Some of my peer reviewed papers in reverse chronological order (more will be added soon):
- Probabilistic Point-to-Point Information Leakage, with Yusuke Kawamoto, Chris Novakovic and David Parker. Computer Security Foundations Symposium (CSF 2013).
- A Tool for Estimating Information Leakage, with Yusuke Kawamoto and Chris Novakovic. Computer Added Verification (CAV 2013).
- The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent with Marco Cova, Chris Novakovic, and Camilo Gonzalez Toro (SecureComm 2012).
- A Statistical Test for Information Leaks Using Continuous Mutual Information, with Apratim Guha. Computer Security Foundations Symposium (CSF 2011).
- Statistical Measurement of Information Leakage with Konstantinos Chatzikokolakis and Apratim Guha (TACAS 2010). There is a video of my giving a talk about this work at the 5th CREST workshop here. Slides from a presentation on this work at PLID 09 are here The full proofs for this paper are contained in Calculation of Probabilistic Anonymity from Sampled Data with Konstantinos Chatzikokolakis and Apratim Guha (University of Birmingham Technical Report, 2009, CSR-09-10).
- A Traceability Attack Against e-Passports, Tom Chothia and Vitaliy Smirnov, 14th International Conference on Financial Cryptography and Data Security 2010.
- Analysing Unlinkability and Anonymity Using the Applied Pi Calculus with Myrto Arapinis, Eike Ritter and Mark Ryan. Computer Security Foundations Symposium (CSF 2010).
- A Traceability Attack Against e-Passports, Tom Chothia and Vitaliy Smirnov, 14th International Conference on Financial Cryptography and Data Security 2010.
- Untraceability in the Applied Pi-calculus with Myrto Arapinis, Eike Ritter and Mark Ryan. RISC09
- Securing Pseudo Identities in an Anonymous Peer-to-Peer File-Sharing Network Securecomm 07. This paper improves the design of an anonymous file sharing system.
- A Framework for Automatically Checking Anonymity with mCRL with Simona Orzan, Jun Pang, and Muhammad Torabi Dashti. Trustworthy Global Computing 2006, TGC06
- A Survey of Anonymous Peer-to-Peer File-Sharing with Kostas Chatzikokolakis. 2005 International Conference on Embedded and Ubiquitous Computing EUC'05.
- Analysing the MUTE Anonymous File-Sharing System Using the Pi-calculus , Slides. FORTE 06. Best Paper Award winner. This paper analysed an anonymous peer to peer file sharing system using the pi-calculus and found a flaw in the design.
- Typed-based Access Control vs. Untyped Attackers with Dominic Duggan (FAST 05).
- Type-Based Distributed Access Control with Dominic Duggan and Jan Vitek, Computer Security Foundations Symposium (CSF 04) Slides.