Low-cost traffic analysis of Tor SJ Murdoch, G Danezis Security and Privacy, 2005 IEEE Symposium on, 183-195, 2005 | 857 | 2005 |
Embedding covert channels into TCP/IP S Murdoch, S Lewis Information Hiding, 247-261, 2005 | 477 | 2005 |
Ignoring the great firewall of china R Clayton, SJ Murdoch, RNM Watson International Workshop on Privacy Enhancing Technologies, 20-35, 2006 | 361 | 2006 |
Hot or not: Revealing hidden services by their clock skew SJ Murdoch Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 360 | 2006 |
CHERI: A hybrid capability-system architecture for scalable software compartmentalization RNM Watson, J Woodruff, PG Neumann, SW Moore, J Anderson, ... 2015 IEEE Symposium on Security and Privacy, 20-37, 2015 | 351 | 2015 |
Keep your enemies close: distance bounding against smartcard relay attacks S Drimer, SJ Murdoch USENIX Security Symposium, 87-102, 2007 | 348 | 2007 |
Chip and PIN is Broken SJ Murdoch, S Drimer, R Anderson, M Bond 2010 IEEE Symposium on Security and Privacy, 433-446, 2010 | 299 | 2010 |
Sampled traffic analysis by internet-exchange-level adversaries SJ Murdoch, P Zieliński International workshop on privacy enhancing technologies, 167-183, 2007 | 279 | 2007 |
Chip and Skim: cloning EMV cards with the pre-play attack M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson 2014 IEEE Symposium on Security and Privacy, 49-64, 2014 | 170 | 2014 |
A case study on measuring statistical data in the tor anonymity network K Loesing, S Murdoch, R Dingledine Financial Cryptography and Data Security, 203-215, 2010 | 138 | 2010 |
Capability hardware enhanced RISC instructions: CHERI instruction-set architecture RNM Watson, PG Neumann, J Woodruff, M Roe, J Anderson, D Chisnall, ... University of Cambridge, Computer Laboratory, 2015 | 136* | 2015 |
Performance Improvements on Tor or, Why Tor is slow and what we’re going to do about it R Dingledine, SJ Murdoch Online: http://www. torproject. org/press/presskit/2009-03-11-performance …, 2009 | 134 | 2009 |
An Improved Clock-skew Measurement Technique for Revealing Hidden Services. S Zander, SJ Murdoch USENIX Security Symposium, 211-226, 2008 | 131 | 2008 |
Optimised to fail: Card readers for online banking S Drimer, S Murdoch, R Anderson Financial Cryptography and Data Security, 184-200, 2009 | 119 | 2009 |
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication: (Short Paper) SJ Murdoch, R Anderson International Conference on Financial Cryptography and Data Security, 336-342, 2010 | 116 | 2010 |
Tools and technology of Internet filtering SJ Murdoch, R Anderson | 110 | 2008 |
Adblocking and counter blocking: A slice of the arms race R Nithyanand, S Khattak, M Javed, N Vallina-Rodriguez, M Falahrastegar, ... 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16), 2016 | 108 | 2016 |
Metrics for security and performance in low-latency anonymity systems SJ Murdoch, RNM Watson International Symposium on Privacy Enhancing Technologies Symposium, 115-132, 2008 | 103 | 2008 |
Do You See What I See? Differential Treatment of Anonymous Users S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ... | 99 | 2016 |
New Tor distribution for testing: Tor Browser Bundle SJ Murdoch Jan, 2008 | 92 | 2008 |