Steven Murdoch
#27,057
Most Influential Person Now
British computer security expert
Steven Murdoch's AcademicInfluence.com Rankings
Steven Murdochcriminal-justice Degrees
Criminal Justice
#71
World Rank
#84
Historical Rank
Cyber Security
#14
World Rank
#15
Historical Rank
Steven Murdochcomputer-science Degrees
Computer Science
#2722
World Rank
#2848
Historical Rank
Cybersecurity
#24
World Rank
#26
Historical Rank
Database
#7287
World Rank
#7543
Historical Rank
Download Badge
Criminal Justice Computer Science
Why Is Steven Murdoch Influential?
(Suggest an Edit or Addition)According to Wikipedia, Steven James Murdoch is Professor of Security Engineering in the Computer Science Department, University College London. His research covers privacy-enhancing technology, Internet censorship, and anonymous communication, in particular Tor. He is also known for discovering several vulnerabilities in the EMV bank chipcard payment system and for creating Tor Browser.
Steven Murdoch's Published Works
Published Works
- Low-cost traffic analysis of Tor (2005) (641)
- Embedding Covert Channels into TCP/IP (2005) (346)
- Hot or not: revealing hidden services by their clock skew (2006) (292)
- Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks (2007) (270)
- Ignoring the Great Firewall of China (2006) (257)
- Chip and PIN is Broken (2010) (227)
- Sampled Traffic Analysis by Internet-Exchange-Level Adversaries (2007) (216)
- CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization (2015) (191)
- Chip and Skim: Cloning EMV Cards with the Pre-play Attack (2012) (126)
- An Improved Clock-skew Measurement Technique for Revealing Hidden Services (2008) (108)
- Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it (2009) (101)
- A Case Study on Measuring Statistical Data in the Tor Anonymity Network (2010) (96)
- Thinking Inside the Box: System-Level Failures of Tamper Proofing (2008) (88)
- Optimised to Fail: Card Readers for Online Banking (2009) (87)
- Adblocking and Counter Blocking: A Slice of the Arms Race (2016) (80)
- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication (2010) (77)
- Metrics for Security and Performance in Low-Latency Anonymity Systems (2008) (73)
- Do You See What I See? Differential Treatment of Anonymous Users (2016) (67)
- Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture (2014) (64)
- Tools and Technology of Internet Filtering (2008) (57)
- Covert channel vulnerabilities in anonymity systems (2007) (49)
- Chip and spin (2006) (42)
- SoK: Making Sense of Censorship Resistance Systems (2016) (38)
- EMV: why payment systems fail (2014) (37)
- Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks (2010) (37)
- Fast Protection-Domain Crossing in the CHERI Capability-System Architecture (2016) (32)
- Covert Channels for Collusion in Online Computer Games (2004) (31)
- Security Protocols and Evidence: Where Many Payment Systems Fail (2014) (29)
- How Certification Systems Fail: Lessons from the Ware Report (2012) (27)
- Message Splitting Against the Partial Adversary (2005) (24)
- Magnetostriction and surface roughness of ultrathin nife films deposited on SiO2 (2003) (24)
- CHERI: a research platform deconflating hardware virtualisation and protection (2012) (23)
- Scanning the Internet for Liveness (2018) (22)
- Hardened Stateless Session Cookies (2008) (18)
- Comparison of Tor Datagram Designs (2011) (17)
- Tor: The Second-Generation Onion Router (2014 DRAFT v1) (2012) (16)
- Reliability of Chip & PIN evidence in banking disputes (2014) (14)
- Shifting Borders (2007) (14)
- Securing network location awareness with authenticated DHCP (2007) (14)
- Quantifying and Measuring Anonymity (2013) (14)
- Phish and Chips Traditional and New Recipes for Attacking EMV (2006) (13)
- Be Prepared: The EMV Preplay Attack (2015) (13)
- Incentives in Security Protocols (2018) (12)
- International comparison of bank fraud reimbursement: customer perceptions and contractual terms (2016) (12)
- Systemization of Pluggable Transports for Censorship Resistance (2014) (12)
- Bluespec Extensible RISC Implementation: BERI Hardware reference (2014) (11)
- Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web (2019) (10)
- A Framework for the Game-theoretic Analysis of Censorship Resistance (2016) (9)
- Failures of Tamper-Proofing in PIN Entry Devices (2009) (9)
- Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited (2021) (8)
- VAMS: Verifiable Auditing of Access to Confidential Data (2018) (8)
- Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV (2011) (8)
- Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide (2015) (7)
- Evaluation of a libutp-based Tor Datagram Implementation (2013) (7)
- Insecure by Design: Protocols for Encrypted Phone Calls (2016) (7)
- Introduction to: Internet Censorship and Control (2013) (7)
- Optimising node selection probabilities in multi-hop M/D/1 queuing networks to reduce latency of Tor (2014) (7)
- Destructive Activism: The Double-Edged Sword of Digital Tactics (2010) (6)
- Far more than you ever wanted to tell: Hidden data in Internet published documents (2004) (6)
- Transparency Enhancing Technologies to Make Security Protocols Work for Humans (2019) (5)
- Unwrapping the Chrysalis (2004) (5)
- Are payment card contracts unfair (2016) (4)
- Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime (2019) (4)
- Internet Censorship and Control [Guest editors' introduction] (2013) (4)
- The Adblocking Tug-of-War (2016) (3)
- Pluggable Transports Roadmap (2012) (3)
- Recurring Contingent Payment for Proofs of Retrievability (2021) (3)
- Capability Hardware Enhanced RISC Instructions: CHERI User’s guide (2014) (3)
- Are Payment Card Contracts Unfair? (Short Paper) (2016) (3)
- Datagram Testing Plan (2012) (2)
- Laser-printed PIN Mailer Vulnerability Report (2)
- Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims (2022) (2)
- Cloud computing security ( 8 / 8 ) Nigori : Storing secrets in the cloud (2)
- Be prepared: The EMV pre-play attack (2015) (2)
- Multi-party Updatable Delegated Private Set Intersection (2022) (1)
- Privacy Enhancing Technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings (2014) (1)
- 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 (2015) (1)
- Censorship Resistance: Let a Thousand Flowers Bloom? (2014) (1)
- Bank Card PIN Mailer Security (2005) (1)
- Internet censorship in China (2007) (1)
- Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown (2021) (1)
- On the Origins of a Thesis (2008) (0)
- Hardened Stateless Session Cookies (Transcript of Discussion) (2008) (0)
- Decode Execute Memory Access Capability Coprocessor Instruction Cache MMU : TLB Data Cache Memory Control Coprocessor Register (2017) (0)
- Editors’ Introduction (2015) (0)
- Privacy Enhancing Technologies (2014) (0)
- Number 592 Computer Laboratory UCAM-CL-TR-592 ISSN 1476-2986 Unwrapping the Chrysalis (2004) (0)
- Incentives in Security Protocols (Transcript of Discussion) (2018) (0)
- What Next after Anonymity? (2008) (0)
- Recurring Contingent Service Payment (2022) (0)
- Earn While You Reveal: Private Set Intersection that Rewards Participants (2023) (0)
- Evidence for a posteriori security (2018) (0)
- Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion) (2019) (0)
- Editors’ Introduction (2015) (0)
- Thinking like a Fraudster: Cognitive Walkthrough in Malicious Settings (2019) (0)
- A Forward-secure Efficient Two-factor Authentication Protocol (2022) (0)
- Towards a Theory of Application Compartmentalisation (2013) (0)
- Economics and psychology of security ( 2 / 11 ) Security economics (2013) (0)
- Anonymous Communications and Censorship Resistance Using Tor to defeat Internet surveillance (2010) (0)
This paper list is powered by the following services:
Other Resources About Steven Murdoch
What Schools Are Affiliated With Steven Murdoch?
Steven Murdoch is affiliated with the following schools: