Follow
Steven J. Murdoch
Steven J. Murdoch
Department of Computer Science, University College London
Verified email at ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Low-cost traffic analysis of Tor
SJ Murdoch, G Danezis
Security and Privacy, 2005 IEEE Symposium on, 183-195, 2005
8522005
Embedding covert channels into TCP/IP
S Murdoch, S Lewis
Information Hiding, 247-261, 2005
4702005
Hot or not: Revealing hidden services by their clock skew
SJ Murdoch
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3582006
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
International Workshop on Privacy Enhancing Technologies, 20-35, 2006
3552006
Keep your enemies close: distance bounding against smartcard relay attacks
S Drimer, SJ Murdoch
USENIX Security Symposium, 87-102, 2007
3472007
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
2015 IEEE Symposium on Security and Privacy, 20-37, 2015
3332015
Chip and PIN is Broken
SJ Murdoch, S Drimer, R Anderson, M Bond
2010 IEEE Symposium on Security and Privacy, 433-446, 2010
2972010
Sampled traffic analysis by internet-exchange-level adversaries
SJ Murdoch, P Zieliński
International workshop on privacy enhancing technologies, 167-183, 2007
2752007
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson
2014 IEEE Symposium on Security and Privacy, 49-64, 2014
1692014
A case study on measuring statistical data in the tor anonymity network
K Loesing, S Murdoch, R Dingledine
Financial Cryptography and Data Security, 203-215, 2010
1372010
Performance Improvements on Tor or, Why Tor is slow and what we’re going to do about it
R Dingledine, SJ Murdoch
Online: http://www. torproject. org/press/presskit/2009-03-11-performance …, 2009
1322009
An Improved Clock-skew Measurement Technique for Revealing Hidden Services.
S Zander, SJ Murdoch
USENIX Security Symposium, 211-226, 2008
1302008
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2015
129*2015
Optimised to fail: Card readers for online banking
S Drimer, S Murdoch, R Anderson
Financial Cryptography and Data Security, 184-200, 2009
1172009
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication: (Short Paper)
SJ Murdoch, R Anderson
International Conference on Financial Cryptography and Data Security, 336-342, 2010
1162010
Tools and technology of Internet filtering
SJ Murdoch, R Anderson
1092008
Adblocking and counter blocking: A slice of the arms race
R Nithyanand, S Khattak, M Javed, N Vallina-Rodriguez, M Falahrastegar, ...
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16), 2016
1072016
Metrics for security and performance in low-latency anonymity systems
SJ Murdoch, RNM Watson
International Symposium on Privacy Enhancing Technologies Symposium, 115-132, 2008
1032008
Do You See What I See? Differential Treatment of Anonymous Users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ...
972016
Thinking inside the box: system-level failures of tamper proofing
S Drimer, SJ Murdoch, R Anderson
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 281-295, 2008
882008
The system can't perform the operation now. Try again later.
Articles 1–20