


Остановите войну!
for scientists:


default search action
Ross J. Anderson
Ross Anderson 0001
Person information

- affiliation: University of Cambridge, UK
Other persons with the same name
- Ross Anderson — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i27]Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross J. Anderson, Awais Rashid:
Threat Models over Space and Time: A Case Study of E2EE Messaging Applications. CoRR abs/2301.05653 (2023) - 2022
- [j39]Mansoor Ahmed-Rengers, Diana A. Vasile, Daniel Hugenroth, Alastair R. Beresford, Ross Anderson:
CoverDrop: Blowing the Whistle Through A News App. Proc. Priv. Enhancing Technol. 2022(2): 47-67 (2022) - [c131]Ildiko Pete, Jack Hughes, Andrew Caines, Anh V. Vu, Harshad Gupta, Alice Hutchings, Ross J. Anderson, Paula Buttery:
PostCog: A tool for interdisciplinary research into underground forums at scale. EuroS&P Workshops 2022: 93-104 - [c130]Nicholas Boucher, Ross Anderson:
Talking Trojan: Analyzing an Industry-Wide Disclosure. SCORED@CCS 2022: 83-92 - [c129]Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot:
Bad Characters: Imperceptible NLP Attacks. IEEE Symposium on Security and Privacy 2022: 1987-2004 - [i26]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - [i25]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict. CoRR abs/2208.10629 (2022) - [i24]Nicholas Boucher, Ross J. Anderson:
Talking Trojan: Analyzing an Industry-Wide Disclosure. CoRR abs/2209.10717 (2022) - [i23]Tim Clifford, Ilia Shumailov, Yiren Zhao, Ross J. Anderson, Robert D. Mullins:
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks. CoRR abs/2210.00108 (2022) - 2021
- [c128]Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins, Ross Anderson:
Sponge Examples: Energy-Latency Attacks on Neural Networks. EuroS&P 2021: 212-231 - [c127]David Khachaturov, Ilia Shumailov, Yiren Zhao, Nicolas Papernot, Ross J. Anderson:
Markpainting: Adversarial Machine Learning meets Inpainting. ICML 2021: 5409-5419 - [c126]Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross J. Anderson:
Manipulating SGD with Data Ordering Attacks. NeurIPS 2021: 18021-18032 - [i22]Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross J. Anderson:
Manipulating SGD with Data Ordering Attacks. CoRR abs/2104.09667 (2021) - [i21]David Khachaturov, Ilia Shumailov, Yiren Zhao, Nicolas Papernot, Ross J. Anderson:
Markpainting: Adversarial Machine Learning meets Inpainting. CoRR abs/2106.00660 (2021) - [i20]Nicholas Boucher, Ilia Shumailov, Ross J. Anderson, Nicolas Papernot:
Bad Characters: Imperceptible NLP Attacks. CoRR abs/2106.09898 (2021) - [i19]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - [i18]Nicholas Boucher, Ross J. Anderson:
Trojan Source: Invisible Vulnerabilities. CoRR abs/2111.00169 (2021) - [i17]Anh V. Vu, Lydia Wilson, Yi Ting Chua, Ilia Shumailov, Ross J. Anderson:
ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data. CoRR abs/2111.04479 (2021) - 2020
- [c125]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross J. Anderson:
Towards Certifiable Adversarial Sample Detection. AISec@CCS 2020: 13-24 - [c124]Yiren Zhao, Ilia Shumailov, Han Cui
, Xitong Gao
, Robert D. Mullins, Ross J. Anderson:
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information. DSN Workshops 2020: 16-24 - [i16]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross J. Anderson:
Towards Certifiable Adversarial Sample Detection. CoRR abs/2002.08740 (2020) - [i15]Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert D. Mullins, Ross J. Anderson:
Sponge Examples: Energy-Latency Attacks on Neural Networks. CoRR abs/2006.03463 (2020) - [i14]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On The Difficulty of Whistleblowing. CoRR abs/2006.14407 (2020) - [i13]Almos Zarandy, Ilia Shumailov, Ross J. Anderson:
BatNet: Data transmission between smartphones over ultrasound. CoRR abs/2008.00136 (2020) - [i12]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross J. Anderson:
Nudge Attacks on Point-Cloud DNNs. CoRR abs/2011.11637 (2020) - [i11]Almos Zarandy, Ilia Shumailov, Ross J. Anderson:
Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant. CoRR abs/2012.00687 (2020)
2010 – 2019
- 2019
- [c123]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross Anderson:
To Compress Or Not To Compress: Understanding The Interactions Between Adversarial Attacks And Neural Network Compression. MLSys 2019 - [c122]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On the Difficulty of Whistleblowing. Security Protocols Workshop 2019: 289-303 - [c121]Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). Security Protocols Workshop 2019: 304-312 - [i10]Mansoor Ahmed-Rengers, Ilia Shumailov, Ross Anderson:
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins. CoRR abs/1901.01769 (2019) - [i9]Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert D. Mullins, Ross Anderson, Cheng-Zhong Xu:
Sitatapatra: Blocking the Transfer of Adversarial Samples. CoRR abs/1901.08121 (2019) - [i8]Ilia Shumailov, Laurent Simon, Jeff Yan, Ross Anderson:
Hearing your touch: A new acoustic side channel on smartphones. CoRR abs/1903.11137 (2019) - [i7]Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert D. Mullins, Ross J. Anderson:
Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information. CoRR abs/1909.02918 (2019) - [i6]Sophie van der Zee, Richard Clayton, Ross J. Anderson:
The gift of the gab: Are rental scammers skilled at the art of persuasion? CoRR abs/1911.08253 (2019) - 2018
- [j38]Ross Anderson:
Making security sustainable. Commun. ACM 61(3): 24-26 (2018) - [c120]Laurent Simon, David Chisnall, Ross J. Anderson:
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers. EuroS&P 2018: 1-15 - [c119]Mansoor Ahmed-Rengers, Ilia Shumailov, Ross Anderson:
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins. GraMSec@FLoC 2018: 1-12 - [c118]Ross Anderson:
Sustainable Security - an Internet of Durable Goods. ICISSP 2018: 7 - [c117]Ross Anderson:
Covert and Deniable Communications. IH&MMSec 2018: 1 - [c116]Ross Anderson, Ilia Shumailov, Mansoor Ahmed-Rengers:
Making Bitcoin Legal. Security Protocols Workshop 2018: 243-253 - [c115]Ross Anderson:
Making Bitcoin Legal (Transcript of Discussion). Security Protocols Workshop 2018: 254-265 - [i5]Yiren Zhao, Ilia Shumailov, Robert D. Mullins, Ross Anderson:
To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression. CoRR abs/1810.00208 (2018) - [i4]Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Ross Anderson:
The Taboo Trap: Behavioural Detection of Adversarial Samples. CoRR abs/1811.07375 (2018) - 2017
- [j37]Ingolf Becker
, Alice Hutchings
, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch
, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. J. Cybersecur. 3(2): 109-125 (2017) - [c114]Khaled Baqer, Ross J. Anderson, Lorna Mutegi, Jeunese A. Payne, Joseph Sevilla:
DigiTally: Piloting Offline Payments for Phones. SOUPS 2017: 131-143 - [c113]Ross J. Anderson, Khaled Baqer:
Reconciling Multiple Objectives - Politics or Markets? Security Protocols Workshop 2017: 144-156 - [c112]Ross Anderson:
Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion). Security Protocols Workshop 2017: 157-170 - 2016
- [j36]Laurent Simon, Wenduan Xu, Ross J. Anderson:
Don't Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards. Proc. Priv. Enhancing Technol. 2016(3): 136-154 (2016) - [c111]Ross J. Anderson:
Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). CSF 2016: 16 - [c110]Alice Hutchings, Richard Clayton, Ross J. Anderson:
Taking down websites to prevent crime. eCrime 2016: 102-111 - [c109]Steven J. Murdoch
, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - [c108]Khaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn:
SMAPs: Short Message Authentication Protocols. Security Protocols Workshop 2016: 119-132 - [c107]Khaled Baqer, Ross J. Anderson:
SMAPs: Short Message Authentication Protocols (Transcript of Discussion). Security Protocols Workshop 2016: 133-140 - 2015
- [j35]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j34]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [j33]Mike Bond, Marios O. Choudary
, Steven J. Murdoch
, Sergei P. Skorobogatov, Ross J. Anderson:
Be Prepared: The EMV Preplay Attack. IEEE Secur. Priv. 13(2): 56-64 (2015) - [j32]David Modic
, Ross J. Anderson:
It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud. IEEE Secur. Priv. 13(5): 99-103 (2015) - [c106]Khaled Baqer, Ross J. Anderson:
Do You Believe in Tinker Bell? The Social Externalities of Trust. Security Protocols Workshop 2015: 224-236 - [c105]Khaled Baqer, Ross J. Anderson:
Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion). Security Protocols Workshop 2015: 237-246 - 2014
- [j31]Ross J. Anderson, Steven J. Murdoch
:
EMV: why payment systems fail. Commun. ACM 57(6): 24-28 (2014) - [j30]David Modic
, Ross J. Anderson:
Reading this may harm your computer: The psychology of malware warnings. Comput. Hum. Behav. 41: 71-79 (2014) - [c104]Steven J. Murdoch
, Ross J. Anderson:
Security Protocols and Evidence: Where Many Payment Systems Fail. Financial Cryptography 2014: 21-32 - [c103]Mike Bond, Omar Choudary
, Steven J. Murdoch
, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: Cloning EMV Cards with the Pre-play Attack. IEEE Symposium on Security and Privacy 2014: 49-64 - [c102]Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore
, L. Jean Camp, Kevin Benton, Ross J. Anderson:
Collaborating with the Enemy on Network Management. Security Protocols Workshop 2014: 154-162 - [c101]Ross J. Anderson, Chris Hall:
Collaborating with the Enemy on Network Management (Transcript of Discussion). Security Protocols Workshop 2014: 163-171 - 2013
- [j29]Hyoungshick Kim, Ross J. Anderson:
An Experimental Evaluation of Robustness of Networks. IEEE Syst. J. 7(2): 179-188 (2013) - [c100]Laurent Simon, Ross J. Anderson:
PIN skimmer: inferring PINs through the camera and microphone. SPSM@CCS 2013: 67-78 - [c99]Wei Ming Khoo, Alan Mycroft
, Ross J. Anderson:
Rendezvous: a search engine for binary code. MSR 2013: 329-338 - [c98]Dongting Yu, Andrew W. Moore
, Chris Hall, Ross J. Anderson:
Authentication for Resilience: The Case of SDN. Security Protocols Workshop 2013: 39-44 - [p5]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten
, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - [i3]Ross J. Anderson, Robert Brady:
Why quantum computing is hard - and quantum cryptography is not provably secure. CoRR abs/1301.7351 (2013) - 2012
- [j28]Hyoungshick Kim, John Kit Tang, Ross J. Anderson, Cecilia Mascolo
:
Centrality prediction in dynamic human contact networks. Comput. Networks 56(3): 983-996 (2012) - [j27]Steven J. Murdoch
, Mike Bond, Ross J. Anderson:
How Certification Systems Fail: Lessons from the Ware Report. IEEE Secur. Priv. 10(6): 40-44 (2012) - [c97]Ross J. Anderson:
Security economics: a personal perspective. ACSAC 2012: 139-144 - [c96]Hyoungshick Kim, John Kit Tang, Ross J. Anderson:
Social Authentication: Harder Than It Looks. Financial Cryptography 2012: 1-15 - [c95]Joseph Bonneau, Sören Preibusch, Ross J. Anderson:
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. Financial Cryptography 2012: 25-40 - [c94]Ross J. Anderson:
Ethics Committees and IRBs: Boon, or Bane, or More Research Needed? Financial Cryptography Workshops 2012: 133-135 - [c93]Ross J. Anderson:
Protocol Governance: The Elite, or the Mob? Security Protocols Workshop 2012: 145 - [c92]Ross J. Anderson:
Protocol Governance: The Elite, or the Mob? (Transcript of Discussion). Security Protocols Workshop 2012: 146-160 - [c91]Rubin Xu, Hassen Saïdi, Ross J. Anderson:
Aurasium: Practical Policy Enforcement for Android Applications. USENIX Security Symposium 2012: 539-552 - [c90]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - [i2]Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: cloning EMV cards with the pre-play attack. CoRR abs/1209.2531 (2012) - 2011
- [c89]Ross J. Anderson:
The Dependability of Complex Socio-technical Systems. FASE 2011: 1 - [c88]Ross J. Anderson, Mike Bond, Omar Choudary
, Steven J. Murdoch
, Frank Stajano:
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. Financial Cryptography 2011: 220-234 - [c87]Ross J. Anderson:
Cryptology: Where Is the New Frontier? INDOCRYPT 2011: 160 - [c86]Shailendra Fuloria, Ross J. Anderson:
Towards a security architecture for substations. ISGT Europe 2011: 1-6 - [c85]Ross J. Anderson:
Can We Fix the Security Economics of Federated Authentication? Security Protocols Workshop 2011: 25-32 - [c84]Ross J. Anderson:
Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion). Security Protocols Workshop 2011: 33-48 - [c83]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS 2011 - [c82]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS (Springer Volume) 2011: 119-148 - 2010
- [c81]Steven J. Murdoch
, Ross J. Anderson:
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. Financial Cryptography 2010: 336-342 - [c80]Steven J. Murdoch
, Saar Drimer, Ross J. Anderson, Mike Bond:
Chip and PIN is Broken. IEEE Symposium on Security and Privacy 2010: 433-446 - [c79]Ross J. Anderson, Frank Stajano:
It's the Anthropology, Stupid! Security Protocols Workshop 2010: 127-130 - [c78]Ross J. Anderson:
It's the Anthropology, Stupid! (Transcript of Discussion). Security Protocols Workshop 2010: 131-141 - [c77]Ross J. Anderson, Shailendra Fuloria:
On the Security Economics of Electricity Metering. WEIS 2010
2000 – 2009
- 2009
- [j26]Ross J. Anderson:
Technical perspective - A chilly sense of security. Commun. ACM 52(5): 90 (2009) - [j25]Saar Drimer, Steven J. Murdoch
, Ross J. Anderson:
Failures of Tamper-Proofing in PIN Entry Devices. IEEE Secur. Priv. 7(6): 39-45 (2009) - [c76]Ross J. Anderson, Shailendra Fuloria:
Certification and Evaluation: A Security Economics Perspective. ETFA 2009: 1-7 - [c75]Saar Drimer, Steven J. Murdoch
, Ross J. Anderson:
Optimised to Fail: Card Readers for Online Banking. Financial Cryptography 2009: 184-200 - [c74]Joseph Bonneau, Jonathan Anderson
, Ross J. Anderson, Frank Stajano:
Eight friends are enough: social graph approximation via public listings. SNS 2009: 13-18 - [c73]Ross J. Anderson:
The Trust Economy of Brief Encounters. Security Protocols Workshop 2009: 282-284 - [c72]Ross J. Anderson:
The Trust Economy of Brief Encounters. Security Protocols Workshop 2009: 285-297 - [c71]Ross J. Anderson, Shailendra Fuloria:
Security Economics and Critical National Infrastructure. WEIS 2009 - [p4]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. Managing Information Risk and the Economics of Security 2009: 55-80 - 2008
- [b2]Ross J. Anderson:
Security engineering - a guide to building dependable distributed systems (2. ed.). Wiley 2008, ISBN 978-0-470-06852-6, pp. I-XL, 1-1040 - [c70]Ross J. Anderson:
Security, Functionality and Scale? DBSec 2008: 64 - [c69]Ross J. Anderson:
Information Security Economics - and Beyond. DEON 2008: 49 - [c68]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. ISSE 2008: 57-76 - [c67]Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos
, Ross J. Anderson, Jean-Pierre Hubaux:
Fast Exclusion of Errant Devices from Vehicular Networks. SECON 2008: 135-143 - [c66]Saar Drimer, Steven J. Murdoch
, Ross J. Anderson:
Thinking Inside the Box: System-Level Failures of Tamper Proofing. IEEE Symposium on Security and Privacy 2008: 281-295 - [c65]Ross J. Anderson, Steven J. Murdoch:
What Next after Anonymity? Security Protocols Workshop 2008: 220-222 - [c64]Ross J. Anderson:
What Next After Anonymity? (Transcript of Discussion). Security Protocols Workshop 2008: 223-231 - [c63]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. WEIS 2008 - 2007
- [j24]Ross J. Anderson:
Software Security: State of the Art. IEEE Secur. Priv. 5(1): 8 (2007) - [j23]Gary McGraw, Ross J. Anderson:
Silver Bullet Talks with Ross Anderson. IEEE Secur. Priv. 5(4): 10-13 (2007) - [c62]Shishir Nagaraja, Ross J. Anderson:
Dynamic Topologies for Robust Scale-Free Networks. BIOWIRE 2007: 411-426 - [c61]Ross J. Anderson, Tyler Moore:
Information Security Economics - and Beyond. CRYPTO 2007: 68-91 - [c60]Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson:
New Strategies for Revocation in Ad-Hoc Networks. ESAS 2007: 232-246 - [c59]Ross J. Anderson:
Position Statement in RFID S&P Panel: RFID and the Middleman. Financial Cryptography 2007: 46-49 - [c58]Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross J. Anderson, Ronald L. Rivest:
On the Security of the EMV Secure Messaging API (Extended Abstract). Security Protocols Workshop 2007: 147-149 - [c57]