Follow
Chris Novakovic
Chris Novakovic
Department of Computing, Imperial College London
Verified email at imperial.ac.uk - Homepage
Title
Cited by
Cited by
Year
An offline capture the {Flag-Style} virtual machine and an assessment of its value for cybersecurity education
T Chothia, C Novakovic
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
77*2015
Leakwatch: Estimating information leakage from java programs
T Chothia, Y Kawamoto, C Novakovic
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
702014
A tool for estimating information leakage
T Chothia, Y Kawamoto, C Novakovic
International Conference on Computer Aided Verification, 690-695, 2013
632013
Probabilistic point-to-point information leakage
T Chothia, Y Kawamoto, C Novakovic, D Parker
2013 IEEE 26th Computer Security Foundations Symposium, 193-205, 2013
392013
BrowserAudit: automated testing of browser security features
C Hothersall-Thomas, S Maffeis, C Novakovic
Proceedings of the 2015 international symposium on software testing and …, 2015
192015
The unbearable lightness of monitoring: Direct monitoring in BitTorrent
T Chothia, M Cova, C Novakovic, CG Toro
Security and Privacy in Communication Networks: 8th International ICST …, 2013
122013
An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education. 2015 USENIX Summit on Gaming
T Chothia, C Novakovic
Games, and Gamification in Security Education (3GSE 15), 2015
112015
Software adaptation for an unmanned undersea vehicle
A Pfeffer, C Wu, G Fry, K Lu, S Marotta, M Reposa, Y Shi, TKS Kumar, ...
IEEE Software 36 (2), 91-96, 2019
102019
Choose your pwn adventure: Adding competition and storytelling to an introductory cybersecurity course
T Chothia, C Novakovic, AI Radu, RJ Thomas
Transactions on Edutainment XV, 141-172, 2019
92019
LeakWatch
T Chothia, Y Kawamoto, C Novakovic
3
Automated formal analysis of side-channel attacks on probabilistic systems
C Novakovic, D Parker
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
12019
Automatically calculating quantitative integrity measures for imperative programs
T Chothia, C Novakovic, RR Singh
International Workshop on Data Privacy Management, 250-265, 2014
12014
Calculating Quantitative Integrity and Secrecy for Imperative Programs
T Chothia, C Novakovic, RR Singh
International Journal of Secure Software Engineering (IJSSE) 6 (2), 23-46, 2015
2015
Confidence Interval of Estimated Min-Entropy Leakage
T Chothia, Y Kawamoto, C Novakovic
2013
BrowserAudit: Automated Testing of Browser Security Features
S Maffeis, C Novakovic
User Manual for leakiEst v. 1.4–a Tool for Estimating Information Leakage
T Chothia, Y Kawamoto, C Novakovic
統計的手法によるプログラムの定量的情報流解析
T Chothia, Y Kawamoto, C Novakovic
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION
T Chothia, C Novakovic
The system can't perform the operation now. Try again later.
Articles 1–18