Search

Search Results

Showing 1-20 of 51 results
  1. Conference paper

    Generating Traffic-Level Adversarial Examples from Feature-Level Specifications

    Machine learning-based network intrusion detection methods often rely on statistical summaries of traffic, causing a disconnect between the traffic...
    Robert Flood, Marco Casadio, ... Ekaterina Komendantskaya in Computer Security. ESORICS 2024 International Workshops
    2025
  2. Conference paper

    Tactics for Account Access Graphs

    Account access graphs have been proposed as a way to model relationships between user credentials, accounts, and methods of access; they capture both...
    Luca Arnaboldi, David Aspinall, ... Saša Radomirović in Computer Security – ESORICS 2023
    2024
  3. Article
    Full access

    Checking Contact Tracing App Implementations with Bespoke Static Analysis

    In the wake of the COVID-19 pandemic, contact tracing apps have been developed based on digital contact tracing frameworks. These allow developers to...

    Robert Flood, Sheung Chi Chan, ... David Aspinall in SN Computer Science
    28 September 2022 Open access
  4. Conference paper

    Towards Interdependent Safety Security Assessments Using Bowties

    We present a way to combine security and safety assessments using Bowtie Diagrams. Bowties model both the causes leading up to a central failure...
    2022
  5. Conference paper

    Better Anomaly Detection for Access Attacks Using Deep Bidirectional LSTMs

    Recent evaluations show that the current anomaly-based network intrusion detection methods fail to detect remote access attacks reliably [10]. Here,...
    Henry Clausen, Gudmund Grov, ... David Aspinall in Machine Learning for Networking
    2021
  6. Conference paper

    Controlling Network Traffic Microstructures for Machine-Learning Model Probing

    Network intrusion detection (NID) models increasingly rely on learning traffic microstructures that consist of pattern sequences in features such as...
    Henry Clausen, Robert Flood, David Aspinall in Security and Privacy in Communication Networks
    2021
  7. Conference paper

    Neural Networks, Secure by Construction

    We present StarChild and Lazuli, two libraries which leverage refinement types to verify neural networks, implemented in F...
    Wen Kokke, Ekaterina Komendantskaya, ... David Aspinall in Programming Languages and Systems
    2020
  8. Conference paper

    Evading Stepping-Stone Detection with Enough Chaff

    Stepping-stones are used extensively by attackers to hide their identity and access restricted targets. Many methods have been proposed to detect...
    Henry Clausen, Michael S. Gibson, David Aspinall in Network and System Security
    2020
  9. Conference paper
    Full access

    On the Formalisation of \(\varSigma \) -Protocols and Commitment Schemes

    There is a fundamental relationship between \(\varSigma \)...
    David Butler, David Aspinall, Adrià Gascón in Principles of Security and Trust
  10. Conference paper

    Formal Analysis of Sneak-Peek: A Data Centre Attack and Its Mitigations

    Attackers can exploit covert channels, such as timing side-channels, to transmit information without data owners or network administrators being...
    Wei Chen, Yuhui Lin, ... David Aspinall in ICT Systems Security and Privacy Protection
    2018
  11. Conference paper

    Capturing Policies for BYOD

    BYOD policies are informally specified using natural language. We show how the SP4BYOD language can help reduce ambiguity in 5 BYOD policies and link...
    Joseph Hallett, David Aspinall in ICT Systems Security and Privacy Protection
    2017
  12. Conference paper

    How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

    In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while keeping their inputs private....
    David Butler, David Aspinall, Adrià Gascón in Interactive Theorem Proving
    2017
  13. Textbook

    Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers

    This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2...

    David Aspinall, Jan Camenisch, ... Charles Raab in IFIP Advances in Information and Communication Technology
    2016
  14. Conference paper

    What’s in a Theorem Name?

    ITPs use names for proved theorems. Good names are either widely known or descriptive, corresponding to a theorem’s statement. Good names should be...
    David Aspinall, Cezary Kaliszyk in Interactive Theorem Proving
    2016
  15. Conference paper

    AppPAL for Android

    It can be difficult to find mobile apps that respect one’s security and privacy. Businesses rely on employees enforcing company mobile device...
    Joseph Hallett, David Aspinall in Engineering Secure Software and Systems
    2016
  16. Conference paper

    On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Machine-learning-based Android malware classifiers perform badly on the detection of new malware, in particular, when they take API calls and...
    Wei Chen, David Aspinall, ... Igor Muttik in Integrated Formal Methods
    2016
  17. Conference paper

    Towards Formal Proof Metrics

    Recent years have seen increasing success in building large formal proof developments using interactive theorem provers (ITPs). Some proofs have...
    David Aspinall, Cezary Kaliszyk in Fundamental Approaches to Software Engineering
    2016
  18. Conference paper

    EviCheck: Digital Evidence for Android

    We present EviCheck, a tool for the verification, certification and generation of lightweight fine-grained security policies for Android. It applies...
    Mohamed Nassim Seghir, David Aspinall in Automated Technology for Verification and Analysis
    2015
  19. Conference paper

    On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps

    Mobile health (mHealth) apps are an ideal tool for monitoring and tracking long-term health conditions. In this paper, we examine whether mHealth...
    Konstantin Knorr, David Aspinall, Maria Wolters in ICT Systems Security and Privacy Protection
    2015
  20. Conference paper

    Type Inference for ZFH

    ZFH stands for Zermelo-Fraenkel set theory implemented in higher-order logic. It is a descendant of Agerholm’s...
    Steven Obua, Jacques Fleuriot, ... David Aspinall in Intelligent Computer Mathematics
    2015
Did you find what you were looking for? Share feedback.