- [Under Review] Modelling a Ransom and Extortion Attack on Ethereum 2.0 Validators. Submitted to DBB 2022 (3rd International Conference on Deep Learning, Big Data and Blockchain). Alpesh Bhudia, Anna Cartwright, Edward Cartwright, Darren Hurley-Smith, and Julio Herhandez-Castro. (Draft copy available on request)
- Bhudia, A., O'Keeffe, D., Sgandurra, D. and Hurley-Smith, D., 2021, August. RansomClave: Ransomware Key Management using SGX. In The 16th International Conference on Availability, Reliability and Security (pp. 1-10). https://dl.acm.org/doi/abs/10.1145/3465481.3470116
- Kalbantner, J., Markantonakis, K., Hurley-Smith, D., Akram, R.N. and Semal, B., 2021. P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time. Energies 2021, 14, 606. https://search.proquest.com/openview/bef7d8df1239ff19472fb803a9fa642d/1?pq-origsite=gscholar&cbl=2032402
- Hurley-Smith, D. and Hernandez-Castro, J., 2021. Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators. In Security of Ubiquitous Computing Systems (pp. 165-181). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-030-10591-4_10
- Hurley-Smith, D., Patsakis, C. and Hernandez-Castro, J., 2020. On the unbearable lightness of FIPS 140-2 randomness tests. IEEE Transactions on Information Forensics and Security. https://ieeexplore.ieee.org/abstract/document/9069949
- Economic modeling of Ransomware: https://ramses2020.eu/wp-content/uploads/sites/3/2016/09/D4.1-Findings-on-economic-modelling-of-malware-as-a-business-model.pdf
- Software model of ransom strategies: https://ramses2020.eu/wp-content/uploads/sites/3/2019/09/D4.4-Optimal-model-system.pdf
- Analysis of cryptocurrency usage as payment in ransomware: https://ramses2020.eu/wp-content/uploads/sites/3/2019/09/D6.2-Altcoins-Alternatives-to-Bitcoin-and-their-increasing-presence-in-Malware-related-Cybercrime.pdf
- Spons & Shields: Practical Isolation for Trusted Execution, V.A. Sartakov, D. O'Keeffe, D. Eyers, L. Villanova, and P. Pietzuch, VEE 2021.
- LibSEAL: Revealing Service Integrity Violations Using Trusted Execution, P-L. Aublin, F. Kelbert, D. O'Keeffe et al, EuroSys 2018: http://www.doc.ic.ac.uk/~cp3213/files/18-eurosys-libseal.pdf
- SCONE: Secure Linux Containers with Intel SGX, S.Arnautov, B. Trach, F. Gregor, T. Knauth, A. Martin, C. Priebe, J.Lind, D. Muthukumuran, D. O'Keeffe, M. Stillwell, D. Goltzche, D. Eyers, R. Kapitza, P. Pietzuch, and C. Fetzer, USENIX OSDI 2016: https://www.usenix.org/system/files/conference/osdi16/osdi16-arnautov.pdf
-
Notifications
You must be signed in to change notification settings - Fork 0
danokeeffe/revokeproject
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published