Edinburgh Research Explorer

Prof David Aspinall

Personal Chair in Software Safety and Security

  1. 2018
  2. An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities

    Alharbi, R. & Aspinall, D. 14 Jun 2018 Living in the Internet of Things: Cybersecurity of the IoT - 2018. London, UK, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Secure information sharing in social agent interactions using information flow analysis

    Bijani, S., Robertson, D. & Aspinall, D. 3 Feb 2018 In : Engineering Applications of Artificial Intelligence. 70, p. 52-66 15 p.

    Research output: Contribution to journalArticle

  4. Formal Analysis of Sneak-Peek: A Data-Centre Attack and its Mitigations

    Chen, W., Lin, Y., Galpin, V., Nigam, V., Lee, M. & Aspinall, D. 2018 33rd International Conference on Information Security and Privacy Protection (IFIP SEC 2018). Poznan, Poland: Springer, Cham, p. 307-322 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 2017
  6. How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

    Butler, D., Aspinall, D. & Gascón, A. 21 Aug 2017 Interactive Theorem Proving: ITP 2017. 978-3-319-66106-3: Springer, Cham, p. 114-130 17 p. (Lecture Notes in Computer Science; vol. 10499)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Capturing Policies for BYOD

    Hallett, J. & Aspinall, D. 4 May 2017 ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Cham: Springer, Cham, p. 310-323 14 p. (IFIP Advances in Information and Communication Technology; vol. 502)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Certified Lightweight Contextual Policies for Android

    Seghir, M. N., Aspinall, D. & Marekova, L. 6 Feb 2017 Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Boston, MA, USA: IEEE, p. 94-100 7 p. 7839801

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2016
  10. POSTER: Weighing in eHealth Security

    Krämer, M., Aspinall, D. & Wolters, M. 24 Oct 2016 CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1832-1834 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. What’s in a Theorem Name?

    Aspinall, D. & Kaliszyk, C. 7 Aug 2016 Proceedings of ITP 2016: Interactive Theorem Proving 7th International Conference. Springer, Cham, p. 459-465 7 p. (Lecture Notes in Computer Science; vol. 9807)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I. 18 Jul 2016 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I. Jun 2016 Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer International Publishing, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 9 Next