Accepting PhD Students

PhD projects

Please see the Informatics Security and Privacy group page for projects including some of mine: <a href="http://web.inf.ed.ac.uk/security-privacy/phd-study/phd-topics">S and P PhD topics</a>

Please contact me directly for topics in other areas.

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Accessible Banking: Experiences and Future Directions

    Gor, B. & Aspinall, D., 2015, Workshop on Inclusive Privacy and Security (WIPS): Privacy and Security for Everyone, Anytime, Anywhere, held as part of Symposium on Usable Privacy and Security (SOUPS) 2015. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Framework for Interactive Proof

    Aspinall, D., Lüth, C. & Winterstein, D., 2007, Towards Mechanized Mathematical Assistants: 14th Symposium, Calculemus 2007, 6th International Conference, MKM 2007, Hagenberg, Austria, June 27-30, 2007. Proceedings. Kauers, M., Kerber, M., Miner, R. & Windsteiger, W. (eds.). Springer Berlin Heidelberg, p. 161-175 15 p. (Lecture Notes in Computer Science; vol. 4573).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An essence of SSReflect

    Whiteside, I., Aspinall, D. & Grov, G., 1 Jan 2012, Intelligent Computer Mathematics: 11th International Conference, AISC 2012, 19th Symposium, Calculemus 2012, 5th International Workshop, DML 2012, 11th International Conference, MKM 2012, Systems and Projects, Held as Part of CICM 2012, Bremen, Germany, July 8-13, 2012. Proceedings. Springer-Verlag GmbH, p. 186-201 16 p. (Lecture Notes in Computer Science; vol. 7362).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities

    Alharbi, R. & Aspinall, D., 14 Jun 2018, (E-pub ahead of print) Living in the Internet of Things: Cybersecurity of the IoT - 2018. London, UK: IET, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Another Type System for In-Place Update

    Aspinall, D. & Hofmann, M., 2002, Programming Languages and Systems: 11th European Symposium on Programming, ESOP 2002 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2002 Grenoble, France, April 8–12, 2002 Proceedings. Le Métayer, D. (ed.). Springer Berlin Heidelberg, Vol. 2305. p. 36-52 17 p. (Lecture Notes in Computer Science; vol. 2305).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • AppPAL for Android: Capturing and Checking Mobile App Policies

    Hallett, J. & Aspinall, D., 2016, ESSoS: International Symposium on Engineering Secure Software and Systems. 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • A Program Logic for Resource Verification

    Aspinall, D., Beringer, L., Hofmann, M., Loidl, H-W. & Momigliano, A., 2004, Theorem Proving in Higher Order Logics: 17th International Conference, TPHOLs 2004, Park City, Utah, USA, September 14-17, 2004. Proceedings. Slind, K., Bunker, A. & Gopalakrishnan, G. (eds.). Springer Berlin Heidelberg, Vol. 3223. p. 34-49 16 p. (Lecture Notes in Computer Science; vol. 3223).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A Semantic Basis for Proof Queries and Transformations

    Aspinall, D., Denney, E. & Lüth, C., 2013, Logic for Programming, Artificial Intelligence, and Reasoning: 19th International Conference, LPAR-19, Stellenbosch, South Africa, December 14-19, 2013. Proceedings. McMillan, K., Middeldorp, A. & Voronkov, A. (eds.). Springer Berlin Heidelberg, p. 53-70 18 p. (Lecture Notes in Computer Science; vol. 8312).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Assisted Proof Document Authoring

    Aspinall, D., Lüth, C. & Wolff, B., 2006, Mathematical Knowledge Management: 4th International Conference, MKM 2005, Bremen, Germany, July 15-17, 2005, Revised Selected Papers. Kohlhase, M. (ed.). Springer Berlin Heidelberg, p. 65-80 16 p. (Lecture Notes in Computer Science; vol. 3863).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A Tactic Language for Hiproofs

    Aspinall, D., Denney, E. & Lüth, C., 2008, Intelligent Computer Mathematics, 9th International Conference, AISC 2008, 15th Symposium, Calculemus 2008, 7th International Conference, MKM 2008, Birmingham, UK, July 28 - August 1, 2008. Proceedings.: Lecture Notes in Computer Science. Springer Berlin Heidelberg, Vol. 5144. p. 339-354 16 p. (Lecture Notes in Computer Scince; vol. 5144).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A Text-Mining Approach to Explain Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Apr 2016, EuroSec '16 Proceedings of the 9th European Workshop on System Security . ACM, 6 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Better Anomaly Detection for Access Attacks Using Deep Bidirectional LSTMs

    Clausen, H., Grov, G., Sabate, M. & Aspinall, D., 3 Mar 2021, Machine Learning for Networking. Renault, É., Boumerdassi, S. & Mühlethaler, P. (eds.). Cham: Springer International Publishing, p. 1-18 18 p. (Lecture Notes in Computer Science ; vol. 12629).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Capturing Hiproofs in HOL Light

    Obua, S., Adams, M. & Aspinall, D., 2013, Intelligent Computer Mathematics: Proceedings MKM, Calculemus, DML, and Systems and Projects 2013, Held as Part of CICM 2013, Bath, UK, July 8-12, 2013. Springer Berlin Heidelberg, p. 184-199 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Capturing Policies for BYOD

    Hallett, J. & Aspinall, D., 4 May 2017, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Cham: Springer, Cham, p. 310-323 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Certified Lightweight Contextual Policies for Android

    Seghir, M. N., Aspinall, D. & Marekova, L., 6 Feb 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Boston, MA, USA: Institute of Electrical and Electronics Engineers (IEEE), p. 94-100 7 p. 7839801

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Checking Contact Tracing App Implementations

    Flood, R., Chan, S. C., Chen, W. & Aspinall, D., 11 Feb 2021, Proceedings of the 7th International Conference on Information Systems Security and Privacy - ICISSP. SCITEPRESS, p. 133-144 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Compact Explanations of Why Malware is Bad

    Chen, W., Sutton, C., Gordon, A., Aspinall, D., Muttik, I. & Shen, Q., 10 Aug 2015, (Accepted/In press) AI4FM 2015. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Controlling Network Traffic Microstructures for Machine-Learning Model Probing

    Clausen, H., Flood, R. & Aspinall, D., 3 Nov 2021, Security and Privacy in Communication Networks. Springer, Cham, p. 456-475 20 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 398).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors

    Kayacik, H. G., Just, M., Baillie, L., Aspinall, D. & Micallef, N., 2014, Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014. ArXiv, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Datatypes in Memory

    Aspinall, D. & Hoffman, P., 2007, Proceedings of the 2nd International Conference on Algebra and Coalgebra in Computer Science. Berlin, Heidelberg: Springer-Verlag, p. 111-125 15 p. (CALCO'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Evading Stepping-Stone Detection with Enough Chaff

    Clausen, H., Gibson, M. S. & Aspinall, D., 19 Dec 2020, Network and System Security. Kutyłowski, M., Zhang, J. & Chen, C. (eds.). Cham: Springer International Publishing, p. 431-446 16 p. (Lecture Notes in Computer Science ; vol. 12570).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection

    Schneider, M., Aspinall, D. & Bastian, N. D., 13 Jan 2022, 2021 IEEE International Conference on Big Data (Big Data). Chen, Y., Ludwig, H., Tu, Y., Fayyad, U., Zhu, X., Hu, X., Byna, S., Liu, X., Zhang, J., Pan, S., Papalexakis, V., Wang, J., Cuzzocrea, A. & Ordonez, C. (eds.). IEEE, p. 3343-3352 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • EviCheck: Digital Evidence for Android

    Seghir, M. N. & Aspinall, D., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer International Publishing, p. 221-227 6 p. (Lecture Notes in Computer Science; vol. 9364).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Examining traffic microstructures to improve model development

    Clausen, H. & Aspinall, D., 8 Jul 2021, 2021 IEEE Security and Privacy Workshops (SPW). Institute of Electrical and Electronics Engineers (IEEE), p. 19-24 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Explaining Unwanted Behaviours in Context

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 6 Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Formal Analysis of Sneak-Peek: A Data-Centre Attack and its Mitigations

    Chen, W., Lin, Y., Galpin, V., Nigam, V., Lee, M. & Aspinall, D., 2018, 33rd International Conference on Information Security and Privacy Protection (IFIP SEC 2018). Poznan, Poland: Springer, Cham, p. 307-322 16 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Formalising Java’s Data Race Free Guarantee

    Aspinall, D. & Ševčík, J., 2007, Theorem Proving in Higher Order Logics: 20th International Conference, TPHOLs 2007, Kaiserslautern, Germany, September 10-13, 2007. Proceedings. Schneider, K. & Brandt, J. (eds.). Springer Berlin Heidelberg, p. 22-37 16 p. (Lecture Notes in Computer Science; vol. 4732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • From Specifications to Code in Casl

    Aspinall, D. & Sannella, D., 2002, Algebraic Methodology and Software Technology: 9th International Conference, AMAST 2002 Saint-Gilles-les-Bains, Reunion Island, France September 9–13, 2002 Proceedings. Kirchner, H. & Ringeissen, C. (eds.). Springer Berlin Heidelberg, Vol. 2422. p. 1-14 14 p. (Lecture Notes in Computer Science; vol. 2422).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks

    Aspinall, D. & Just, M., 2013, Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers. Sadeghi, A-R. (ed.). Springer-Verlag GmbH, p. 126-143 18 p. (Lecture Notes in Computer Science; vol. 7859).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

    Butler, D., Aspinall, D. & Gascón, A., 21 Aug 2017, Interactive Theorem Proving: ITP 2017. 978-3-319-66106-3: Springer, Cham, p. 114-130 17 p. (Lecture Notes in Computer Science; vol. 10499).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Isabelle with Proof General Eclipse: An Overview and User Introduction

    Aspinall, D. & Lüth, C., 2007, CADE-21 The 21st Conference on Automated Deduction : The Isabelle Workshop 2007. p. 38 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Java Memory Model Examples: Good, Bad and Ugly

    Aspinall, D. & Ševčík, J., 2007, Proceedings of Verification and Analysis of Multi-Threaded Java-Like Programs (VAMP 2007). 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Learning and Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 2016, 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016). p. 17-32 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Mobile Resource Guarantees

    Sannella, D., Hofmann, M., Aspinall, D., Gilmore, S., Stark, I., Beringer, L., Loidl, H-W., MacKenzie, K., Momigliano, A. & Shkaravska, O., 2007, Trends in Functional Programming. Intellect Books, Vol. 6. p. 211-226 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Mobile Resource Guarantees (Project Evaluation Paper)

    Sannella, D., Hofmann, M., Aspinall, D., Gilmore, S., Stark, I., Beringer, L., Loidl, H-W., MacKenzie, K., Momigliano, A. & Shkaravska, O., 2005, 6th Symposium on Trends in Functional Programming TFP 2005. Institute of Cybernetics, p. 7-16 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Mobile Resource Guarantees and Policies

    Aspinall, D. & MacKenzie, K., 2006, Mobile Resource Guarantees and Policies: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices. Barthe, G., Grégoire, B., Huisman, M. & Lanet, J-L. (eds.). Springer Berlin Heidelberg, p. 16-36 21 p. (Lecture Notes in Computer Science; vol. 3956).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Mobile Resource Guarantees for Smart Devices

    Aspinall, D., Gilmore, S., Hofmann, M., Sannella, D. & Stark, I., 2005, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers. Barthe, G., Burdy, L., Huisman, M., Lanet, J-L. & Muntean, T. (eds.). Berlin: Springer-Verlag GmbH, Vol. 3362. p. 1-26 26 p. (Lecture Notes in Computer Science; vol. 3362).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Monitoring External Resources in Java MIDP

    Aspinall, D., Maier, P. & Stark, I., 21 Feb 2008, Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 2007). Vol. 197. p. 17-30 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., Jun 2016, Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer International Publishing, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On the Formalisation of Σ-Protocols and Commitment Schemes

    Butler, D., Aspinall, D. & Gascón, A., 3 Apr 2019, Principles of Security and Trust. POST 2019.. Nielson, F. & Sands, D. (eds.). Springer, p. 175-196 22 p. (Lecture Notes in Computer Science; vol. 11426).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps

    Knorr, K., Aspinall, D. & Wolters, M., 2015, ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Federrath, H. & Gollmann, D. (eds.). Springer International Publishing, p. 571-584 14 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • On the security and usability of dual credential authentication in UK online banking

    Just, M. & Aspinall, D., 1 Jan 2012, 2012 International Conference for Internet Technology and Secured Transactions, ICITST 2012. p. 259-264 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On Validity of Program Transformations in the Java Memory Model

    Sevcik, J. & Aspinall, D., 2008, ECOOP 2008 — Object-Oriented Programming. Vitek, J. (ed.). Springer-Verlag GmbH, p. 27-51 25 p. (Lecture Notes in Computer Science; vol. 5142).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Parsing, editing, proving: The PGIP display protocol

    Aspinall, D., Lüth, C. & Winterstein, D., 2005, International Workshop on User Interfaces for Theorem Provers. Vol. 2005.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
  • Personal choice and challenge questions: a security and usability assessment

    Just, M. & Aspinall, D., 2009, Proceedings of the 5th Symposium on Usable Privacy and Security. New York, NY, USA: ACM, p. 8:1-8:11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PG Tips: A Recommender System for an Interactive Theorem Prover

    Mercer, A. E., Bundy, A., Duncan, H. & Aspinall, D., 2006, Proceedings of Mathematical User-Interfaces Workshop (MathUI’2006). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • PhoneWrap - Injecting the "How Often" into Mobile Apps

    Franzen, D. & Aspinall, D., Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 11-19 9 p. (CEUR Workshop Proceedings; vol. 1575).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Polar: A Framework for Proof Refactoring

    Dietrich, D., Whiteside, I. & Aspinall, D., 2013, Logic for Programming, Artificial Intelligence, and Reasoning. McMillan, K., Middeldorp, A. & Voronkov, A. (eds.). Springer Berlin Heidelberg, Vol. 8312. p. 776-791 16 p. (Lecture Notes in Computer Science; vol. 8312).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • POSTER: Weighing in eHealth Security

    Krämer, M., Aspinall, D. & Wolters, M., 24 Oct 2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1832-1834 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File