| 2008 |
| 10 | EE | Saar Drimer,
Steven J. Murdoch,
Ross Anderson:
Thinking Inside the Box: System-Level Failures of Tamper Proofing.
IEEE Symposium on Security and Privacy 2008: 281-295 |
| 9 | EE | Steven J. Murdoch,
Robert N. M. Watson:
Metrics for Security and Performance in Low-Latency Anonymity Systems.
Privacy Enhancing Technologies 2008: 115-132 |
| 8 | EE | Sebastian Zander,
Steven J. Murdoch:
An Improved Clock-skew Measurement Technique for Revealing Hidden Services.
USENIX Security Symposium 2008: 211-226 |
| 2007 |
| 7 | EE | Steven J. Murdoch,
Piotr Zielinski:
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries.
Privacy Enhancing Technologies 2007: 167-183 |
| 2006 |
| 6 | EE | Steven J. Murdoch:
Hot or not: revealing hidden services by their clock skew.
ACM Conference on Computer and Communications Security 2006: 27-36 |
| 5 | EE | Richard Clayton,
Steven J. Murdoch,
Robert N. M. Watson:
Ignoring the Great Firewall of China.
Privacy Enhancing Technologies 2006: 20-35 |
| 2005 |
| 4 | EE | Steven J. Murdoch,
George Danezis:
Low-Cost Traffic Analysis of Tor.
IEEE Symposium on Security and Privacy 2005: 183-195 |
| 3 | EE | Steven J. Murdoch,
Stephen Lewis:
Embedding Covert Channels into TCP/IP.
Information Hiding 2005: 247-261 |
| 2 | EE | Andrei Serjantov,
Steven J. Murdoch:
Message Splitting Against the Partial Adversary.
Privacy Enhancing Technologies 2005: 26-39 |
| 2004 |
| 1 | EE | Steven J. Murdoch,
Piotr Zielinski:
Covert Channels for Collusion in Online Computer Games.
Information Hiding 2004: 355-370 |