Skip to main content

Showing 1–11 of 11 results for author: Murdoch, S J

  1. arXiv:2401.10765  [pdf, other

    cs.LG cs.CR

    Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection

    Authors: Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller

    Abstract: Federated Learning (FL) is a data-minimization approach enabling collaborative model training across diverse clients with local data, avoiding direct data exchange. However, state-of-the-art FL solutions to identify fraudulent financial transactions exhibit a subset of the following limitations. They (1) lack a formal security definition and proof, (2) assume prior freezing of suspicious customers… ▽ More

    Submitted 22 January, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

  2. arXiv:2308.01280  [pdf, other

    cs.CR

    Delegated Time-Lock Puzzle

    Authors: Aydin Abadi, Dan Ristea, Steven J. Murdoch

    Abstract: Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a client to lock a message in such a way that a server can only unlock it after a specific time period. However, existing TLPs have certain limitations: (i) they assume that both the client and server always possess sufficient computational resources and (ii) they solely focus on the lower time bound for finding a solution, disregard… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

  3. arXiv:2208.02877  [pdf, other

    cs.CR

    A Forward-secure Efficient Two-factor Authentication Protocol

    Authors: Steven J. Murdoch, Aydin Abadi

    Abstract: Two-factor authentication (2FA) schemes that rely on a combination of knowledge factors (e.g., PIN) and device possession have gained popularity. Some of these schemes remain secure even against strong adversaries that (a) observe the traffic between a client and server, and (b) have physical access to the client's device, or its PIN, or breach the server. However, these solutions have several sho… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  4. arXiv:2208.00283  [pdf, other

    cs.CR

    Recurring Contingent Service Payment

    Authors: Aydin Abadi, Steven J. Murdoch, Thomas Zacharias

    Abstract: Fair exchange protocols let two mutually distrustful parties exchange digital data in a way that neither party can cheat. They have various applications such as the exchange of digital items, or the exchange of digital coins and digital services between a buyer/client and seller/server. In this work, we formally define and propose a generic blockchain-based construction called "Recurring Conting… ▽ More

    Submitted 5 April, 2023; v1 submitted 30 July, 2022; originally announced August 2022.

  5. Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown

    Authors: Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini

    Abstract: The malware and botnet phenomenon is among the most significant threats to cybersecurity today. Consequently, law enforcement agencies, security companies, and researchers are constantly seeking to disrupt these malicious operations through so-called takedown counter-operations. Unfortunately, the success of these takedowns is mixed. Furthermore, very little is understood as to how botnets and mal… ▽ More

    Submitted 7 July, 2021; v1 submitted 4 April, 2021; originally announced April 2021.

    Comments: 14 pages, to appear in RAID 2021 conference

  6. arXiv:1910.06380  [pdf, other

    cs.CR cs.CY cs.HC

    Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime

    Authors: Colin C. Ife, Toby Davies, Steven J. Murdoch, Gianluca Stringhini

    Abstract: Cybercrime is a complex phenomenon that spans both technical and human aspects. As such, two disjoint areas have been studying the problem from separate angles: the information security community and the environmental criminology one. Despite the large body of work produced by these communities in the past years, the two research efforts have largely remained disjoint, with researchers on one side… ▽ More

    Submitted 14 July, 2022; v1 submitted 14 October, 2019; originally announced October 2019.

  7. arXiv:1805.04772  [pdf, other

    cs.CR

    VAMS: Verifiable Auditing of Access to Confidential Data

    Authors: Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch

    Abstract: We propose VAMS, a system that enables transparency for audits of access to data requests without compromising the privacy of parties in the system. VAMS supports audits on an aggregate level and an individual level, by relying on three mechanisms. A tamper-evident log provides integrity for the log entries that are audited. A tagging scheme allows users to query log entries that relate to them, w… ▽ More

    Submitted 3 May, 2023; v1 submitted 12 May, 2018; originally announced May 2018.

    Comments: Slight update on the original work paper from 2018

  8. arXiv:1605.05077  [pdf, other

    cs.CR cs.CY cs.NI

    Ad-Blocking and Counter Blocking: A Slice of the Arms Race

    Authors: Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch

    Abstract: Adblocking tools like Adblock Plus continue to rise in popularity, potentially threatening the dynamics of advertising revenue streams. In response, a number of publishers have ramped up efforts to develop and deploy mechanisms for detecting and/or counter-blocking adblockers (which we refer to as anti-adblockers), effectively escalating the online advertising arms race. In this paper, we develop… ▽ More

    Submitted 20 July, 2016; v1 submitted 17 May, 2016; originally announced May 2016.

    Comments: To appear in the Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 2016)

  9. arXiv:1412.7448  [pdf, other

    cs.CR

    Systemization of Pluggable Transports for Censorship Resistance

    Authors: Sheharbano Khattak, Laurent Simon, Steven J. Murdoch

    Abstract: An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ease with which a nation-state censor can control it. A number of censorship resistance systems have been developed thus far to help circumvent bl… ▽ More

    Submitted 29 July, 2016; v1 submitted 23 December, 2014; originally announced December 2014.

    Comments: Content from this paper was published in Proceedings on Privacy Enhancing Technologies (PoPETS), Volume 2016, Issue 4 (July 2016) as "SoK: Making Sense of Censorship Resistance Systems" by Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch and Ian Goldberg (DOI 10.1515/popets-2016-0028)

  10. Censorship Resistance: Let a Thousand Flowers Bloom?

    Authors: Tariq Elahi, Steven J. Murdoch, Ian Goldberg

    Abstract: This paper argues that one of the most important decisions in designing and deploying censorship resistance systems is whether one set of system options should be selected (the best), or whether there should be several sets of good ones. We model the problem of choosing these options as a cat-and-mouse game and show that the best strategy depends on the value the censor associates with total syste… ▽ More

    Submitted 4 December, 2014; originally announced December 2014.

  11. arXiv:1209.2531  [pdf, other

    cs.CY cs.CR

    Chip and Skim: cloning EMV cards with the pre-play attack

    Authors: Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, Ross Anderson

    Abstract: EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction… ▽ More

    Submitted 12 September, 2012; originally announced September 2012.