User profiles for S. Murdoch

Steven J. Murdoch

Department of Computer Science, University College London
Verified email at ucl.ac.uk
Cited by 6070

[HTML][HTML] Polybacterial human disease: the ills of social networking

FL Short, SL Murdoch, RP Ryan - Trends in microbiology, 2014 - cell.com
… The enzyme responsible for AI-2 synthesis is LuxS, which is also involved in central
metabolism through a pathway responsible for recycling S-adenosyl methionine. AI-2 acts as an …

Early nutrition and later physical work capacity

JD Haas, S Murdoch, J Rivera, R Martorell - Nutrition reviews, 1996 - search.proquest.com
Murdoch is former Research Associate at the Division of Nutritional Science, Cornell
University, Ithaca NY 14853, USA; Dr. Rivera is Director of Nutrition and Health at the National …

Low-cost traffic analysis of Tor

SJ Murdoch, G Danezis - … on Security and Privacy (S&P'05), 2005 - ieeexplore.ieee.org
… When designing such a cover traffic strategy it is also important to keep in mind Wei Dai’s
attack [… measurement of the node’s load. Two strategies could be employed to protect Tor: per- …

Mutations in NALP7 cause recurrent hydatidiform moles and reproductive wastage in humans

S Murdoch, U Djuric, B Mazhar, M Seoud, R Khan… - Nature …, 2006 - nature.com
Hydatidiform mole (HM) is an abnormal human pregnancy with no embryo and cystic
degeneration of placental villi. We report five mutations in the maternal gene NALP7 in individuals …

Embedding covert channels into TCP/IP

SJ Murdoch, S Lewis - International Workshop on Information Hiding, 2005 - Springer
… packets originating from a machine within Walter’s network. She wants to leak a message to
… However, the normal state of DF can be predicted from the packet’s context, so the warden …

CHERI: A hybrid capability-system architecture for scalable software compartmentalization

…, SJ Murdoch, R Norton, M Roe, S Son… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
… Capsicum’s capability mode or Joe-E’s statically checkable language subset). Finally, some
form of escalation mechanism is required – object-capability invocation – to allow protected …

Intensive care sedation: a review of current British practice

S Murdoch, A Cohen - Intensive care medicine, 2000 - Springer
Objective: Sedation is central to the management of intensive care patients. Many different
techniques have been tried, all have potential side effects, and some have been associated …

[PDF][PDF] Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks.

S Drimer, SJ Murdoch - USENIX security symposium, 2007 - usenix.org
… The data to and from Dave’s terminal is relayed to the restaurant’s counterfeit terminal such
that the diamond purchasing transaction is placed on Alice’s card. The PIN entered by Alice …

Hot or not: Revealing hidden services by their clock skew

SJ Murdoch - Proceedings of the 13th ACM conference on Computer …, 2006 - dl.acm.org
… the case, and so he has found the hidden server’s IP address. Another attack against Tor,
but not hidden services per se, is described by Murdoch and Danezis [33]. The victim visits an …

Ignoring the great firewall of china

R Clayton, SJ Murdoch, RNM Watson - International Workshop on Privacy …, 2006 - Springer
… If we had been using FreeBSD’s ipfw the command would have been: … Further experiments
showed that the firewall’s blocking was somewhat more complex than we have explained so …