Dr Tom Chothia

Dr Tom Chothia

School of Computer Science
Reader

Contact details

Address
School of Computer Science
University of Birmingham
Edgbaston
Birmingham
B15 2TT
UK

Dr Tom Chothia is a Senior Lecturer in Cyber Security for the School of Computer Science at the University of Birmingham. His research involves the development of new mathematical analysis, and the application of these techniques to cyber security problems.

For more information, please see Tom's homepage.

Publications

Recent publications

Chapter

Chothia, T, Novakovic, C, Radu, AI & Thomas, RJ 2019, Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11345 LNCS, Springer Verlag, pp. 141-172. https://doi.org/10.1007/978-3-662-59351-6_12

Conference contribution

Thomas, RJ, Chothia, T & Ordean, M 2022, Cyber Security in the Rail Sector - An Integrated Approach. in World Congress on Rail Research.

Thomas, RJ, Gardiner, J, Chothia, T, Samanis, E, Perrett, J & Rashid, A 2020, Catch me if you can: an in-depth study of CVE discovery time and inconsistencies for managing risks in critical infrastructures. in CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy. Association for Computing Machinery (ACM), pp. 49-60, CPSIOTSec: The Joint Workshop on CPS & IoT Security and Privacy, 9/11/20. https://doi.org/10.1145/3411498.3419970

Thomas, RJ & Chothia, T 2020, Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems. in S Katsikas, F Cuppens, N Cuppens, C Lambrinoudakis, C Kalloniatis, J Mylopoulos, A Antón, S Gritzalis, W Meng & S Furnell (eds), Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, 2020, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12501 LNCS, Springer, pp. 100-116, 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and 3rd International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in conjunction with 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, United Kingdom, 14/09/20. https://doi.org/10.1007/978-3-030-64330-0_7

Singh, RR, Moreira-Sanchez, J, Chothia, T & Ryan, M 2020, Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties. in STM 2020: Security and Trust Management . Springer, pp. 3. https://doi.org/10.1007/978-3-030-59817-4_1

Chothia, T 2020, Security Analysis and Implementation of Relay-Resistant Contactless Payments. in The ACM Conference on Computer and Communications Security (CCS). pp. 879. https://doi.org/10.1145/3372297.3417235

Boureanu, I, Chothia, T, Debant, A & Delaune, S 2020, Security Analysis and Implementation of Relay-Resistant Contactless Payments. in CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery , pp. 879-898, 27th ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, Virtual, Online, United States, 9/11/20. https://doi.org/10.1145/3372297.3417235

Vasile, S, Oswald, D & Chothia, T 2019, Breaking all the things: a systematic survey of firmware extraction and modification techniques for IoT devices. in CARDIS 2018: Smart Card Research and Advanced Applications. Lecture Notes in Computer Science, Springer, pp. 171-185, 17th Smart Card Research and Advanced Application Conference, Montpellier, France, 12/11/18. https://doi.org/10.1007/978-3-030-15462-2_12

Chothia, T, Boureanu, I & Chen, L 2019, Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers. in I Goldberg & T Moore (eds), Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11598 LNCS, Springer Vieweg, pp. 222-233, 23rd International Conference on Financial Cryptography and Data Security, FC 2019, St. Kitts, Saint Kitts and Nevis, 18/02/19. https://doi.org/10.1007/978-3-030-32101-7_14

Chothia, T, Boureanu, I & Chen, L 2019, Short paper: making contactless EMV robust against rogue readers colluding with relay attackers. in Proceedings of the 23rd International Conference on Financial Cryptography and Data Security (FC'19). 23rd International Conference on Financial Cryptography and Data Security (FC'19), St. Kitts, Saint Kitts and Nevis, 18/02/19. <https://fc19.ifca.ai/program.html>

Ge, Q, Yarom, Y, Chothia, T & Heiser, G 2019, Time protection: the missing OS abstraction. in EuroSys '19: Proceedings of the Fourteenth EuroSys Conference 2019., 1, Association for Computing Machinery (ACM), pp. 1-17, 14th European Conference on Computer Systems (EuroSys 2019), Dresden, Germany, 25/03/19. https://doi.org/10.1145/3302424.3303976

Alruhaily, N, Chothia, T & Bordbar, B 2018, A better understanding of machine learning malware misclassifcation. in P Mori, S Furnell & O Camp (eds), Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Communications in Computer and Information Science, vol. 867, Springer Verlag, pp. 35-58, 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, 19/02/17. https://doi.org/10.1007/978-3-319-93354-2_3

Chothia, T, McMahon Stone, C & De Ruiter, J 2018, Extending Automated Protocol State Learning for the 802.11 4-Way Handshake. in J Lopez, J Zhou & M Soriano (eds), Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I. 1 edn, Lecture Notes in Computer Science, vol. 11098, Springer, pp. 325-345, 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, 3/09/18. https://doi.org/10.1007/978-3-319-99073-6_16

Chothia, T, De Ruiter, J & Smyth, B 2018, Modelling and analysis of a hierarchy of distance bounding attacks. in Usenix Security '18. USENIX Association, 27th USENIX Security Symposium, Baltimore, Maryland, United States, 15/08/18.

Paper

Chothia, T, Paiu, SI & Oultram, M 2018, 'Phishing attacks: Learning by doing', Paper presented at 2018 USENIX Workshop on Advances in Security Education, ASE 2018, co-located with USENIX Security 2018, Baltimore, 13/08/18.

View all publications in research portal