default search action
Tom Chothia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c62]Abdulla Aldoseri, Tom Chothia, José Moreira, David F. Oswald:
Symbolic modelling of remote attestation protocols for device and app integrity on Android. AsiaCCS 2023: 218-231 - 2022
- [c61]Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia:
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning. CCS 2022: 2265-2278 - [c60]Andreea-Ina Radu, Tom Chothia, Christopher J. P. Newton, Ioana Boureanu, Liqun Chen:
Practical EMV Relay Protection. SP 2022: 1737-1756 - 2021
- [i3]Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia:
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning. CoRR abs/2106.02623 (2021) - 2020
- [c59]Richard James Thomas, Joseph Gardiner, Tom Chothia, Emmanouil Samanis, Joshua Perrett, Awais Rashid:
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures. CPSIOTSEC@CCS 2020: 49-60 - [c58]Ioana Boureanu, Tom Chothia, Alexandre Debant, Stéphanie Delaune:
Security Analysis and Implementation of Relay-Resistant Contactless Payments. CCS 2020: 879-898 - [c57]Richard James Thomas, Tom Chothia:
Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 100-116 - [c56]Rajiv Ranjan Singh, José Moreira, Tom Chothia, Mark Dermot Ryan:
Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties. STM 2020: 3-21
2010 – 2019
- 2019
- [j6]Tom Chothia, Chris Novakovic, Andreea-Ina Radu, Richard James Thomas:
Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course. Trans. Edutainment 15: 141-172 (2019) - [c55]Qian Ge, Yuval Yarom, Tom Chothia, Gernot Heiser:
Time Protection: The Missing OS Abstraction. EuroSys 2019: 1:1-1:17 - [c54]Tom Chothia, Ioana Boureanu, Liqun Chen:
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers. Financial Cryptography 2019: 222-233 - 2018
- [c53]Sebastian Vasile, David F. Oswald, Tom Chothia:
Breaking All the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices. CARDIS 2018: 171-185 - [c52]Chris McMahon Stone, Tom Chothia, Joeri de Ruiter:
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake. ESORICS (1) 2018: 325-345 - [c51]Tom Chothia, Stefan-Ioan Paiu, Michael Oultram:
Phishing Attacks: Learning by Doing. ASE @ USENIX Security Symposium 2018 - [c50]Tom Chothia, Joeri de Ruiter, Ben Smyth:
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. USENIX Security Symposium 2018: 1563-1580 - [i2]Qian Ge, Yuval Yarom, Tom Chothia, Gernot Heiser:
Time Protection: the Missing OS Abstraction. CoRR abs/1810.05345 (2018) - 2017
- [j5]Mohammad Mahdi Jaghoori, Frank S. de Boer, Delphine Longuet, Tom Chothia, Marjan Sirjani:
Compositional schedulability analysis of real-time actor-based systems. Acta Informatica 54(4): 343-378 (2017) - [c49]Chris McMahon Stone, Tom Chothia, Flavio D. Garcia:
Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. ACSAC 2017: 176-188 - [c48]Richard James Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter:
TRAKS: A Universal Key Management Scheme for ERTMS. ACSAC 2017: 327-338 - [c47]Tom Chothia, Mihai Ordean, Joeri de Ruiter, Richard James Thomas:
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols. AsiaCCS 2017: 743-756 - [c46]Ivan Gazeau, Tom Chothia, Dominic Duggan:
Types for Location and Data Security in Cloud Environments. CSF 2017: 376-391 - [c45]Sam L. Thomas, Flavio D. Garcia, Tom Chothia:
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware. DIMVA 2017: 279-300 - [c44]Sam L. Thomas, Tom Chothia, Flavio D. Garcia:
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality. ESORICS (2) 2017: 513-531 - [c43]Tom Chothia, Flavio D. Garcia, Chris Heppel, Chris McMahon Stone:
Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps. Financial Cryptography 2017: 579-597 - [c42]Nada Alruhaily, Tom Chothia, Behzad Bordbar:
A Better Understanding of Machine Learning Malware Misclassifcation. ICISSP (Revised Selected Papers) 2017: 35-58 - [c41]Nada Alruhaily, Behzad Bordbar, Tom Chothia:
Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems. ICISSP 2017: 101-112 - [c40]Nada Alruhaily, Carlos Joseph Mera-Gómez, Tom Chothia, Rami Bahsoon:
A Market-Based Approach for Detecting Malware in the Cloud via Introspection. ICSOC 2017: 722-730 - [c39]Tom Chothia, Sam Holdcroft, Andreea-Ina Radu, Richard James Thomas:
Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story. ASE @ USENIX Security Symposium 2017 - [i1]Ivan Gazeau, Tom Chothia, Dominic Duggan:
Types for Location and Data Security in Cloud Environments. CoRR abs/1706.01742 (2017) - 2016
- [c38]Giannis Tziakouris, Rami Bahsoon, Tom Chothia, Rajkumar Buyya:
Thwarting Market Specific Attacks in Cloud. CLOUD 2016: 35-42 - [c37]Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel:
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. ACSAC 2016: 226-236 - [c36]Giannis Tziakouris, Marios Zinonos, Tom Chothia, Rami Bahsoon:
Asset-centric Security-Aware Service Selection. BigData Congress 2016: 327-332 - [c35]Joeri de Ruiter, Richard James Thomas, Tom Chothia:
A Formal Security Analysis of ERTMS Train to Trackside Protocols. RSSRail 2016: 53-68 - [c34]Tom Chothia, Joeri de Ruiter:
Learning From Others' Mistakes: Penetration Testing IoT Devices in the Classroom. ASE @ USENIX Security Symposium 2016 - 2015
- [j4]Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh:
Calculating Quantitative Integrity and Secrecy for Imperative Programs. Int. J. Secur. Softw. Eng. 6(2): 23-46 (2015) - [c33]Tom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel, Matthew Thompson:
Relay Cost Bounding for Contactless EMV Payments. Financial Cryptography 2015: 189-206 - [c32]Tom Chothia, Ben Smyth, Christopher Staite:
Automatically Checking Commitment Protocols in ProVerif without False Attacks. POST 2015: 137-155 - [c31]Nada Alruhaily, Behzad Bordbar, Tom Chothia:
Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection. TrustCom/BigDataSE/ISPA (1) 2015: 766-773 - 2014
- [c30]Tom Chothia, Yusuke Kawamoto, Chris Novakovic:
LeakWatch: Estimating Information Leakage from Java Programs. ESORICS (2) 2014: 219-236 - [c29]Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh:
Automatically Calculating Quantitative Integrity Measures for Imperative Programs. DPM/SETOP/QASA 2014: 250-265 - 2013
- [c28]Tom Chothia, Yusuke Kawamoto, Chris Novakovic:
A Tool for Estimating Information Leakage. CAV 2013: 690-695 - [c27]Tom Chothia, Yusuke Kawamoto, Chris Novakovic, David Parker:
Probabilistic Point-to-Point Information Leakage. CSF 2013: 193-205 - 2012
- [c26]Jay Young, Fran Smith, Christopher Atkinson, Ken Poyner, Tom Chothia:
SCAIL: An integrated Starcraft AI system. CIG 2012: 438-445 - [c25]Tom Chothia, Marco Cova, Chris Novakovic, Camilo González Toro:
The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent. SecureComm 2012: 185-202 - 2011
- [c24]Tom Chothia, Apratim Guha:
A Statistical Test for Information Leaks Using Continuous Mutual Information. CSF 2011: 177-190 - 2010
- [c23]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan:
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. CSF 2010: 107-121 - [c22]Tom Chothia, Vitaliy Smirnov:
A Traceability Attack against e-Passports. Financial Cryptography 2010: 20-34 - [c21]Konstantinos Chatzikokolakis, Tom Chothia, Apratim Guha:
Statistical Measurement of Information Leakage. TACAS 2010: 390-404 - [c20]Mohammad Mahdi Jaghoori, Tom Chothia:
Timed Automata Semantics for Analyzing Creol. FOCLASA 2010: 108-122
2000 – 2009
- 2009
- [j3]Mohammad Mahdi Jaghoori, Frank S. de Boer, Tom Chothia, Marjan Sirjani:
Schedulability of asynchronous real-time concurrent objects. J. Log. Algebraic Methods Program. 78(5): 402-416 (2009) - [c19]Farhad Arbab, Tom Chothia, Rob van der Mei, Sun Meng, Young-Joo Moon, Chrétien Verhoef:
From Coordination to Stochastic Models of QoS. COORDINATION 2009: 268-287 - [c18]Frank S. de Boer, Tom Chothia, Mohammad Mahdi Jaghoori:
Modular Schedulability Analysis of Concurrent Objects in Creol. FSEN 2009: 212-227 - [c17]Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan:
Untraceability in the applied pi-calculus. ICITST 2009: 1-6 - [c16]Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan:
A Trusted Infrastructure for P2P-based Marketplaces. Peer-to-Peer Computing 2009: 151-154 - 2008
- [c15]Mohammad Mahdi Jaghoori, Delphine Longuet, Frank S. de Boer, Tom Chothia:
Schedulability and Compatibility of Real Time Asynchronous Objects. RTSS 2008: 70-79 - 2007
- [j2]Tom Chothia, Dominic Duggan:
Capability passing processes. Sci. Comput. Program. 66(3): 184-204 (2007) - [c14]Farhad Arbab, Tom Chothia, Sun Meng, Young-Joo Moon:
Component Connectors with QoS Guarantees. COORDINATION 2007: 286-304 - [c13]Tom Chothia:
Securing pseudo identities in an anonymous peer-to-peer file-sharing network. SecureComm 2007: 279-282 - [c12]Tom Chothia, Jun Pang, Muhammad Torabi Dashti:
Keeping Secrets in Resource Aware Components. QAPL 2007: 79-94 - 2006
- [c11]Tom Chothia:
Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus. FORTE 2006: 115-130 - [c10]Tom Chothia, Simona Orzan, Jun Pang, Muhammad Torabi Dashti:
A Framework for Automatically Checking Anonymity with mu CRL. TGC 2006: 301-318 - [c9]Tom Chothia, Dominic Duggan, Ye Wu:
An End-To-End Approach to Distributed Policy Language Implementation: (Extended Abstract). SecReT@ICALP 2006: 3-21 - [c8]Tom Chothia, Jetty Kleijn:
Q-Automata: Modelling the Resource Usage of Concurrent Components. FOCLASA 2006: 153-167 - 2005
- [c7]Tom Chothia, Konstantinos Chatzikokolakis:
A Survey of Anonymous Peer-to-Peer File-Sharing. EUC Workshops 2005: 744-755 - [c6]Tom Chothia, Dominic Duggan:
Type-Based Distributed Access Control vs. Untyped Attackers. Formal Aspects in Security and Trust 2005: 203-216 - [c5]Tom Chothia, Dominic Duggan:
Capability-Passing Processes. FOCLASA 2005: 3-23 - [c4]Yuxin Deng, Tom Chothia, Catuscia Palamidessi, Jun Pang:
Metrics for Action-labelled Quantitative Transition Systems. QAPL 2005: 79-96 - 2004
- [j1]Tom Chothia, Dominic Duggan:
Abstractions for fault-tolerant global computing. Theor. Comput. Sci. 322(3): 567-613 (2004) - 2003
- [c3]Tom Chothia, Dominic Duggan, Jan Vitek:
Type-Based Distributed Access Control. CSFW 2003: 170- - 2001
- [c2]Tom Chothia, Ian Stark:
Encoding Distributed Areas and Local Communication into the pi-Calculus. EXPRESS 2001: 101-119 - 2000
- [c1]Tom Chothia, Ian Stark:
A Distributed Pi-Calculus with Local Areas of Communication. HLCL 2000: 1-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint