security Practitioners Think?
Louise M. Axon‚ Bushra Alahmadi‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium. Internet Society. 2018.
To appear
Details about Sonification in Security Operations Centres: What do Security Practitioners Think? | BibTeX data for Sonification in Security Operations Centres: What do Security Practitioners Think? | Download (pdf) of Sonification in Security Operations Centres: What do Security Practitioners Think?
-
A Capability−oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems
Jack Sturgess‚ Jason R C Nurse and Jun Zhao
In Living in the Internet of Things: Cybersecurity of the IoT Conference. IET. 2018.
Details about A Capability−oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems | BibTeX data for A Capability−oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems | Download (pdf) of A Capability−oriented Approach to Assessing Privacy Risk in Smart Home Ecosystems | DOI (10.1049/cp.2018.0037)
-
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks
Angeliki Aktypi‚ Jason R.C. Nurse and Michael Goldsmith
In Proceedings of the 2017 International Workshop on Multimedia Privacy and Security (MPS '17). ACM. October, 2017.
Details about Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks | BibTeX data for Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks | Download (pdf) of Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks | DOI (10.1145/3137616.3137617)
-
Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms
Daniel Woods‚ Ioannis Agrafiotis‚ Jason RC Nurse and Sadie Creese
In Journal of Internet Services and Applications. 2017.
Details about Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms | BibTeX data for Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms | DOI (10.1186/s13174-017-0059-y)
-
A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring
Louise Axon; Jason R. C. Nurse; Michael Goldsmith; Sadie Creese
In International Journal On Advances in Security. 2017.
Details about A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring | BibTeX data for A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring | Download (pdf) of A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring
-
Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things
Meredydd Williams‚ Jason R.C. Nurse and Sadie Creese
In 15th International Conference on Privacy‚ Security and Trust (PST). IEEE. 2017.
(To appear)
Details about Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things | BibTeX data for Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things | Download (pdf) of Privacy is the boring bit: User perceptions and behaviour in the Internet−of−Things
-
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System
Jason R.C. Nurse; Ioannis Agrafiotis; Arnau Erola; Maria Bada; Taylor Roberts; Meredydd Williams; Michael Goldsmith; Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 19th International Conference on Human−Computer Interaction (HCII). Springer. 2017.
Details about An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | BibTeX data for An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | Download (pdf) of An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System | DOI (10.1007/978-3-319-58460-7_26)
-
Security risk assessment in Internet of Things systems
Jason R. C. Nurse; Sadie Creese; David De Roure
In IEEE IT Professional (IT Pro). Vol. 19. No. 5. Pages 20–26. 2017.
Details about Security risk assessment in Internet of Things systems | BibTeX data for Security risk assessment in Internet of Things systems | Download (pdf) of Security risk assessment in Internet of Things systems | DOI (10.1109/MITP.2017.3680959) | Link to Security risk assessment in Internet of Things systems
-
Exploring the use of Intel SGX for Secure Many−Party Applications
K.A. Küçük‚ A. Paverd‚ A. Martin‚ N. Asokan‚ A. Simpson and R. Ankele
In Proceedings of the 1st Workshop on System Software for Trusted Execution (SysTEX '16). New York‚ NY‚ USA. 2016. ACM.
The theoretical construct of a Trusted Third Party (TTP) has the potential to solve many security and privacy challenges. In particular‚ a TTP is an ideal way to achieve secure multiparty computation—a privacy−enhancing technique in which mutually distrusting participants jointly compute a function over their private inputs without revealing these inputs. Although there exist cryptographic protocols to achieve this‚ their performance often limits them to the two−party case‚ or to a small number of participants. However‚ many real−world applications involve thousands or tens of thousands of participants. Examples of this type of many−party application include privacy−preserving energy metering‚ location−based services‚ and mobile network roaming. Challenging the notion that a trustworthy TTP does not exist‚ recent research has shown how trusted hardware and remote attestation can be used to establish a sufficient level of assurance in a real system such that it can serve as a trustworthy remote entity (TRE). We explore the use of Intel SGX‚ the most recent and arguably most promising trusted hardware technology‚ as the basis for a TRE for many−party applications. Using privacy−preserving energy metering as a case study‚ we design and implement a prototype TRE using SGX‚ and compare its performance to a previous system based on the Trusted Platform Module (TPM). Our results show that even without specialized optimizations‚ SGX provides comparable performance to the optimized TPM system‚ and therefore has significant potential for large−scale many−party applications.
Details about Exploring the use of Intel SGX for Secure Many−Party Applications | BibTeX data for Exploring the use of Intel SGX for Secure Many−Party Applications | DOI (10.1145/3007788.3007793) | Link to Exploring the use of Intel SGX for Secure Many−Party Applications
-
Applying the Trustworthy Remote Entity to Privacy−Preserving Multiparty Computation: Requirements and Criteria for Large−Scale Applications
R. Ankele‚ K.A. Küçük‚ A.P. Martin‚ A.C. Simpson and A. Paverd
In Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016). 2016.
The significant improvements in technology that have been seen in recent years have resulted in a shift in the computing paradigm: from isolated computational tasks to distributed tasks executed in multi−party settings. Secure Multi−Party Computation (MPC) allows for multiple parties to jointly compute a function on their private inputs. Unfortunately‚ traditional MPC algorithms are inefficient in the presence of a large number of participants. Moreover‚ in the traditional setting‚ MPC is only concerned with privacy of the input values. However‚ there is often a need to preserve the privacy of individuals on the basis of the output of the computation. Techniques proposed by the Trusted Computing community have shown promise in the context of new secure‚ efficient large−scale applications. In this paper‚ we define‚ analyse several use cases related to large−scale applications of the MPC paradigm. From these use cases‚ we derive requirements‚ criteria to evaluate certain MPC protocols used for large−scale applications. Furthermore‚ we propose the utilisation of a Trustworthy Remote Entity‚ privacy−preserving algorithms to achieve confidentiality‚ privacy in such settings.
Details about Applying the Trustworthy Remote Entity to Privacy−Preserving Multiparty Computation: Requirements and Criteria for Large−Scale Applications | BibTeX data for Applying the Trustworthy Remote Entity to Privacy−Preserving Multiparty Computation: Requirements and Criteria for Large−Scale Applications | DOI (10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077) | Link to Applying the Trustworthy Remote Entity to Privacy−Preserving Multiparty Computation: Requirements and Criteria for Large−Scale Applications
-
Insider threat response and recovery strategies in financial services firms
Jason R. C. Nurse Jacqueline Eggenschwiler Ioannis Agrafiotis
In Computer Fraud & Security. 2016.
Details about Insider threat response and recovery strategies in financial services firms | BibTeX data for Insider threat response and recovery strategies in financial services firms | Download (pdf) of Insider threat response and recovery strategies in financial services firms | DOI (10.1016/S1361-3723(16)30091-4)
-
A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models
Tabish Rashid‚ Ioannis Agrafiotis and Jason R.C. Nurse
In 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST). ACM. 2016.
Details about A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models | BibTeX data for A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models | Download (pdf) of A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models | DOI (10.1145/2995959.2995964)
-
Attacker−Parametrised Attack Graphs
Alastair Janse van Rensburg‚ Jason R.C. Nurse and Michael Goldsmith
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 316–319. 2016.
Details about Attacker−Parametrised Attack Graphs | BibTeX data for Attacker−Parametrised Attack Graphs | Download (pdf) of Attacker−Parametrised Attack Graphs
-
A Pragmatic System−failure Assessment and Response Model
Jassim Happa‚ Graham Fairclough‚ Jason R.C. Nurse‚ Ioannis Agrafiotis‚ Michael Goldsmith and Sadie Creese
In 2nd International Conference on Information Systems Security and Privacy. 2016.
Details about A Pragmatic System−failure Assessment and Response Model | BibTeX data for A Pragmatic System−failure Assessment and Response Model | Download (pdf) of A Pragmatic System−failure Assessment and Response Model | DOI (10.5220/0005795105030508)
-
Determining the veracity of rumours on Twitter
Georgios Giasemidis‚ Colin Singleton‚ Ioannis Agrafiotis‚ Jason R.C. Nurse‚ Alan Pilgrim and Chris Willis
In 8th International Conference on Social Informatics (SocInfo 2016). Pages 185–205. Springer. 2016.
Details about Determining the veracity of rumours on Twitter | BibTeX data for Determining the veracity of rumours on Twitter | Download (pdf) of Determining the veracity of rumours on Twitter | DOI (10.1007/978-3-319-47880-7_12)
-
Exploring a Controls−Based Assessment of Infrastructure Vulnerability
Oliver Farnan and Jason R. C. Nurse
In Risks and Security of Internet and Systems. Vol. 9572 of Lecture Notes in Computer Science. Pages 144−159. Springer. 2016.
Details about Exploring a Controls−Based Assessment of Infrastructure Vulnerability | BibTeX data for Exploring a Controls−Based Assessment of Infrastructure Vulnerability | Download (pdf) of Exploring a Controls−Based Assessment of Infrastructure Vulnerability | DOI (10.1007/978-3-319-31811-0_9)
-
Future scenarios and challenges for security and privacy
Meredydd Williams‚ Louise Axon‚ Jason R. C. Nurse and Sadie Creese
In 2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016). IEEE. 2016.
Details about Future scenarios and challenges for security and privacy | BibTeX data for Future scenarios and challenges for security and privacy | Download (pdf) of Future scenarios and challenges for security and privacy | DOI (10.1109/RTSI.2016.7740625) | Link to Future scenarios and challenges for security and privacy
-
Perspectives on privacy in the use of online systems
Meredydd Williams and Jason R. C. Nurse
In 30th British Human Computer Interaction Conference (B−HCI). BCS. 2016.
Details about Perspectives on privacy in the use of online systems | BibTeX data for Perspectives on privacy in the use of online systems | Download (pdf) of Perspectives on privacy in the use of online systems | Link to Perspectives on privacy in the use of online systems
-
Reflecting on the Use of Sonification for Network Monitoring
Louise Axon‚ Sadie Creese‚ Michael Goldsmith and Jason R.C. Nurse
In 10th International Conference on Emerging Security Information‚ Systems and Technologies. Pages 254–261. 2016.
Details about Reflecting on the Use of Sonification for Network Monitoring | BibTeX data for Reflecting on the Use of Sonification for Network Monitoring | Download (pdf) of Reflecting on the Use of Sonification for Network Monitoring
-
The Anatomy of Online Deception: What Makes Automated Text Convincing?
Richard Everett‚ Jason R.C. Nurse and Arnau Erola
In 31st ACM/SIGAPP Symposium on Applied Computing (SAC). ACM. 2016.
Details about The Anatomy of Online Deception: What Makes Automated Text Convincing? | BibTeX data for The Anatomy of Online Deception: What Makes Automated Text Convincing? | Download (pdf) of The Anatomy of Online Deception: What Makes Automated Text Convincing? | DOI (10.1145/2851613.2851813)
-
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home
Jason R.C. Nurse‚ Ahmad Atamli and Andrew Martin
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human−Computer Interaction (HCI). Pages 255−267. Springer. 2016.
Details about Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home | BibTeX data for Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home | Download (pdf) of Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home | DOI (10.1007/978-3-319-39381-0_23)
-
Towards Designing a Multipurpose Cybercrime Intelligence Framework
Mariam Nouh‚ Jason R.C. Nurse and Michael Goldsmith
In European Intelligence and Security Informatics Conference (EISIC). IEEE. 2016.
Details about Towards Designing a Multipurpose Cybercrime Intelligence Framework | BibTeX data for Towards Designing a Multipurpose Cybercrime Intelligence Framework | Download (pdf) of Towards Designing a Multipurpose Cybercrime Intelligence Framework | DOI (10.1109/EISIC.2016.018) | Link to Towards Designing a Multipurpose Cybercrime Intelligence Framework
-
Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks
Cristian Iuga‚ Jason R.C. Nurse and Arnau Erola
In Journal of Human−centric Computing and Information Sciences. Vol. 6. No. 8. 2016.
Details about Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks | BibTeX data for Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks | DOI (10.1186/s13673-016-0065-2) | Link to Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks
-
Analytics for characterising and measuring the naturalness of online personae
Jason R.C. Nurse‚ Arnau Erola‚ Thomas Gibson−Robinson‚ Michael Goldsmith and Sadie Creese
In Security Informatics Journal. Vol. 5. No. 3. 2016.
Details about Analytics for characterising and measuring the naturalness of online personae | BibTeX data for Analytics for characterising and measuring the naturalness of online personae | Download (pdf) of Analytics for characterising and measuring the naturalness of online personae | DOI (10.1186/s13388-016-0028-1) | Link to Analytics for characterising and measuring the naturalness of online personae
-
Attack Tree Analysis for Insider Threats on the IoT using Isabelle
Florian Kammüller‚ Jason R.C. Nurse and Christian W. Probst
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human−Computer Interaction (HCI). Pages 234−246. Springer. 2016.
Details about Attack Tree Analysis for Insider Threats on the IoT using Isabelle | BibTeX data for Attack Tree Analysis for Insider Threats on the IoT using Isabelle | DOI (10.1007/978-3-319-39381-0_21)
-
Optional data disclosure and the online privacy paradox: A UK perspective
Meredydd Williams and Jason R.C. Nurse
In Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human−Computer Interaction (HCI). Springer. Pages 186−197. Springer. 2016.
Details about Optional data disclosure and the online privacy paradox: A UK perspective | BibTeX data for Optional data disclosure and the online privacy paradox: A UK perspective | DOI (10.1007/978-3-319-39381-0_17)
-
Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices
Chika Eze‚ Jason R.C. Nurse and Jassim Happa
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications (JoWUA). Vol. 7. No. 1. 2016.
Details about Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices | BibTeX data for Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices | Download (pdf) of Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices | Link to Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices
-
Practical Attacks Against Privacy and Availability in 4G/LTE
Altaf Shaik‚ Ravishankar Borgaonkar‚ Jean−Pierre Seifert‚ N. Asokan and Valtteri Niemi
In 23nd Annual Network and Distributed System Security Symposium‚ NDSS 2016‚ San Diego‚ California‚ USA‚ February 21−24‚ 2016. 2016.
Details about Practical Attacks Against Privacy and Availability in 4G/LTE | BibTeX data for Practical Attacks Against Privacy and Availability in 4G/LTE | Link to Practical Attacks Against Privacy and Availability in 4G/LTE
-
Exploring the risks to identity security and privacy in cyberspace
Jason R.C. Nurse
In XRDS: Crossroads‚ The ACM Magazine for Students. Vol. 21. No. 3. Pages 42–47. 2015.
Details about Exploring the risks to identity security and privacy in cyberspace | BibTeX data for Exploring the risks to identity security and privacy in cyberspace | Download (pdf) of Exploring the risks to identity security and privacy in cyberspace | DOI (10.1145/2730912) | Link to Exploring the risks to identity security and privacy in cyberspace
-
On the Security of the Automatic Dependent Surveillance−Broadcast Protocol
Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In IEEE Communications Surveys & Tutorials. Vol. 17. No. 2. Pages 1066 − 1087. 2015.
Details about On the Security of the Automatic Dependent Surveillance−Broadcast Protocol | BibTeX data for On the Security of the Automatic Dependent Surveillance−Broadcast Protocol | Download (pdf) of On the Security of the Automatic Dependent Surveillance−Broadcast Protocol | DOI (10.1109/COMST.2014.2365951) | Link to On the Security of the Automatic Dependent Surveillance−Broadcast Protocol
-
OpenSky: A Swiss Army Knife for Air Traffic Security Research
Martin Strohmeier‚ Matthias Schäfer‚ Markus Fuchs‚ Vincent Lenders and Ivan Martinovic
In Digital Avionics Systems Conference (DASC)‚ 2015 IEEE/AIAA 34th. IEEE. September, 2015.
(Best Paper of Conference Award!)
Details about OpenSky: A Swiss Army Knife for Air Traffic Security Research | BibTeX data for OpenSky: A Swiss Army Knife for Air Traffic Security Research | Download Strohmeier - DASC 2015 - Paper.pdf of OpenSky: A Swiss Army Knife for Air Traffic Security Research | Download Strohmeier - DASC 2015 - Slides.pdf of OpenSky: A Swiss Army Knife for Air Traffic Security Research | DOI (10.1109/DASC.2015.7311411) | Link to OpenSky: A Swiss Army Knife for Air Traffic Security Research
-
On Passive Data Link Layer Fingerprinting of Aircraft Transponders
Martin Strohmeier and Ivan Martinovic
In 1st ACM Workshop on Cyber−Physical Systems Security & Privacy (CPS−SPC). ACM. October, 2015.
Details about On Passive Data Link Layer Fingerprinting of Aircraft Transponders | BibTeX data for On Passive Data Link Layer Fingerprinting of Aircraft Transponders | Download (pdf) of On Passive Data Link Layer Fingerprinting of Aircraft Transponders | DOI (10.1145/2808705.2808712) | Link to On Passive Data Link Layer Fingerprinting of Aircraft Transponders
-
Lightweight Location Verification in Air Traffic Surveillance Networks
Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In Proceedings of the 1st ACM Workshop on Cyber−Physical System Security (CPSS '15). Pages 49−60. ACM. April, 2015.
(Best Paper Award!)
Details about Lightweight Location Verification in Air Traffic Surveillance Networks | BibTeX data for Lightweight Location Verification in Air Traffic Surveillance Networks | Download (pdf) of Lightweight Location Verification in Air Traffic Surveillance Networks | DOI (10.1145/2732198.2732202) | Link to Lightweight Location Verification in Air Traffic Surveillance Networks
-
Intrusion Detection for Airborne Communication using PHY−Layer Information
Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
In Detection of Intrusions and Malware‚ and Vulnerability Assessment (DIMVA). Vol. 9148 of Lecture Notes in Computer Science. Pages 67−77. Springer International Publishing. July, 2015.
Details about Intrusion Detection for Airborne Communication using PHY−Layer Information | BibTeX data for Intrusion Detection for Airborne Communication using PHY−Layer Information | Download (pdf) of Intrusion Detection for Airborne Communication using PHY−Layer Information | DOI (10.1007/978-3-319-20550-2_4) | Link to Intrusion Detection for Airborne Communication using PHY−Layer Information
-
Online banking malware ontology
Rodrigo Carvalho‚ Michael Goldsmith and Jason R. C. Nurse
In International Crime and Intelligence Analysis Conference (ICIA). 2015.
Details about Online banking malware ontology | BibTeX data for Online banking malware ontology | Download (pdf) of Online banking malware ontology
-
Applying Social Network Analysis to Security
Elizabeth Phillips‚ Jason R. C. Nurse‚ Michael Goldsmith and Sadie Creese
In International Conference on Cyber Security for Sustainable Society. Pages 11–27. 2015.
Details about Applying Social Network Analysis to Security | BibTeX data for Applying Social Network Analysis to Security | Download (pdf) of Applying Social Network Analysis to Security
-
Investigating the leakage of sensitive personal and organisational information in email headers
Jason R. C. Nurse‚ Arnau Erola‚ Michael Goldsmith and Sadie Creese
In Journal of Internet Services and Information Security. Vol. 5. No. 1. 2015.
Details about Investigating the leakage of sensitive personal and organisational information in email headers | BibTeX data for Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers | Download (pdf) of Investigating the leakage of sensitive personal and organisational information in email headers
-
Predicting Graphical Passwords
Matthieu Devlin‚ Jason R. C. Nurse‚ Duncan Hodges‚ Michael Goldsmith and Sadie Creese
In Theo Tryfonas and Ioannis Askoxylakis, editors, International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 17th International Conference on Human−Computer Interaction (HCI). Pages 23–35. Springer. 2015.
Details about Predicting Graphical Passwords | BibTeX data for Predicting Graphical Passwords | Download (pdf) of Predicting Graphical Passwords | DOI (10.1007/978-3-319-20376-8_3)
-
Understanding Insider Threat: A Framework for Characterising Attacks
Jason R.C. Nurse‚ Oliver Buckley‚ Philip A. Legg‚ Michael Goldsmith‚ Sadie Creese‚ Gordon R.T. Wright and Monica Whitty
In Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14)‚ in conjunction with the IEEE Symposium on Security and Privacy (SP).. IEEE. 2014.
Details about Understanding Insider Threat: A Framework for Characterising Attacks | BibTeX data for Understanding Insider Threat: A Framework for Characterising Attacks | Download of Understanding Insider Threat: A Framework for Characterising Attacks | DOI (10.1109/SPW.2014.38) | Link to Understanding Insider Threat: A Framework for Characterising Attacks
-
Realities and Challenges of NextGen Air Traffic Management: The Case of ADS−B
Martin Strohmeier‚ Matthias Schäfer‚ Vincent Lenders and Ivan Martinovic
In Communications Magazine‚ IEEE. Vol. 52. No. 5. Pages 111−118. May, 2014.
Details about Realities and Challenges of NextGen Air Traffic Management: The Case of ADS−B | BibTeX data for Realities and Challenges of NextGen Air Traffic Management: The Case of ADS−B | DOI (10.1109/MCOM.2014.6815901) | Link to Realities and Challenges of NextGen Air Traffic Management: The Case of ADS−B
-
Demonstration Abstract − OpenSky: A Large−scale ADS−B Sensor Network for Research
Matthias Schäfer‚ Martin Strohmeier‚ Vincent Lenders‚ Ivan Martinovic and Matthias Wilhelm
In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks. Pages 313–314. IEEE Press. April, 2014.
(Best Demo Award: 1st Runner Up)
Details about Demonstration Abstract − OpenSky: A Large−scale ADS−B Sensor Network for Research | BibTeX data for Demonstration Abstract − OpenSky: A Large−scale ADS−B Sensor Network for Research | Download (pdf) of Demonstration Abstract − OpenSky: A Large−scale ADS−B Sensor Network for Research | DOI (10.1109/IPSN.2014.6846779) | Link to Demonstration Abstract − OpenSky: A Large−scale ADS−B Sensor Network for Research
-
Bringing Up OpenSky: A Large−scale ADS−B Sensor Network for Research
Matthias Schäfer‚ Martin Strohmeier‚ Vincent Lenders‚ Ivan Martinovic and Matthias Wilhelm
In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks. Pages 83−94. IEEE Press. April, 2014.
Details about Bringing Up OpenSky: A Large−scale ADS−B Sensor Network for Research | BibTeX data for Bringing Up OpenSky: A Large−scale ADS−B Sensor Network for Research | Download (pdf) of Bringing Up OpenSky: A Large−scale ADS−B Sensor Network for Research | DOI (10.1109/IPSN.2014.6846743) | Link to Bringing Up OpenSky: A Large−scale ADS−B Sensor Network for Research
-
Security and Privacy in Smart Grid Demand Response Systems
Andrew J Paverd‚ Andrew P Martin and Ian Brown
In Jorge Cuellar, editor, Smart Grid Security. Pages 1−15. Springer International Publishing. 2014.
Details about Security and Privacy in Smart Grid Demand Response Systems | BibTeX data for Security and Privacy in Smart Grid Demand Response Systems | Download (pdf) of Security and Privacy in Smart Grid Demand Response Systems | DOI (10.1007/978-3-319-10329-7_1) | Link to Security and Privacy in Smart Grid Demand Response Systems
-
Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing
Andrew J Paverd‚ Andrew P Martin and Ian Brown
In Fifth IEEE International Conference on Smart Grid Communications (SmartGridComm 2014). 2014.
Details about Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | BibTeX data for Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | Download Paverd-SmartGridComm-2014.pdf of Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | Download Paverd-SmartGridComm-2014-slides.pdf of Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | DOI (10.1109/SmartGridComm.2014.7007758) | Link to Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing
-
Characteristic−Based Security Analysis for the Personal Network
Andrew J. Paverd‚ Fadi El−Moussa and Ian Brown
In HomeSys Workshop at ACM UbiComp. 2014.
Details about Characteristic−Based Security Analysis for the Personal Network | BibTeX data for Characteristic−Based Security Analysis for the Personal Network | Download Paverd-HomeSys-2014-slides.pdf of Characteristic−Based Security Analysis for the Personal Network | Download Paverd-HomeSys-2014-v4.pdf of Characteristic−Based Security Analysis for the Personal Network | DOI (10.1145/2638728.2641549) | Link to Characteristic−Based Security Analysis for the Personal Network
-
Security and Privacy in Smart Grid Demand Response Systems
Andrew Paverd‚ Andrew Martin and Ian Brown
In Second Open EIT ICT Labs Workshop on Smart Grid Security − SmartGridSec14. 2014.
Details about Security and Privacy in Smart Grid Demand Response Systems | BibTeX data for Security and Privacy in Smart Grid Demand Response Systems | Download (pdf) of Security and Privacy in Smart Grid Demand Response Systems
-
Security of ADS−B: State of the Art and Beyond
Martin Strohmeier‚ Vincent Lenders and Ivan Martinovic
No. RR−13−10. DCS. 2013.
Details about Security of ADS−B: State of the Art and Beyond | BibTeX data for Security of ADS−B: State of the Art and Beyond | Download (pdf) of Security of ADS−B: State of the Art and Beyond
-
Neighborhood Watch: On Network Coding Throughput and Key Sharing
Martin Strohmeier‚ Ivan Martinovic‚ Utz Roedig‚ Karim El Defrawy and Jens Schmitt
In Global Communications Conference (GLOBECOM)‚ 2013 IEEE. Pages 849 − 854. IEEE. December, 2013.
Details about Neighborhood Watch: On Network Coding Throughput and Key Sharing | BibTeX data for Neighborhood Watch: On Network Coding Throughput and Key Sharing | Download (pdf) of Neighborhood Watch: On Network Coding Throughput and Key Sharing | DOI (10.1109/GLOCOM.2013.6831179) | Link to Neighborhood Watch: On Network Coding Throughput and Key Sharing
-
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies
Shamal Faily‚ John Lyle‚ Ivan Flechais‚ Andrea Atzeni‚ Cesare Cameroni‚ Hans Myrhaug‚ Ayse Goker and Robert Kleinfeld
In Proceedings of the Workshop on Home Usable Privacy and Security. 2013.
Details about Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies | BibTeX data for Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies
-
Security Patterns Considered Harmful?
Shamal Faily
In Proceedings of The Second International Workshop on Cyberpatterns: Unifying Design Patterns with Security‚ Attack and Forensic Patterns. 2013.
To Appear
Details about Security Patterns Considered Harmful? | BibTeX data for Security Patterns Considered Harmful?
-
Trustworthy Remote Entities in the Smart Grid
Andrew Paverd
In 28th ACM Symposium On Applied Computing − SAC2013. Coimbra‚ Portugal. 2013.
Student Research Competition Finalist
Details about Trustworthy Remote Entities in the Smart Grid | BibTeX data for Trustworthy Remote Entities in the Smart Grid | Download (pdf) of Trustworthy Remote Entities in the Smart Grid | Link to Trustworthy Remote Entities in the Smart Grid
-
Guidelines for Integrating Personas into Software Engineering Tools
Shamal Faily and John Lyle
In Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive computing systems. Pages 69–74. 2013.
Details about Guidelines for Integrating Personas into Software Engineering Tools | BibTeX data for Guidelines for Integrating Personas into Software Engineering Tools
-
Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract)
Shamal Faily‚ David Power‚ Philip Armstrong and Ivan Flechais
In Trust and Trustworthy Computing‚ 6th International Conference‚ TRUST 2013. 2013.
To Appear
Details about Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract) | BibTeX data for Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract)
-
Developing secure‚ unified multi−device and multi−domain platforms: A case study from the webinos project
Andrea Atzeni‚ John Lyle and Shamal Faily
In Architectures and Protocols for Secure Information Technology. IGI Global. 2013.
To Appear
Details about Developing secure‚ unified multi−device and multi−domain platforms: A case study from the webinos project | BibTeX data for Developing secure‚ unified multi−device and multi−domain platforms: A case study from the webinos project
-
Designing Interactive Secure Systems: CHI 2013 Special Interest Group
Shamal Faily‚ Lizzie Coles−Kemp‚ Paul Dunphy‚ Mike Just‚ Yoko Akama and Alexander De Luca
In CHI '13 Extended Abstracts on Human Factors in Computing Systems. ACM. 2013.
To Appear
Details about Designing Interactive Secure Systems: CHI 2013 Special Interest Group | BibTeX data for Designing Interactive Secure Systems: CHI 2013 Special Interest Group | Download (pdf) of Designing Interactive Secure Systems: CHI 2013 Special Interest Group
-
A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols
Simon Eberz‚ Martin Strohmeier‚ Matthias Wilhelm and Ivan Martinovic
In 17th European Symposium on Research in Computer Security (ESORICS). Vol. 7459 of Lecture Notes in Computer Science. Pages 235−252. Springer. September, 2012.
Details about A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols | BibTeX data for A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols | Download (pdf) of A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols | DOI (10.1007/978-3-642-33167-1_14) | Link to A Practical Man−In−The−Middle Attack on Signal−Based Key Generation Protocols
-
Hardware Security for Device Authentication in the Smart Grid
Andrew Paverd and Andrew Martin
In First Open EIT ICT Labs Workshop on Smart Grid Security − SmartGridSec12. Berlin‚ Germany. 2012.
Details about Hardware Security for Device Authentication in the Smart Grid | BibTeX data for Hardware Security for Device Authentication in the Smart Grid | Download (pdf) of Hardware Security for Device Authentication in the Smart Grid | Link to Hardware Security for Device Authentication in the Smart Grid
-
BottleCap: a Credential Manager for Capability Systems
Justin King−Lacroix and Andrew Martin
In Proceedings of The Seventh ACM Workshop on Scalable Trusted Computing. 2012.
To appear
Details about BottleCap: a Credential Manager for Capability Systems | BibTeX data for BottleCap: a Credential Manager for Capability Systems
-
From Qualitative to Quantitative Information Erasure
Adedayo O. Adetoye and Michael H. Goldsmith
In International Workshop on Quantitative Aspects in Security Assurance (QASA 2012‚ colocated with ESORICS). September, 2012.
To appear
Details about From Qualitative to Quantitative Information Erasure | BibTeX data for From Qualitative to Quantitative Information Erasure | Download qasa2012-Erasure-SLIDES.pdf of From Qualitative to Quantitative Information Erasure | Download erasure-QASA.pdf of From Qualitative to Quantitative Information Erasure
-
Model−driven architectural risk analysis using architectural and contextualised attack patterns
Shamal Faily‚ John Lyle‚ Cornelius Namiluko‚ Andrea Atzeni and Cesare Cameroni
In Proceedings of the Workshop on Model−Driven Security. Pages 3:1–3:6. ACM. 2012.
Details about Model−driven architectural risk analysis using architectural and contextualised attack patterns | BibTeX data for Model−driven architectural risk analysis using architectural and contextualised attack patterns | Download (pdf) of Model−driven architectural risk analysis using architectural and contextualised attack patterns
-
Requirements Sensemaking using Concept Maps
Shamal Faily‚ John Lyle‚ Andre Paul‚ Andrea Atzeni‚ Dieter Blomme‚ Heiko Desruelle and Krishna Bangalore
In HCSE'2012: Proceedings of the 4th International Conference on Human−Centered Software Engineering. Pages 217–232. Springer. 2012.
Details about Requirements Sensemaking using Concept Maps | BibTeX data for Requirements Sensemaking using Concept Maps | Download (pdf) of Requirements Sensemaking using Concept Maps
-
Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS
Shamal Faily and Ivan Flechais
In Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems. Pages 3:1–3:4. 2012.
Details about Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS | BibTeX data for Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS | Download (pdf) of Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS
-
Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems
Shamal Faily‚ John Lyle and Simon Parkin
In Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems. Pages 5:1–5:4. 2012.
Details about Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems | BibTeX data for Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems | Download (pdf) of Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems
-
Personal PKI for the smart device era
John Lyle‚ Andrew Paverd‚ Justin King−Lacroix‚ Andrea Atzeni‚ Habib Virji‚ Ivan Flechais and Shamal Faily
In 9th European PKI Workshop: Research and Applications. 2012.
Details about Personal PKI for the smart device era | BibTeX data for Personal PKI for the smart device era | Download (pdf) of Personal PKI for the smart device era
-
Provenance as a Security Control
Andrew Martin‚ John Lyle and Cornelius Namiluko
In Proceedings of TaPP'12: the 4th USENIX Workshop on the Theory and Practice of Provenance. USENIX. 2012.
Details about Provenance as a Security Control | BibTeX data for Provenance as a Security Control | Link to Provenance as a Security Control
-
Tool−support Premortems with Attack and Security Patterns
Shamal Faily‚ John Lyle and Simon Parkin
In First International Workshop on Cyberpatterns: Unifying Design Patterns with Security‚ Attack and Forensic Patterns. Pages 10–11. 2012.
Details about Tool−support Premortems with Attack and Security Patterns | BibTeX data for Tool−support Premortems with Attack and Security Patterns
-
On the design and development of webinos: a distributed mobile application middleware
John Lyle‚ Shamal Faily‚ Ivan Flechais‚ Andre Paul‚ Ayse Goker‚ Hans Myrhaug‚ Heiko Desruelle and Andrew Martin
In Proceedings of the 12th IFIP WG 6.1 international conference on Distributed applications and interoperable systems. Pages 140–147. 2012.
Details about On the design and development of webinos: a distributed mobile application middleware | BibTeX data for On the design and development of webinos: a distributed mobile application middleware | Download (pdf) of On the design and development of webinos: a distributed mobile application middleware
-
The webinos project
Christian Fuhrhop‚ John Lyle and Shamal Faily
In Proceedings of the 21st international conference companion on World Wide Web. Pages 259–262. ACM. 2012.
Details about The webinos project | BibTeX data for The webinos project | Download (pdf) of The webinos project
-
Cross−platform access control for mobile web applications
John Lyle‚ Salvatore Monteleone‚ Shamal Faily‚ Davide Patti and Fabio Ricciato
In Policies for Distributed Systems and Networks (POLICY)‚ 2012 IEEE International Symposium on. Pages 37–44. 2012.
Details about Cross−platform access control for mobile web applications | BibTeX data for Cross−platform access control for mobile web applications | Download (pdf) of Cross−platform access control for mobile web applications
-
Analysing Chindogu: Applying Defamiliarisation to Security Design
Shamal Faily
In CHI 2012 Workshop on Defamiliarisation in Innovation and Usability. 2012.
Details about Analysing Chindogu: Applying Defamiliarisation to Security Design | BibTeX data for Analysing Chindogu: Applying Defamiliarisation to Security Design | Download (pdf) of Analysing Chindogu: Applying Defamiliarisation to Security Design
-
Persona Cases: A Technique for grounding Personas
Shamal Faily and Ivan Flechais
In CHI '11: Proceedings of the 29th International conference on Human factors in computing systems. Pages 2267−2270. Vancouver‚ BC‚ Canada. 2011. ACM.
Details about Persona Cases: A Technique for grounding Personas | BibTeX data for Persona Cases: A Technique for grounding Personas
-
Here's Johnny: a Methodology for Developing Attacker Personas
Andrea Atzeni‚ Shamal Faily‚ John Lyle‚ Cesare Cameroni and Ivan Flechais
In Proceedings of the 6th International Conference on Availability‚ Reliability and Security. Pages 722–727. 2011.
Details about Here's Johnny: a Methodology for Developing Attacker Personas | BibTeX data for Here's Johnny: a Methodology for Developing Attacker Personas | Download (pdf) of Here's Johnny: a Methodology for Developing Attacker Personas
-
“Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices
George Gionis‚ Heiko Desruelle‚ Dieter Blomme‚ John Lyle‚ Shamal Faily and Louay Bassbouss
In W3C/PrimeLife Federated Social Web Europe Conference 2011. June, 2011.
Details about “Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices | BibTeX data for “Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices | Download (pdf) of “Do we know each other or is it just our Devices?”: A Federated Context Model for Describing Social Activity Across Devices
-
Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework
Shamal Faily and Ivan Flechais
In International Journal of Secure Software Engineering. Vol. 2. No. 4. Pages 1–18. 2011.
Details about Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework | BibTeX data for Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework
-
User−Centered Information Security Policy Development in a Post−Stuxnet World
Shamal Faily and Ivan Flechais
In Proceedings of the 6th International Conference on Availability‚ Reliability and Security. Pages 716–721. 2011.
Details about User−Centered Information Security Policy Development in a Post−Stuxnet World | BibTeX data for User−Centered Information Security Policy Development in a Post−Stuxnet World | Download (pdf) of User−Centered Information Security Policy Development in a Post−Stuxnet World
-
Two Requirements for Usable and Secure Software Engineering
Shamal Faily
In 1st Software and Usable Security Aligned for Good Engineering (SAUSAGE) Workshop. 2011.
Details about Two Requirements for Usable and Secure Software Engineering | BibTeX data for Two Requirements for Usable and Secure Software Engineering | Download (pdf) of Two Requirements for Usable and Secure Software Engineering
-
Security goes to ground: on the applicability of Security Entrepreneurship to Grassroot Activism
Shamal Faily
In CHI Workshop on HCI‚ Politics and the City: Engaging with Urban Grassroots Movements for Reflection and Action. 2011.
Details about Security goes to ground: on the applicability of Security Entrepreneurship to Grassroot Activism | BibTeX data for Security goes to ground: on the applicability of Security Entrepreneurship to Grassroot Activism
-
Eliciting Usable Security Requirements with Misusability Cases
Shamal Faily and Ivan Flechais
In Proceedings of the 19th IEEE International Requirements Engineering Conference. Pages 339–340. IEEE Computer Society. 2011.
Pre−print available at http://www.cs.ox.ac.uk/files/4125/PID1921187.pdf
Details about Eliciting Usable Security Requirements with Misusability Cases | BibTeX data for Eliciting Usable Security Requirements with Misusability Cases | Download (pdf) of Eliciting Usable Security Requirements with Misusability Cases | DOI (10.1109/RE.2011.6051665)
-
Bridging User−Centered Design and Requirements Engineering with GRL and Persona Cases
Shamal Faily
In Proceedings of the 5th International i* Workshop. Pages 114–119. 2011.
Details about Bridging User−Centered Design and Requirements Engineering with GRL and Persona Cases | BibTeX data for Bridging User−Centered Design and Requirements Engineering with GRL and Persona Cases | Download (pdf) of Bridging User−Centered Design and Requirements Engineering with GRL and Persona Cases
-
A framework for usable and secure system design
Shamal Faily
PhD Thesis University of Oxford. 2011.
Details about A framework for usable and secure system design | BibTeX data for A framework for usable and secure system design | Download (pdf) of A framework for usable and secure system design
-
Designing and Aligning e−Science Security Culture with Design
Shamal Faily and Ivan Flechais
In Information Management & Computer Security. Vol. 18. No. 5. 2010.
Details about Designing and Aligning e−Science Security Culture with Design | BibTeX data for Designing and Aligning e−Science Security Culture with Design
-
To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design
Shamal Faily and Ivan Flechais
In NSPW '10: Proceedings of the 2010 New Security Paradigms Workshop. Pages 73–84. New York‚ NY‚ USA. 2010. ACM.
Details about To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design | BibTeX data for To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design | Download (pdf) of To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design
-
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Shamal Faily and Ivan Flechais
In HCSE'2010: Proceedings of the 3rd Conference on Human−Centered Software Engineering. Pages 111–118. Springer. 2010.
Details about The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design | BibTeX data for The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design | Download (pdf) of The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
-
Security and Usability: Searching for the philosopher's stone
Ivan Flechais and Shamal Faily
In Workshop on the development of EuroSOUPS (European Symposium on Usable Privacy and Security). 2010.
Details about Security and Usability: Searching for the philosopher's stone | BibTeX data for Security and Usability: Searching for the philosopher's stone | Download (pdf) of Security and Usability: Searching for the philosopher's stone
-
A Meta−Model for Usable Secure Requirements Engineering
Shamal Faily and Ivan Flechais
In Software Engineering for Secure Systems‚ 2010. SESS '10. ICSE Workshop on. Pages 29–35. May, 2010.
Details about A Meta−Model for Usable Secure Requirements Engineering | BibTeX data for A Meta−Model for Usable Secure Requirements Engineering | Download (pdf) of A Meta−Model for Usable Secure Requirements Engineering | DOI (10.1145/1809100.1809105)
-
Towards tool−support for Usable Secure Requirements Engineering with CAIRIS
Shamal Faily and Ivan Flechais
In International Journal of Secure Software Engineering. Vol. 1. No. 3. Pages 56–70. 2010.
Details about Towards tool−support for Usable Secure Requirements Engineering with CAIRIS | BibTeX data for Towards tool−support for Usable Secure Requirements Engineering with CAIRIS | DOI (10.4018/ijsse.2010070104)
-
Security through Usability: a user−centered approach for balanced security policy requirements
Shamal Faily and Ivan Flechais
In Poster at: Annual Computer Security Applications Conference. 2010.
Details about Security through Usability: a user−centered approach for balanced security policy requirements | BibTeX data for Security through Usability: a user−centered approach for balanced security policy requirements | Download (pdf) of Security through Usability: a user−centered approach for balanced security policy requirements
-
Improving Secure Systems Design with Security Culture
Shamal Faily and Ivan Flechais
In Poster at: Human Factors in Information Security. February, 2010.
Details about Improving Secure Systems Design with Security Culture | BibTeX data for Improving Secure Systems Design with Security Culture | Download (pdf) of Improving Secure Systems Design with Security Culture
-
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Shamal Faily and Ivan Flechais
In Proceedings of the 24th British HCI Group Annual Conference on People and Computers: Play is a Serious Business. Pages 113–120. British Computer Society. 2010.
Details about Barry is not the weakest link: Eliciting Secure System Requirements with Personas | BibTeX data for Barry is not the weakest link: Eliciting Secure System Requirements with Personas | Download (pdf) of Barry is not the weakest link: Eliciting Secure System Requirements with Personas
-
Analysing and Visualising Security and Usability in IRIS
Shamal Faily and Ivan Flechais
In Availability‚ Reliability and Security‚ 2010. ARES 10. Fifth International Conference on. February, 2010.
Details about Analysing and Visualising Security and Usability in IRIS | BibTeX data for Analysing and Visualising Security and Usability in IRIS | Download (pdf) of Analysing and Visualising Security and Usability in IRIS | DOI (10.1109/ARES.2010.28)
-
A Model of Security Culture for e−Science
Shamal Faily and Ivan Flechais
In Nathan Clarke‚ Steven Furnell and Rossouw von Solms, editors, Proceedings of the South African Information Security Multi−Conference (SAISMC 2010). Pages 154–164. University of Plymouth. 2010.
Details about A Model of Security Culture for e−Science | BibTeX data for A Model of Security Culture for e−Science | Download (pdf) of A Model of Security Culture for e−Science
-
Context−Sensitive Requirements and Risk Management with IRIS
Shamal Faily and Ivan Flechais
In International Requirements Engineering‚ 2009. RE'09. 17th IEEE. IEEE. August, 2009.
Details about Context−Sensitive Requirements and Risk Management with IRIS | BibTeX data for Context−Sensitive Requirements and Risk Management with IRIS | Download (pdf) of Context−Sensitive Requirements and Risk Management with IRIS | DOI (10.1109/RE.2009.54)
-
Making the invisible visible: a theory of security culture for secure and usable grids
Shamal Faily and Ivan Flechais
In UK e−Science All Hands Conference 2008‚ Edinburgh‚ UK (Oral Presentation). 2008.
Details about Making the invisible visible: a theory of security culture for secure and usable grids | BibTeX data for Making the invisible visible: a theory of security culture for secure and usable grids | Download (pdf) of Making the invisible visible: a theory of security culture for secure and usable grids