Accepting PhD Students

PhD projects

Please see the Informatics Security and Privacy group page for projects including some of mine: <a href="http://web.inf.ed.ac.uk/security-privacy/phd-study/phd-topics">S and P PhD topics</a>

Please contact me directly for topics in other areas.

Search results

  • 2024

    Measuring the complexity of benchmark NIDS datasets via spectral analysis

    Flood, R. & Aspinall, D., 20 Aug 2024, 2024 IEEE European Symposium on Security and Privacy Workshops. Institute of Electrical and Electronics Engineers, p. 335-341 7 p. (IEEE European Symposium on Security and Privacy Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Measuring cyber essentials security policies

    Bartha, S., Ballantine, R. & Aspinall, D., 13 Aug 2024, Proceedings of the 17th Cyber Security Experimentation and Test Workshop. ACM, p. 17-26 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Tactics for account access graphs

    Arnaboldi, L., Aspinall, D., Kolb, C. & Radomirović, S., 12 Jan 2024, Computer Security – ESORICS 2023. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (eds.). Springer, Vol. 14346. p. 452-470 19 p. (Lecture Notes in Computer Science; vol. 14346).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2022

    Checking Contact Tracing App Implementations with Bespoke Static Analysis

    Flood, R., Chan, S. C., Chen, W. & Aspinall, D., 1 Nov 2022, In: SN Computer Science. 3, 6, p. 1-15 496.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Towards Interdependent Safety Security Assessments Using Bowties

    Arnaboldi, L. & Aspinall, D., 9 Jun 2022, Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops - DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE, Proceedings. Trapp, M., Schoitsch, E., Guiochet, J. & Bitsch, F. (eds.). Springer, p. 211-229 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13415 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Traffic Generation using Containerization for Machine Learning

    Clausen, H., Flood, R. & Aspinall, D., 25 Feb 2022, DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security Workshop Proceedings. ACM Association for Computing Machinery, 12 p. 3

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection

    Schneider, M., Aspinall, D. & Bastian, N. D., 13 Jan 2022, 2021 IEEE International Conference on Big Data (Big Data). Chen, Y., Ludwig, H., Tu, Y., Fayyad, U., Zhu, X., Hu, X., Byna, S., Liu, X., Zhang, J., Pan, S., Papalexakis, V., Wang, J., Cuzzocrea, A. & Ordonez, C. (eds.). Institute of Electrical and Electronics Engineers, p. 3343-3352 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Controlling Network Traffic Microstructures for Machine-Learning Model Probing

    Clausen, H., Flood, R. & Aspinall, D., 3 Nov 2021, Security and Privacy in Communication Networks. Springer, p. 456-475 20 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 398).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Examining traffic microstructures to improve model development

    Clausen, H. & Aspinall, D., 8 Jul 2021, 2021 IEEE Security and Privacy Workshops (SPW). Institute of Electrical and Electronics Engineers, p. 19-24 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • CBAM: A Contextual Model for Network Anomaly Detection

    Clausen, H., Grov, G. & Aspinall, D., 11 Jun 2021, In: Computers. 10, 6, 28 p., 79.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Formalising Σ -Protocols and Commitment Schemes Using CryptHOL

    Butler, D., Lochbihler, A., Aspinall, D. & Gascón, A., 1 Apr 2021, In: Journal of Automated Reasoning. 65, p. 521-567 47 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Better Anomaly Detection for Access Attacks Using Deep Bidirectional LSTMs

    Clausen, H., Grov, G., Sabate, M. & Aspinall, D., 3 Mar 2021, Machine Learning for Networking. Renault, É., Boumerdassi, S. & Mühlethaler, P. (eds.). Cham: Springer, p. 1-18 18 p. (Lecture Notes in Computer Science ; vol. 12629).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Checking Contact Tracing App Implementations

    Flood, R., Chan, S. C., Chen, W. & Aspinall, D., 11 Feb 2021, Proceedings of the 7th International Conference on Information Systems Security and Privacy - ICISSP. SCITEPRESS, p. 133-144 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2020

    Evading Stepping-Stone Detection with Enough Chaff

    Clausen, H., Gibson, M. S. & Aspinall, D., 19 Dec 2020, Network and System Security. Kutyłowski, M., Zhang, J. & Chen, C. (eds.). Cham: Springer, p. 431-446 16 p. (Lecture Notes in Computer Science ; vol. 12570).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Neural Networks, Secure by Construction: An Exploration of Refinement Types

    Kokke, W., Komendantskaya, E., Kienitz, D., Atkey, R. & Aspinall, D., 24 Nov 2020, Programming Languages and Systems - 18th Asian Symposium, APLAS 2020, Proceedings. Oliveira, B. C. (ed.). Springer, p. 67-85 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12470 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Formalising oblivious transfer in the semi-honest and malicious model in CryptHOL

    Butler, D., Aspinall, D. & Gascon, A., 20 Jan 2020, CPP 2020 - Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2020. Blanchette, J. & Hritcu, C. (eds.). Association for Computing Machinery, Inc, p. 229-243 15 p. (CPP 2020 - Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2019

    Retrofitting Security and Privacy Measures to Smart Home Devices

    Ye, C., Indra, P. P. & Aspinall, D., 23 Dec 2019, 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). Institute of Electrical and Electronics Engineers, p. 283-290 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Towards Intelligible Robust Anomaly Detection by Learning Interpretable Behavioural Models

    Grov, G., Chen, W., Sabate, M. & Aspinall, D., 20 Nov 2019, Vol. 12 (2019): NISK 2019; Proceedings of the 12th Norwegian Information Security Conference. Akademika, 16 p. (NISK; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Multi-Party Computation

    Aspinall, D. & Butler, D., 9 May 2019, Archive of Formal Proofs 64 p.

    Research output: Contribution to specialist publicationArticle

    Open Access
  • On the Formalisation of Σ-Protocols and Commitment Schemes

    Butler, D., Aspinall, D. & Gascón, A., 3 Apr 2019, Principles of Security and Trust. POST 2019.. Nielson, F. & Sands, D. (eds.). Springer, p. 175-196 22 p. (Lecture Notes in Computer Science; vol. 11426).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2018

    Foreword

    Hofmann, M., Aspinall, D., Campbell, B., Stark, I. & Stevens, P., 12 Sept 2018, In: Theoretical Computer Science. 741, p. 1-2 2 p.

    Research output: Contribution to journalEditorialpeer-review

  • An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities

    Alharbi, R. & Aspinall, D., 14 Jun 2018, (E-pub ahead of print) Living in the Internet of Things: Cybersecurity of the IoT - 2018. London, UK: IET, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Secure information sharing in social agent interactions using information flow analysis

    Bijani, S., Robertson, D. & Aspinall, D., 3 Feb 2018, (E-pub ahead of print) In: Engineering Applications of Artificial Intelligence. 70, p. 52-66 15 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • Formal Analysis of Sneak-Peek: A Data-Centre Attack and its Mitigations

    Chen, W., Lin, Y., Galpin, V., Nigam, V., Lee, M. & Aspinall, D., 2018, 33rd International Conference on Information Security and Privacy Protection (IFIP SEC 2018). Poznan, Poland: Springer, p. 307-322 16 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2017

    How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

    Butler, D., Aspinall, D. & Gascón, A., 21 Aug 2017, Interactive Theorem Proving: ITP 2017. 978-3-319-66106-3: Springer, p. 114-130 17 p. (Lecture Notes in Computer Science; vol. 10499).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Capturing Policies for BYOD

    Hallett, J. & Aspinall, D., 4 May 2017, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Cham: Springer, p. 310-323 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Certified Lightweight Contextual Policies for Android

    Seghir, M. N., Aspinall, D. & Marekova, L., 6 Feb 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Boston, MA, USA: Institute of Electrical and Electronics Engineers, p. 94-100 7 p. 7839801

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2016

    POSTER: Weighing in eHealth Security

    Krämer, M., Aspinall, D. & Wolters, M., 24 Oct 2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1832-1834 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • What’s in a Theorem Name?

    Aspinall, D. & Kaliszyk, C., 7 Aug 2016, Proceedings of ITP 2016: Interactive Theorem Proving 7th International Conference. Springer, p. 459-465 7 p. (Lecture Notes in Computer Science; vol. 9807).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., Jun 2016, Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Text-Mining Approach to Explain Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Apr 2016, EuroSec '16 Proceedings of the 9th European Workshop on System Security . ACM, 6 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Explaining Unwanted Behaviours in Context

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 6 Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • PhoneWrap - Injecting the "How Often" into Mobile Apps

    Franzen, D. & Aspinall, D., Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 11-19 9 p. (CEUR Workshop Proceedings; vol. 1575).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Towards Formal Proof Metrics

    Aspinall, D. & Kaliszyk, C., Mar 2016, Fundamental Approaches to Software Engineering: 19th International Conference, FASE 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings. Springer, p. 325-341 17 p. (Lecture Notes in Computer Science; vol. 9633).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • AppPAL for Android: Capturing and Checking Mobile App Policies

    Hallett, J. & Aspinall, D., 2016, ESSoS: International Symposium on Engineering Secure Software and Systems. 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Learning and Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 2016, 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016). p. 17-32 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2015

    Verifying Anti-Security Policies Learnt from Android Malware Families

    Chen, W., Sutton, C., Aspinall, D., Gordon, A., Shen, Q. & Muttik, I., 21 Oct 2015, Fourth International Seminar on Program Verification, Automated Debugging and Symbolic Computation. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Compact Explanations of Why Malware is Bad

    Chen, W., Sutton, C., Gordon, A., Aspinall, D., Muttik, I. & Shen, Q., 10 Aug 2015, (Accepted/In press) AI4FM 2015. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Type Inference for ZFH

    Obua, S., Fleuriot, J., Scott, P. & Aspinall, D., 18 Jul 2015, Intelligent Computer Mathematics : International Conference, CICM 2015, Washington, DC, USA, July 13-17, 2015, Proceedings. Springer, p. 87-101 15 p. (Lecture Notes in Computer Science; vol. 9150).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Security testing for Android mHealth apps

    Knorr, K. & Aspinall, D., Apr 2015, Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on. Institute of Electrical and Electronics Engineers, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Accessible Banking: Experiences and Future Directions

    Gor, B. & Aspinall, D., 2015, Workshop on Inclusive Privacy and Security (WIPS): Privacy and Security for Everyone, Anytime, Anywhere, held as part of Symposium on Usable Privacy and Security (SOUPS) 2015. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • EviCheck: Digital Evidence for Android

    Seghir, M. N. & Aspinall, D., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer, p. 221-227 6 p. (Lecture Notes in Computer Science; vol. 9364).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps

    Knorr, K., Aspinall, D. & Wolters, M., 2015, ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Federrath, H. & Gollmann, D. (eds.). Springer, p. 571-584 14 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Scoping Secure Online Shopping for Older People

    Wolters, M. K. & Aspinall, D., 2015, Proceedings of the Workshop on Inclusive Privacy and Security. Usenix, 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices

    Micallef, N., Kayacik, H. G., Just, M., Baillie, L. & Aspinall, D., 2015, Proceedings of PerCom 2015. 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2014

    Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors

    Kayacik, H. G., Just, M., Baillie, L., Aspinall, D. & Micallef, N., 2014, Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014. ArXiv, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • ProofPeer: Collaborative Theorem Proving

    Obua, S., Fleuriot, J. D., Scott, P. & Aspinall, D., 2014, 11 p.

    Research output: Working paper

    Open Access
    File
  • Towards an amortized type system for JavaScript

    Franzen, D. & Aspinall, D., 2014, 6th International Symposium on Symbolic Computation in Software Science, SCSS 2014, Gammarth, La Marsa, Tunisia, December 7-8, 2014. p. 12-26 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards an Authorization Framework for App Security Checking

    Hallett, J. & Aspinall, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File