Tom Chothia
Orcid: 0000-0002-9381-1368
According to our database1,
Tom Chothia
authored at least 68 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2024
2023
Symbolic modelling of remote attestation protocols for device and app integrity on Android.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2020
Proceedings of the Security and Trust Management - 16th International Workshop, 2020
Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course.
Trans. Edutainment, 2019
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018
Proceedings of the Computer Security, 2018
Breaking All the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2018
2017
Acta Informatica, 2017
Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017
Proceedings of the Information Systems Security and Privacy, 2017
Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps.
Proceedings of the Financial Cryptography and Data Security, 2017
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality.
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2016
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Int. J. Secur. Softw. Eng., 2015
Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the Computer Aided Verification - 25th International Conference, 2013
2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the 2012 IEEE Conference on Computational Intelligence and Games, 2012
2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
2010
Proceedings of the Proceedings Ninth International Workshop on the Foundations of Coordination Languages and Software Architectures, 2010
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2009
J. Log. Algebraic Methods Program., 2009
Proceedings of the Proceedings P2P 2009, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Fundamentals of Software Engineering, 2009
Proceedings of the Coordination Models and Languages, 11th International Conference, 2009
2008
Proceedings of the 29th IEEE Real-Time Systems Symposium, 2008
2007
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Coordination Models and Languages, 9th International Conference, 2007
2006
Proceedings of the Fifth International Workshop on the Foundations of Coordination Languages and Software Architectures, 2006
An End-To-End Approach to Distributed Policy Language Implementation: (Extended Abstract).
Proceedings of the First International Workshop on Security and Rewriting Techniques, 2006
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2006
2005
Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages, 2005
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
2004
2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
2001
Proceedings of the 8th International Workshop on Expressiveness in Concurrency, 2001
2000
Proceedings of the 4th International Workshop on High-Level Concurrent Languages, 2000