Steven J. Murdoch

Orcid: 0000-0002-8744-1575

Affiliations:
  • University College London, UK


According to our database1, Steven J. Murdoch authored at least 66 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser.
Proc. Priv. Enhancing Technol., January, 2024

Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection.
IACR Cryptol. ePrint Arch., 2024

2023
Delegated Time-Lock Puzzle.
IACR Cryptol. ePrint Arch., 2023

Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation.
IACR Cryptol. ePrint Arch., 2023

Earn While You Reveal: Private Set Intersection that Rewards Participants.
IACR Cryptol. ePrint Arch., 2023

Recurring Contingent Service Payment.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
A Forward-secure Efficient Two-factor Authentication Protocol.
IACR Cryptol. ePrint Arch., 2022

Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims.
IACR Cryptol. ePrint Arch., 2022

Multi-party Updatable Delegated Private Set Intersection.
Proceedings of the Financial Cryptography and Data Security, 2022

2021
Recurring Contingent Payment for Proofs of Retrievability.
IACR Cryptol. ePrint Arch., 2021

Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited.
IACR Cryptol. ePrint Arch., 2021

Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2019
Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime.
CoRR, 2019

Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019

Transparency Enhancing Technologies to Make Security Protocols Work for Humans.
Proceedings of the Security Protocols XXVII, 2019

Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
VAMS: Verifiable Auditing of Access to Confidential Data.
CoRR, 2018

Scanning the Internet for Liveness.
Comput. Commun. Rev., 2018

Incentives in Security Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

Incentives in Security Protocols.
Proceedings of the Security Protocols XXVI, 2018

2017
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
J. Cybersecur., 2017

2016
The Adblocking Tug-of-War.
login Usenix Mag., 2016

SoK: Making Sense of Censorship Resistance Systems.
Proc. Priv. Enhancing Technol., 2016

A Framework for the Game-theoretic Analysis of Censorship Resistance.
Proc. Priv. Enhancing Technol., 2016

Fast Protection-Domain Crossing in the CHERI Capability-System Architecture.
IEEE Micro, 2016

Ad-Blocking and Counter Blocking: A Slice of the Arms Race.
CoRR, 2016

Insecure by Design: Protocols for Encrypted Phone Calls.
Computer, 2016

Adblocking and Counter Blocking: A Slice of the Arms Race.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Are Payment Card Contracts Unfair? (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2015

Be Prepared: The EMV Preplay Attack.
IEEE Secur. Priv., 2015

CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Systemization of Pluggable Transports for Censorship Resistance.
CoRR, 2014

Censorship Resistance: Let a Thousand Flowers Bloom?
CoRR, 2014

EMV: why payment systems fail.
Commun. ACM, 2014

Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Security Protocols and Evidence: Where Many Payment Systems Fail.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Internet Censorship and Control [Guest editors' introduction].
IEEE Internet Comput., 2013

Towards a Theory of Application Compartmentalisation.
Proceedings of the Security Protocols XXI, 2013

Quantifying and Measuring Anonymity.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
How Certification Systems Fail: Lessons from the Ware Report.
IEEE Secur. Priv., 2012

2011
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Chip and PIN is Broken.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

A Case Study on Measuring Statistical Data in the Tor Anonymity Network.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Failures of Tamper-Proofing in PIN Entry Devices.
IEEE Secur. Priv., 2009

Optimised to Fail: Card Readers for Online Banking.
Proceedings of the Financial Cryptography and Data Security, 2009

2008
Covert channel vulnerabilities in anonymity systems.
PhD thesis, 2008

An Improved Clock-skew Measurement Technique for Revealing Hidden Services.
Proceedings of the 17th USENIX Security Symposium, 2008

Hardened Stateless Session Cookies (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Hardened Stateless Session Cookies.
Proceedings of the Security Protocols XVI, 2008

What Next after Anonymity?
Proceedings of the Security Protocols XVI, 2008

Thinking Inside the Box: System-Level Failures of Tamper Proofing.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Metrics for Security and Performance in Low-Latency Anonymity Systems.
Proceedings of the Privacy Enhancing Technologies, 2008

2007
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Securing network location awareness with authenticated DHCP.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Sampled Traffic Analysis by Internet-Exchange-Level Adversaries.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

2006
Phish and Chips.
Proceedings of the Security Protocols, 2006

Ignoring the Great Firewall of China.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Hot or not: revealing hidden services by their clock skew.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Low-Cost Traffic Analysis of Tor.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Message Splitting Against the Partial Adversary.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Embedding Covert Channels into TCP/IP.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2004
Covert Channels for Collusion in Online Computer Games.
Proceedings of the Information Hiding, 6th International Workshop, 2004


  Loading...