• United Kingdom

Accepting PhD Students

Willing to speak to media

20142019
If you made any changes in Pure these will be visible here soon.

Research Output 2014 2019

  • 9 Conference contribution book
  • 1 Paper
2019

Ghost trace on the wire? Using key evidence for informed decisions

Vasile, D. A., Kleppmann, M., Thomas, D. R. & Beresford, A. R., 24 Jun 2019, 27th International Workshop on Security Protocols. Cambridge, 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
Smartphones
Wire
Application programs
Cryptography
Communication
2018

CrimeBB: enabling cybercrime research on underground forums at scale

Pastrana, S., Thomas, D. R., Hutchings, A. & Clayton, R., 27 Apr 2018, Proceedings of the 2018 World Wide Web Conference - WWW '18. p. 1845-1854 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
Crime
2017
6 Citations (Scopus)

1000 days of UDP amplification DDoS attacks

Thomas, D. R., Clayton, R. & Beresford, A. R., 12 Jun 2017, APWG Symposium on Electronic Crime Research (eCrime). Piscataway, NJ: IEEE, 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
Amplification
Life cycle
Servers
Scanning
Network protocols
2 Citations (Scopus)

Ethical issues in research using datasets of illicit origin

Thomas, D. R., Pastrana, S., Hutchings, A., Clayton, R. & Beresford, A. R., 1 Nov 2017, IMC '17 Proceedings of the Internet Measurement Conference. New York, NY: Association for Computing Machinery (ACM), p. 445-462 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
ethics
vulnerability
advice
analysis
approval
2016

Incentivising software updates

Thomas, D. & Beresford, A., 13 Jun 2016.

Research output: Contribution to conferencePaper

Open Access
Monitoring
Costs
Industry
Internet of things
2015
32 Citations (Scopus)

Security metrics for the Android ecosystem

Thomas, D. R., Beresford, A. R. & Rice, A., 12 Oct 2015, ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM). Association for Computing Machinery (ACM), p. 87-98 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
Ecosystems
Complex networks
3 Citations (Scopus)

The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface (transcript of discussion)

Thomas, D. R., 25 Nov 2015, Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Cham, Switzerland: Springer, p. 139-144 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Application programming interfaces (API)
Interfaces (computer)
Servers
Network protocols
7 Citations (Scopus)

The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface

Thomas, D. R., Beresford, A. R., Coudray, T., Sutcliffe, T. & Taylor, A., 1 Apr 2015, Cambridge International Workshop on Security Protocols: Security Protocols 2015: Security Protocols XXIII. Springer, p. 126-138 12 p. (LNCS; vol. 9379).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Open Access
File
Application programming interfaces (API)
Interfaces (computer)
Application programs
Defects
2014
1 Citation (Scopus)

Better authentication: Password revolution by evolution

Thomas, D. R. & Beresford, A. R., 29 Oct 2014, Security Protocols XXII. Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F. & Anderson, J. (eds.). Cham: Springer, p. 130-145 15 p. (LNCS; vol. 8809).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Authentication
Servers
Public key cryptography
Network protocols

Better authentication password revolution by evolution (transcript of discussion)

Thomas, D. R., 29 Oct 2014, Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers. Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F. & Anderson, J. (eds.). Cham, Switzerland: Springer, p. 146-153 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Authentication