Home > Research > Security > Publications & Outputs
View graph of relations
  1. 2020
  2. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    λBGP: Rethinking BGP programmability

    Hart, N., Rotsos, C., Giotsas, V., Race, N. & Hutchison, D., 30/04/2020, 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. 2019
  8. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Proceedings of the 4th European Workshop on Usable Security

    Ur, B. (Editor) & Weir, C. (Editor), 1/09/2019, IEEE.

    Research output: Book/Report/ProceedingsProceedings

  10. Published

    Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search

    Zhang, J., Zhang, B. & Lin, J., 19/08/2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 211-219 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Identifying infected energy systems in the wild

    Marnerides, A., Giotsas, V. & Mursch, T., 25/06/2019, e-Energy 2019 - Proceedings of the 10th ACM International Conference on Future Energy Systems. New York: ACM, p. 263-267 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Distributed, end-to-end verifiable, and privacy-preserving internet voting systems

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M., 1/06/2019, In: Computers and Security. 83, p. 268-299 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In: International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Proofs of Writing for Robust Storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolic, M., 27/05/2019, In: IEEE Transactions on Parallel and Distributed Systems. 30, 11, p. 2547-2566 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE, p. 41-50 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Communication standards for distributed renewable energy sources integration in future electricity distribution networks

    Jindal, A., Marnerides, A., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 12/05/2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, p. 8390-8393 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things

    Antrobus, R., Green, B., Frey, S. A. F. & Rashid, A., 1/05/2019, Living in the Internet of Things 2019. IET, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Stable and Practical AS Relationship Inference with ProbLink

    Jin, Y., Scott, C., Dhamdhere, A., Giotsas, V., Krishnamurthy, A. & Shenker, S., 26/02/2019, 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI'19). USENIX Association, p. 581-597 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 25/02/2019. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  25. Published

    Statement Voting

    Zhang, B. & Zhou, H.-S., 18/02/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  26. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (Editor) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Previous 1 2 3 4 5 6 7 8 ...10 Next

Back to top