Steven J. Murdoch
Steven J. Murdoch
Department of Computer Science, University College London
Verified email at - Homepage
Cited by
Cited by
Low-cost traffic analysis of Tor
SJ Murdoch, G Danezis
Security and Privacy, 2005 IEEE Symposium on, 183-195, 2005
Embedding covert channels into TCP/IP
S Murdoch, S Lewis
Information Hiding, 247-261, 2005
Hot or not: Revealing hidden services by their clock skew
SJ Murdoch
Proceedings of the 13th ACM conference on Computer and communications …, 2006
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006
Keep your enemies close: distance bounding against smartcard relay attacks
S Drimer, SJ Murdoch
USENIX Security Symposium, 87-102, 2007
Chip and PIN is Broken
SJ Murdoch, S Drimer, R Anderson, M Bond
2010 IEEE Symposium on Security and Privacy, 433-446, 2010
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ...
2015 IEEE Symposium on Security and Privacy, 20-37, 2015
Sampled traffic analysis by internet-exchange-level adversaries
SJ Murdoch, P Zieliński
Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa …, 2007
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson
2014 IEEE Symposium on Security and Privacy, 49-64, 2014
A case study on measuring statistical data in the tor anonymity network
K Loesing, S Murdoch, R Dingledine
Financial Cryptography and Data Security, 203-215, 2010
Performance Improvements on Tor or, Why Tor is slow and what we’re going to do about it
R Dingledine, SJ Murdoch
Online: http://www. torproject. org/press/presskit/2009-03-11-performance …, 2009
An Improved Clock-skew Measurement Technique for Revealing Hidden Services.
S Zander, SJ Murdoch
USENIX Security Symposium, 211-226, 2008
Optimised to fail: Card readers for online banking
S Drimer, S Murdoch, R Anderson
Financial Cryptography and Data Security, 184-200, 2009
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication: (Short Paper)
SJ Murdoch, R Anderson
Financial Cryptography and Data Security: 14th International Conference, FC …, 2010
Adblocking and counter blocking: A slice of the arms race
R Nithyanand, S Khattak, M Javed, N Vallina-Rodriguez, M Falahrastegar, ...
CoRR 16, 2016
Tools and technology of Internet filtering
SJ Murdoch, R Anderson
Access denied: The practice and policy of global internet filtering 1 (1), 58, 2008
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture
RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ...
University of Cambridge, Computer Laboratory, 2015
Metrics for security and performance in low-latency anonymity systems
SJ Murdoch, RNM Watson
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
Do You See What I See? Differential Treatment of Anonymous Users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ...
Thinking inside the box: system-level failures of tamper proofing
S Drimer, SJ Murdoch, R Anderson
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 281-295, 2008
The system can't perform the operation now. Try again later.
Articles 1–20