Publications
Publications
- Pantelimon George Popescu and Marios O.~Choudary,
Refinement of Massey Inequality,
In IEEE International Symposium on Information Theory (ISIT) 2019.
- Sergiu Costea, Marios Choudary, Doru Gucea, Bjoern Tackmann and Costin Raiciu.
Secure Opportunistic Multipath Key Exchange,
ACM Conference on Computer and Communications Security (CCS) 2018.
PDF.
Slides.
- Marios O. Choudary and Markus G. Kuhn.
Efficient, Portable Template Attacks,
IEEE Transactions on Information Forensics and Security 13 (2), pp. 490-501, 2018.
PDF.
- Marios O. Choudary and Pantelimon George Popescu.
Back to Massey: Impressively fast, scalable and tight security evaluation tools,
CHES 2017.
PDF.
Slides.
Presentation video.
- Sergiu Costea and Marios O. Choudary and Costin Raiciu.
Security from Disjoint Paths: Is It Possible?,
Security Protocols Workshop 2017.
- Marios O. Choudary and Romain Poussier and FX Standaert.
Score-Based vs. Probability-Based Enumeration–A Cautionary Note,
Indocrypt 2016.
PDF.
- Marios O. Choudary.
Efficient multivariate statistical techniques for extracting secrets from electronic devices,
PhD Thesis, University of Cambridge.
PDF.
- Mike Bond and Marios O. Choudary and Steve J. Murdoch and Sergei Skorobogatov and Ross Anderson
Be prepared: The EMV preplay attack,
IEEE Security & Privacy 13 (2), 56-64.
- Omar Choudary and Markus G. Kuhn.
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits,
CARDIS 2014, Paris, 5-7 November 2014.
PDF.
Slides.
- Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov
and Ross Anderson,
Chip and Skim: cloning EMV cards with the pre-play attack,
IEEE Symposium on Security and Privacy, 18-21 May 2014, San Jose, CA.
PDF.
Slides.
- Omar Choudary and Markus G. Kuhn.
Template Attacks on Different Devices,
COSADE 2014, Paris, 14-15 April 2014.
PDF.
Slides.
- Omar Choudary and Markus G. Kuhn.
Efficient Template Attacks,
CARDIS 2013, Berlin, 27-29 November 2013.
PDF.
Slides.
- Omar Choudary and Felix Grobert and Joachim Metz.
Security Analysis and Decryption of Filevault 2,
in Advances in Digital Forensics IX,
IFIP Advances in Information and Communication Technology 410,
2013, pp 349--363.
Available also as Cryptology ePrint Archive, Report 2012/374. 2012.
PDF.
- Omar Choudary and Frank Stajano.
Make noise and whisper: a solution to relay attacks,
International Workshop on Security Protocols, March 2011, Cambridge UK.
Springer Lecture Notes in Computer Science, vol. 7114.
PDF.
- Ross Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch and Frank Stajano.
Might Financial Cryptography Kill Financial Innovation? – The Curious Case of EMV,
Financial Cryptography and Data Security '11, February 2011, St. Lucia.
Springer Lecture Notes in Computer Science, vol. 7035.
PDF.
- Omar Choudary, David Miller. NAT implementation for the NetFPGA platform,
1st European NetFPGA Developers Workshop 2010, Cambridge, UK.
PDF.
- Omar Choudary, The Smart Card Detective: a hand-held EMV interceptor.
MPhil thesis at University of Cambridge, 2010.
Technical Report UCAM-CL-TR-827.
PDF.
- O. Choudary, V. Charvillat, R. Grigoras, P. Gurdjos, MARCH: Mobile Augmenting Reality for
Cultural Heritage, Proceeding of the 17th ACM international conference on Multimedia, 2009,
1023–1024.PDF.
- O. Choudary, B.Baccot, R. Grigoras, V. Charvillat, Evaluation of Multimedia Features in
Mobile Guide Applications, in Journal of Digital Information Management, April 2010.
PDF.
- B.Baccot, O. Choudary, R. Grigoras, V. Charvillat, On the Impact of Sequence and Time in
Rich Media Advertising, Proceeding of the 17th ACM international conference on Multimedia,
2009, 849–852.PDF.
- O. Choudary, B. Baccot, R. Grigoras, V. Charvillat, A User Study on Rich Media Mobile
Guide Applications, 9th Workshop on Multimedia Metadata (WMM’09), 2009, vol.441.
http://ceur-ws.org/Vol-441/.PDF.
- O. Choudary, V. Charvillat, R. Grigoras, Mobile Guide Applications Using Representative
Visualizations, Proceeding of the 16th ACM international conference on Multimedia, 2008,
901–904.PDF.
Other articles
- Bluespec implementation of AES2. PDF
- Breaking Smartcards. PDF