Accepting PhD Students

PhD projects

Please see the Informatics Security and Privacy group page for projects including some of mine: S and P PhD topics Please contact me directly for topics in other areas.

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    Traffic Generation using Containerization for Machine Learning

    Clausen, H., Flood, R. & Aspinall, D., 25 Feb 2022, DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security Workshop Proceedings. ACM Association for Computing Machinery, 12 p. 3

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection

    Schneider, M., Aspinall, D. & Bastian, N. D., 13 Jan 2022, 2021 IEEE International Conference on Big Data (Big Data). Chen, Y., Ludwig, H., Tu, Y., Fayyad, U., Zhu, X., Hu, X., Byna, S., Liu, X., Zhang, J., Pan, S., Papalexakis, V., Wang, J., Cuzzocrea, A. & Ordonez, C. (eds.). IEEE, p. 3343-3352 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Controlling Network Traffic Microstructures for Machine-Learning Model Probing

    Clausen, H., Flood, R. & Aspinall, D., 3 Nov 2021, Security and Privacy in Communication Networks. Springer, Cham, p. 456-475 20 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 398).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Examining traffic microstructures to improve model development

    Clausen, H. & Aspinall, D., 8 Jul 2021, 2021 IEEE Security and Privacy Workshops (SPW). Institute of Electrical and Electronics Engineers (IEEE), p. 19-24 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Better Anomaly Detection for Access Attacks Using Deep Bidirectional LSTMs

    Clausen, H., Grov, G., Sabate, M. & Aspinall, D., 3 Mar 2021, Machine Learning for Networking. Renault, É., Boumerdassi, S. & Mühlethaler, P. (eds.). Cham: Springer International Publishing, p. 1-18 18 p. (Lecture Notes in Computer Science ; vol. 12629).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Checking Contact Tracing App Implementations

    Flood, R., Chan, S. C., Chen, W. & Aspinall, D., 11 Feb 2021, Proceedings of the 7th International Conference on Information Systems Security and Privacy - ICISSP. SCITEPRESS, p. 133-144 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2020

    Evading Stepping-Stone Detection with Enough Chaff

    Clausen, H., Gibson, M. S. & Aspinall, D., 19 Dec 2020, Network and System Security. Kutyłowski, M., Zhang, J. & Chen, C. (eds.). Cham: Springer International Publishing, p. 431-446 16 p. (Lecture Notes in Computer Science ; vol. 12570).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2019

    Retrofitting Security and Privacy Measures to Smart Home Devices

    Ye, C., Indra, P. P. & Aspinall, D., 23 Dec 2019, 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE Xplore, p. 283-290 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Towards Intelligible Robust Anomaly Detection by Learning Interpretable Behavioural Models

    Grov, G., Chen, W., Sabate, M. & Aspinall, D., 20 Nov 2019, Vol. 12 (2019): NISK 2019; Proceedings of the 12th Norwegian Information Security Conference. Akademika, 16 p. (NISK; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • On the Formalisation of Σ-Protocols and Commitment Schemes

    Butler, D., Aspinall, D. & Gascón, A., 3 Apr 2019, Principles of Security and Trust. POST 2019.. Nielson, F. & Sands, D. (eds.). Springer, p. 175-196 22 p. (Lecture Notes in Computer Science; vol. 11426).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2018

    An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities

    Alharbi, R. & Aspinall, D., 14 Jun 2018, (E-pub ahead of print) Living in the Internet of Things: Cybersecurity of the IoT - 2018. London, UK: IET, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Formal Analysis of Sneak-Peek: A Data-Centre Attack and its Mitigations

    Chen, W., Lin, Y., Galpin, V., Nigam, V., Lee, M. & Aspinall, D., 2018, 33rd International Conference on Information Security and Privacy Protection (IFIP SEC 2018). Poznan, Poland: Springer, Cham, p. 307-322 16 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2017

    How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

    Butler, D., Aspinall, D. & Gascón, A., 21 Aug 2017, Interactive Theorem Proving: ITP 2017. 978-3-319-66106-3: Springer, Cham, p. 114-130 17 p. (Lecture Notes in Computer Science; vol. 10499).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Capturing Policies for BYOD

    Hallett, J. & Aspinall, D., 4 May 2017, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Cham: Springer, Cham, p. 310-323 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Certified Lightweight Contextual Policies for Android

    Seghir, M. N., Aspinall, D. & Marekova, L., 6 Feb 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Boston, MA, USA: Institute of Electrical and Electronics Engineers (IEEE), p. 94-100 7 p. 7839801

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2016

    POSTER: Weighing in eHealth Security

    Krämer, M., Aspinall, D. & Wolters, M., 24 Oct 2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1832-1834 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • What’s in a Theorem Name?

    Aspinall, D. & Kaliszyk, C., 7 Aug 2016, Proceedings of ITP 2016: Interactive Theorem Proving 7th International Conference. Springer, Cham, p. 459-465 7 p. (Lecture Notes in Computer Science; vol. 9807).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., Jun 2016, Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer International Publishing, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Text-Mining Approach to Explain Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Apr 2016, EuroSec '16 Proceedings of the 9th European Workshop on System Security . ACM, 6 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Explaining Unwanted Behaviours in Context

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 6 Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • PhoneWrap - Injecting the "How Often" into Mobile Apps

    Franzen, D. & Aspinall, D., Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 11-19 9 p. (CEUR Workshop Proceedings; vol. 1575).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Towards Formal Proof Metrics

    Aspinall, D. & Kaliszyk, C., Mar 2016, Fundamental Approaches to Software Engineering: 19th International Conference, FASE 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings. Springer Berlin Heidelberg, p. 325-341 17 p. (Lecture Notes in Computer Science; vol. 9633).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • AppPAL for Android: Capturing and Checking Mobile App Policies

    Hallett, J. & Aspinall, D., 2016, ESSoS: International Symposium on Engineering Secure Software and Systems. 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Learning and Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 2016, 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016). p. 17-32 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2015

    Verifying Anti-Security Policies Learnt from Android Malware Families

    Chen, W., Sutton, C., Aspinall, D., Gordon, A., Shen, Q. & Muttik, I., 21 Oct 2015, Fourth International Seminar on Program Verification, Automated Debugging and Symbolic Computation. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Compact Explanations of Why Malware is Bad

    Chen, W., Sutton, C., Gordon, A., Aspinall, D., Muttik, I. & Shen, Q., 10 Aug 2015, (Accepted/In press) AI4FM 2015. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Type Inference for ZFH

    Obua, S., Fleuriot, J., Scott, P. & Aspinall, D., 18 Jul 2015, Intelligent Computer Mathematics : International Conference, CICM 2015, Washington, DC, USA, July 13-17, 2015, Proceedings. Springer International Publishing, p. 87-101 15 p. (Lecture Notes in Computer Science; vol. 9150).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Security testing for Android mHealth apps

    Knorr, K. & Aspinall, D., Apr 2015, Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on. Institute of Electrical and Electronics Engineers (IEEE), p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Accessible Banking: Experiences and Future Directions

    Gor, B. & Aspinall, D., 2015, Workshop on Inclusive Privacy and Security (WIPS): Privacy and Security for Everyone, Anytime, Anywhere, held as part of Symposium on Usable Privacy and Security (SOUPS) 2015. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • EviCheck: Digital Evidence for Android

    Seghir, M. N. & Aspinall, D., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer International Publishing, p. 221-227 6 p. (Lecture Notes in Computer Science; vol. 9364).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps

    Knorr, K., Aspinall, D. & Wolters, M., 2015, ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Federrath, H. & Gollmann, D. (eds.). Springer International Publishing, p. 571-584 14 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Scoping Secure Online Shopping for Older People

    Wolters, M. K. & Aspinall, D., 2015, Proceedings of the Workshop on Inclusive Privacy and Security. Usenix, 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Sensor Use and Usefulness: Trade-Offs for Data-Driven Authentication on Mobile Devices

    Micallef, N., Kayacik, H. G., Just, M., Baillie, L. & Aspinall, D., 2015, Proceedings of PerCom 2015. 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2014

    Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors

    Kayacik, H. G., Just, M., Baillie, L., Aspinall, D. & Micallef, N., 2014, Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014. ArXiv, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Towards an amortized type system for JavaScript

    Franzen, D. & Aspinall, D., 2014, 6th International Symposium on Symbolic Computation in Software Science, SCSS 2014, Gammarth, La Marsa, Tunisia, December 7-8, 2014. p. 12-26 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards an Authorization Framework for App Security Checking

    Hallett, J. & Aspinall, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2013

    A Semantic Basis for Proof Queries and Transformations

    Aspinall, D., Denney, E. & Lüth, C., 2013, Logic for Programming, Artificial Intelligence, and Reasoning: 19th International Conference, LPAR-19, Stellenbosch, South Africa, December 14-19, 2013. Proceedings. McMillan, K., Middeldorp, A. & Voronkov, A. (eds.). Springer Berlin Heidelberg, p. 53-70 18 p. (Lecture Notes in Computer Science; vol. 8312).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Capturing Hiproofs in HOL Light

    Obua, S., Adams, M. & Aspinall, D., 2013, Intelligent Computer Mathematics: Proceedings MKM, Calculemus, DML, and Systems and Projects 2013, Held as Part of CICM 2013, Bath, UK, July 8-12, 2013. Springer Berlin Heidelberg, p. 184-199 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks

    Aspinall, D. & Just, M., 2013, Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers. Sadeghi, A-R. (ed.). Springer-Verlag GmbH, p. 126-143 18 p. (Lecture Notes in Computer Science; vol. 7859).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Polar: A Framework for Proof Refactoring

    Dietrich, D., Whiteside, I. & Aspinall, D., 2013, Logic for Programming, Artificial Intelligence, and Reasoning. McMillan, K., Middeldorp, A. & Voronkov, A. (eds.). Springer Berlin Heidelberg, Vol. 8312. p. 776-791 16 p. (Lecture Notes in Computer Science; vol. 8312).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Recording and Refactoring HOL Light Tactic Proofs

    Adams, M. & Aspinall, D., Jun 2012, Proceedings of the IJCAR workshop on Automated Theory Exploration. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • An essence of SSReflect

    Whiteside, I., Aspinall, D. & Grov, G., 1 Jan 2012, Intelligent Computer Mathematics: 11th International Conference, AISC 2012, 19th Symposium, Calculemus 2012, 5th International Workshop, DML 2012, 11th International Conference, MKM 2012, Systems and Projects, Held as Part of CICM 2012, Bremen, Germany, July 8-13, 2012. Proceedings. Springer-Verlag GmbH, p. 186-201 16 p. (Lecture Notes in Computer Science; vol. 7362).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the security and usability of dual credential authentication in UK online banking

    Just, M. & Aspinall, D., 1 Jan 2012, 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012. p. 259-264 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Querying Proofs

    Aspinall, D., Denney, E. & Lüth, C., 2012, Logic for Programming, Artificial Intelligence, and Reasoning: 18th International Conference, LPAR-18, Mérida, Venezuela, March 11-15, 2012. Proceedings. Bjørner, N. & Voronkov, A. (eds.). Springer-Verlag GmbH, p. 92-106 15 p. (Lecture Notes in Computer Science; vol. 7180).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Probing Attacks on Multi-agent Systems from Electronic Institutions

    Bijani, S., Robertson, D. & Aspinall, D., 2011, Declarative Agent Languages and Technologies IX: 9th International Workshop, DALT 2011, Taipei, Taiwan, May 3, 2011, Revised Selected and Invited Papers. Springer-Verlag GmbH, p. 33-50 18 p. (Lecture Notes in Computer Science; vol. 7169).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards Formal Proof Script Refactoring

    Whiteside, I., Aspinall, D., Dixon, L. & Grov, G., 2011, Intelligent Computer Mathematics: 18th Symposium, Calculemus 2011, and 10th International Conference, MKM 2011, Bertinoro, Italy, July 18-23, 2011. Proceedings. Davenport, J., Farmer, W., Urban, J. & Rabe, F. (eds.). Springer Berlin Heidelberg, p. 260-275 16 p. (Lecture Notes in Computer Science; vol. 6824).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2010

    Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode

    Aspinall, D., Atkey, R., MacKenzie, K. & Sannella, D., 2010, Trustworthly Global Computing: 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers. Wirsing, M., Hofmann, M. & Rauschmayer, A. (eds.). Springer-Verlag GmbH, p. 1-22 22 p. (Lecture Notes in Computer Science; vol. 6084).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2009

    Towards Merging PlatΩ and PGIP

    Aspinall, D., 9 Jan 2009, Proceedings of the 8th International Workshop on User Interfaces for Theorem Provers (UITP 2008). p. 3-21 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Personal choice and challenge questions: a security and usability assessment

    Just, M. & Aspinall, D., 2009, Proceedings of the 5th Symposium on Usable Privacy and Security. New York, NY, USA: ACM, p. 8:1-8:11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution