Edinburgh Research Explorer

Prof David Aspinall

Personal Chair in Software Safety and Security

  1. 2018
  2. An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities

    Alharbi, R. & Aspinall, D., 14 Jun 2018, Living in the Internet of Things: Cybersecurity of the IoT - 2018. London, UK, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Secure information sharing in social agent interactions using information flow analysis

    Bijani, S., Robertson, D. & Aspinall, D., 3 Feb 2018, In : Engineering Applications of Artificial Intelligence. 70, p. 52-66 15 p.

    Research output: Contribution to journalArticle

  4. Formal Analysis of Sneak-Peek: A Data-Centre Attack and its Mitigations

    Chen, W., Lin, Y., Galpin, V., Nigam, V., Lee, M. & Aspinall, D., 2018, 33rd International Conference on Information Security and Privacy Protection (IFIP SEC 2018). Poznan, Poland: Springer, Cham, p. 307-322 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 2017
  6. How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

    Butler, D., Aspinall, D. & Gascón, A., 21 Aug 2017, Interactive Theorem Proving: ITP 2017. 978-3-319-66106-3: Springer, Cham, p. 114-130 17 p. (Lecture Notes in Computer Science; vol. 10499).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Capturing Policies for BYOD

    Hallett, J. & Aspinall, D., 4 May 2017, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Cham: Springer, Cham, p. 310-323 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Certified Lightweight Contextual Policies for Android

    Seghir, M. N., Aspinall, D. & Marekova, L., 6 Feb 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Boston, MA, USA: Institute of Electrical and Electronics Engineers (IEEE), p. 94-100 7 p. 7839801

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2016
  10. POSTER: Weighing in eHealth Security

    Krämer, M., Aspinall, D. & Wolters, M., 24 Oct 2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1832-1834 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. What’s in a Theorem Name?

    Aspinall, D. & Kaliszyk, C., 7 Aug 2016, Proceedings of ITP 2016: Interactive Theorem Proving 7th International Conference. Springer, Cham, p. 459-465 7 p. (Lecture Notes in Computer Science; vol. 9807).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., Jun 2016, Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer International Publishing, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 9 Next