Skip to main content

Showing 1–8 of 8 results for author: Aspinall, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.03484  [pdf, other

    cs.CR cs.SE

    Towards Interdependent Safety Security Assessments using Bowties

    Authors: Luca Arnaboldi, David Aspinall

    Abstract: We present a way to combine security and safety assessments using Bowtie Diagrams. Bowties model both the causes leading up to a central failure event and consequences which arise from that event, as well as barriers which impede events. Bowties have previously been used separately for security and safety assessments, but we suggest that a unified treatment in a single model can elegantly capture… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

  2. arXiv:2011.06350  [pdf, other

    cs.CR

    Traffic Generation using Containerization for Machine Learning

    Authors: Henry Clausen, Robert Flood, David Aspinall

    Abstract: The design and evaluation of data-driven network intrusion detection methods are currently held back by a lack of adequate data, both in terms of benign and attack traffic. Existing datasets are mostly gathered in isolated lab environments containing virtual machines, to both offer more control over the computer interactions and prevent any malicious code from esca**. This procedure however lead… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: This work was presented at the ACSAC DYNAMICS '19: DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security Workshop in December 09-10, 2019, San Juan, PR, and will be published in the corresponding workshop proceedings. This document version is specifically for publication on arXiv. 12 pages, 7 figures

  3. arXiv:1805.12482  [pdf, ps, other

    cs.CR

    How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

    Authors: David Butler, David Aspinall, Adria Gascon

    Abstract: In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while kee** their inputs private. Recent breakthroughs are bringing MPC into practice, solving fundamental challenges for secure distributed computation. Just as with classic protocols for encryption and key exchange, precise guarantees are needed for MPC designs and implementations;… ▽ More

    Submitted 31 May, 2018; originally announced May 2018.

  4. arXiv:1612.07586  [pdf, other

    cs.CR cs.PL cs.SE

    DroidGen: Constraint-based and Data-Driven Policy Generation for Android

    Authors: Mohamed Nassim Seghir, David Aspinall

    Abstract: We present DroidGen a tool for automatic anti-malware policy inference. DroidGen employs a data-driven approach: it uses a training set of malware and benign applications and makes call to a constraint solver to generate a policy under which a maximum of malware is excluded and a maximum of benign applications is allowed. Preliminary results are encouraging. We are able to automatically generate a… ▽ More

    Submitted 22 December, 2016; originally announced December 2016.

  5. arXiv:1507.04578  [pdf, other

    cs.CY

    Accessible Banking: Experiences and Future Directions

    Authors: Bela Gor, David Aspinall

    Abstract: This is a short position paper drawing on experience working with the UK banking industry and their disabled and ageing customers in the Business Disability Forum, a UK non-profit member organisation funded by a large body of UK private and public sector businesses. We describe some commonly reported problems of disabled customers who use modern banking technologies, relating them to UK law and be… ▽ More

    Submitted 16 July, 2015; originally announced July 2015.

    Comments: 3 pages, presented at Workshop on Inclusive Privacy and Security (WIPS): Privacy and Security for Everyone, Anytime, Anywhere, held as part of Symposium on Usable Privacy and Security (SOUPS) 2015, July 22-24, 2015, Ottawa, Canada

    ACM Class: H.1.2; K.4.2

  6. arXiv:1410.7743  [pdf

    cs.CR

    Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors

    Authors: Hilmi Gunes Kayacik, Mike Just, Lynne Baillie, David Aspinall, Nicholas Micallef

    Abstract: We propose a lightweight, and temporally and spatially aware user behaviour modelling technique for sensor-based authentication. Operating in the background, our data driven technique compares current behaviour with a user profile. If the behaviour deviates sufficiently from the established norm, actions such as explicit authentication can be triggered. To support a quick and lightweight deploymen… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.longhoe.net/abs/1410.6674)

    Report number: MoST/2014/01

  7. arXiv:1404.6186  [pdf, other

    cs.LO

    ProofPeer: Collaborative Theorem Proving

    Authors: Steven Obua, Jacques Fleuriot, Phil Scott, David Aspinall

    Abstract: We define the concept of collaborative theorem proving and outline our plan to make it a reality. We believe that a successful implementation of collaborative theorem proving is a necessary prerequisite for the formal verification of large systems.

    Submitted 24 April, 2014; originally announced April 2014.

  8. arXiv:1307.2713  [pdf, other

    cs.LO

    Capturing Hiproofs in HOL Light

    Authors: Steven Obua, Mark Adams, David Aspinall

    Abstract: Hierarchical proof trees (hiproofs for short) add structure to ordinary proof trees, by allowing portions of trees to be hierarchically nested. The additional structure can be used to abstract away from details, or to label particular portions to explain their purpose. In this paper we present two complementary methods for capturing hiproofs in HOL Light, along with a tool to produce web-based vis… ▽ More

    Submitted 10 July, 2013; originally announced July 2013.