Richard Clayton's Publications
- Ben Collier, Richard Clayton:
A "sophisticated attack"? Innovation, technical sophistication, and creativity in the cybercrime ecosystem.
21st Annual Workshop on Economics and Information Security (WEIS22).
- Ben Collier, Richard Clayton, Alice Hutchings, Daniel R. Thomas:
Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture.
British Journal of Criminology. 2021 Sep;61(5):1407-1423.
- Ross Anderson, Richard Clayton, Rainer Böhme, Ben Collier:
Silicon den: Cybercrime is entrepreneurship.
20th Annual Workshop on Economics and Information Security (WEIS21).
- Ben Collier, Daniel R. Thomas, Richard Clayton, Alice Hutchings, Yi Ting Chua:
Influence, infrastructure, and recentering cybercrime policing: Evaluating emerging approaches to online law enforcement through a market for cybercrime services.
Policing and Society. 2021 Feb 10.
- Ben Collier, Richard Clayton, Alice Hutchings and Daniel Thomas:
Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies.
19th Annual Workshop on Economics and Information Security (WEIS20), Brussels, Belgium, December 14-15 2020.
- Geoffrey Simpson, Tyler Moore and Richard Clayton:
Ten years of attacks on companies using visual impersonation of domain names.
Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), Nov 2020.
- Alice Hutchings, Sergio Pastrana and Richard Clayton:
Displacing big data: How criminals cheat the system.
In: Rutger Leukfeldt and Thomas J. Holt (eds): The Human Factor of Cybercrime. Routledge, 2020.
- Alexander Vetterl, Richard Clayton:
Honware: A Virtual Honeypot Framework for Capturing CPE and IoT Zero Days.
Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), Nov 2019.
- Ben Collier, Daniel R. Thomas, Richard Clayton, Alice Hutchings:
Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks.
Proceedings of the ACM Internet Measurement Conference, Oct 2019.
- Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Carlos Ganan, Tom Grasso, Michael Levi, Tyler Moore and Marie Vasek:
Measuring the Changing Cost of Cybercrime.
18th Annual Workshop on Economics and Information Security (WEIS19), Boston MA, USA, June 3--4 2019.
- Alexander Vetterl, Richard Clayton and Ian Walden:
Counting Outdated Honeypots: Legal and Useful.
4th International Workshop on Traffic Measurements for Cybersecurity (WTMC 2019), 2019.
- Sergio Pastrana, Daniel R. Thomas, Alice Hutchings and Richard Clayton:
CrimeBB: Enabling cybercrime research on underground forums at scale.
Proceedings of the International World Wide Web Conference, 2018.
- Alexander Vetterl, Richard Clayton: Bitter Harvest:
Fingerprinting SSH Honeypots at Internet Scale.
Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT), 2018.
- Daniel R Thomas, Sergio Pastrana, Alice Hutchings, Richard Clayton, Alastair R Beresford:
Ethical issues in research using datasets of illicit origin.
Proceedings of the 2017 Internet Measurement Conference (IMC 7), November 1--3, 2017.
- Eireann Leverett, Richard Clayton, Ross Anderson:
Standardisation and Certification of the Internet of Things.
16th Annual Workshop on Economics and Information Security (WEIS17), San Diego CA, USA, June 26--27 2017.
- Alice Hutchings, Richard Clayton: Configuring Zeus:
A case study of online crime target selection and knowledge transmission.
Twelfth APWG eCrime Researchers Summit (eCrime), Scottsdale AZ, USA, April 25--27, 2017.
- Daniel R Thomas, Richard Clayton, Alastair R Beresford:
1000 days of UDP amplification DDoS attacks.
Twelfth APWG eCrime Researchers Summit (eCrime), Scottsdale AZ, USA, April 25--27, 2017.
- Alice Hutchings, Richard Clayton, Ross Anderson:
Taking down websites to prevent crime.
Eleventh APWG eCrime Researchers Summit (eCrime), Toronto, Canada, June 1--3 2016.
- Richard Clayton, Tyler Moore and Nicolas Christin:
Concentrating Correctly on Cybercrime Concentration.
Fourteenth Annual Workshop on Economics and Information Security (WEIS15), Delft, The Netherlands, June 22--23 2015.
- Tyler Moore and Richard Clayton:
Which Malware Lures Work Best? Measurements from a Large Instant Messaging Worm.
Tenth APWG eCrime Researchers Summit (eCrime), Barcelona, Spain, May 25--29 2015.
- Jens Neisius and Richard Clayton:
Orchestrated Crime: the High-Yield Investment Fraud Ecosystem.
Ninth APWG eCrime Researchers Summit (eCrime), Birmingham AL, USA, September 22--25 2014.
- Richard Clayton and Tony Mansfield:
A Study of Whois Privacy and Proxy Service Abuse.
Thirteenth Annual Workshop on Economics and Information Security (WEIS14), State College PA, USA, June 23--24 2014.
- Tyler Moore and Richard Clayton:
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites.
Eighteenth International Financial Cryptography and Data Security Conference (FC14), 3--7 March 2014, Barbados.
- Tyler Moore and Richard Clayton:
Discovering phishing dropboxes using email metadata.
Seventh APWG eCrime Researchers Summit (eCrime), Las Croabas, PR, October 2012.
- Richard Clayton:
Online traceability: who did that?
Consumer Focus, 26 July 2012, 40pp.
- Ross Anderson, Chris Barton, Rainer Boehme, Richard Clayton, Michel J.G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime.
Eleventh Annual Workshop on Economics and Information Security (WEIS12), Berlin, DE, June 25--26 2012.
- Tyler Moore, Jie Han and Richard Clayton:
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs.
Sixteenth International Financial Cryptography and Data Security Conference (FC12), Bonaire, February 27--March 2, 2012.
- Chris Hall, Ross Anderson, Richard Clayton, Evangelos Ouzounis and Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem.
Tenth Annual Workshop on Economics and Information Security (WEIS11), Fairfax VA, US, June 4--15 2011.
- Tyler Moore and Richard Clayton:
The Impact of Public Information on Phishing Attack and Defense.
Communications & Strategies, 81, 2011, pp. 45--68.
- Richard Clayton:
Might governments clean up malware?
Communications & Strategies, 81, 2011, pp. 87--104.
- Tyler Moore and Richard Clayton:
Ethical Dilemmas in Take-down Research.
Second Workshop on Ethics in Computer Security Research (WECSR 2011), St Lucia, 4 March 2011.
- Richard Clayton:
On the difficulty of counting spam sources.
Seventh Conference on Email and Anti-Spam (CEAS 2010), Redmond WA, USA, July 13--14 2010.
- Richard Clayton:
Might governments clean up malware?
Ninth Annual Workshop on Economics and Information Security (WEIS10), Cambridge MA, US, June 7--8 2010.
- Tyler Moore and Richard Clayton:
How hard can it be to measure phishing?
Mapping and Measuring Cybercrime, Oxford, UK, January 22 2010.
- Richard Clayton:
How much did shutting down McColo help?
Sixth Conference on Email and Anti-Spam (CEAS 2009), Mountain View CA, USA, July 16--17 2009.
- Tyler Moore, Richard Clayton and Ross Anderson:
The Economics of Online Crime.
Journal of Economic Perspectives, 23(3), 2009, pages 3--20.
- Richard Clayton:
Internet Multi-Homing Problems: Explanations from Economics.
Eighth Annual Workshop on Economics and Information Security (WEIS09), London, UK, June 24--25 2009.
- R.G. Clegg, M.S. Withall, A.W. Moore, I.W. Phillips, D.J. Parish, M. Rio, R. Landa, H. Haddadi, K. Kyriakopoulos, J. Auge, R. Clayton and D. Salmon:
Challenges in the capture and dissemination of measurements from high-speed networks.
IET Communications, 3(6), June 2009, pages 957--966.
- Tyler Moore, Richard Clayton and Henry Stern:
Temporal Correlations between Spam and Phishing Websites.
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET09). Boston, MA, USA, April 21, 2009.
- Tyler Moore and Richard Clayton:
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing.
In: Roger Dingledine and Philippe Golle (editors):
13th International Financial Cryptography and Data Security Conference (FC09), Barbados, February 23--26, 2009, LNCS 5628, Springer-Verlag, pp. 256--272.
- Tyler Moore and Richard Clayton:
The Consequence of Non-Cooperation in the Fight Against Phishing.
Third APWG eCrime Researchers Summit, Atlanta GA, USA, October 15--16 2008.
- Richard Clayton:
Do Zebras get more Spam than Aardvarks?
Fifth Conference on Email and Anti-Spam (CEAS 2008), Mountain View CA, USA, Aug 21--22 2008.
- Ross Anderson, Rainer Boehme, Richard Clayton, Tyler Moore:
Security Economics and European Policy.
Seventh Annual Workshop on Economics and Information Security (WEIS08), Dartmouth NH, USA, June 25--28 2008.
In: M. Eric Johnson (editor):
Managing Information Risk and the Economics of Security, pages 55--80, Springer, New York, 2008.
- Tyler Moore and Richard Clayton:
The Impact of Incentives on Notice and Take-down.
Seventh Annual Workshop on Economics and Information Security (WEIS08), Dartmouth NH, USA, June 25--28 2008.
In: M. Eric Johnson (editor):
Managing Information Risk and the Economics of Security, pages 199--223, Springer, New York, 2008.
- Frank Stajano and Richard Clayton:
Cyberdice: peer-to-peer gambling in the presence of cheaters.
In: Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe (editors):
Security Protocols XVI, 16th International Workshop, Cambridge, UK, April 2008,
volume 6615 of LNCS, pages 54-70, Springer Berlin/Heidelberg, 2011.
- Ross Anderson, Rainer Boehme, Richard Clayton, Tyler Moore:
Security Economics and the Internal Market.
European Network and Information Security Agency, January 2008.
- Tyler Moore and Richard Clayton:
Evaluating the Wisdom of Crowds in Assessing Phishing Websites.
In: Gene Tsudik (editor):
Financial Cryptography and Data Security, 12th International Financial Cryptography and Data Security Conference (FC08),
Cozumel, Mexico, January 28-31 2008, volume 5143 of LNCS,
pages 16--30, Springer Berlin/Heidelberg.
- Tyler Moore and Richard Clayton:
Examining the Impact of Website Take-Down on Phishing.
Second APWG eCrime Researchers Summit, Pittsburgh PA, USA, October 4--5 2007.
- Richard Clayton, Steven J. Murdoch and Robert N.M. Watson:
Ignoring the Great Firewall of China.
I/S A Journal of Law and Policy for the Information Society, 3(2), Fall 2007, pp: 273--298.
- Richard Clayton:
Email Traffic: a quantitative snapshot.
Fourth Conference on Email and Anti-Spam (CEAS 2007), Mountain View CA, USA, Aug 2--3 2007.
- Tyler Moore and Richard Clayton:
An Empirical Analysis of the Current State of Phishing Attack and Defence.
Sixth Annual Workshop on Economics and Information Security (WEIS07), Pittsburgh PA, USA, June 7--8 2007.
- Richard Clayton:
Can CLI be trusted?
Information Security Technical Report, Elsevier. 12(2), 2007, pages 74--79.
- George Danezis and Richard Clayton:
Introducing Traffic Analysis.
In: Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati (editors):
Digital Privacy: Theory, Technologies, and Practices, Auerbach Publications, Nov 2007.
- George Danezis and Richard Clayton:
Route Fingerprinting in Anonymous Communications.
Sixth IEEE International Conference on Peer-to-Peer Computing,
Cambridge UK, 6--8 September 2006.
- Ross Anderson, Ian Brown, Richard Clayton, Terri Dowty, Douwe Korff and Eileen Munro:
Children's Databases -- Safety and Privacy.
A report for the Information Commissioner, FIPR, August 2006
- Richard Clayton:
Using Early Results from the 'spamHINTS' Project to Estimate an ISP Abuse Team's Task.
Third Conference on Email and Anti-Spam (CEAS 2006), Mountain View CA, USA, July 28--29 2006.
- Richard Clayton:
The Rising Tide: DDoS by Defective Designs.
Second Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'06), San Jose CA, USA, 7 July 2006.
- Richard Clayton, Steven J. Murdoch and Robert N.M. Watson:
Ignoring the Great Firewall of China.
In: George Danezis and Philippe Golle (editors):
Privacy Enhancing Technologies, Sixth Workshop on Privacy Enhancing Technologies, Cambridge UK,
28--30 June 2006, volume 4258 of LNCS,
pages 20-35, Springer Berlin/Heidelberg.
- Richard Clayton:
Anonymity and Traceability in Cyberspace.
Technical Report UCAM-CL-TR-653, University of Cambridge Computer Laboratory, November 2005.
- Richard Clayton:
Stopping Outgoing Spam by Examining Incoming Server Logs.
Second Conference on Email and Anti-Spam (CEAS 2005), Stanford CA, USA, July 21--22 2005.
- Andrei Serjantov and Richard Clayton:
Modelling Incentives for Email Blocking Strategies.
Fourth Annual Workshop on Economics and Information Security (WEIS05), Boston MA, USA, June 2--3 2005.
- Richard Clayton:
Failures in a Hybrid Content Blocking System.
In: George Danezis and David Martin (editors):
Privacy Enhancing Technologies, Fifth International Workshop, PET 2005, Cavtat, Croatia,
May 30--June 1 2005, volume 3856 of LNCS,
pages 78--92, Springer Verlag.
- Richard Clayton:
Insecure Real-World Authentication Protocols (or Why Phishing is so Profitable).
Thirteenth International Workshop on Security Protocols, Cambridge, UK, April 20--22 2005.
- Richard Clayton:
Who'd phish from the summit of Kilimanjaro?
In: Andrew S. Patrick and Moti Yung (editors):
Financial Cryptography and Data Security: Ninth International Conference FC 2005, Roseau, The Commonwealth of Dominica, February 28--March 3 2005,
volume 3570 of LNCS, pages 91--92, Springer Verlag.
- Richard Clayton:
Stopping Spam by Extrusion Detection.
First Conference on Email and Anti-Spam (CEAS 2004), Mountain View CA, USA, July 30--31 2004.
- Ben Laurie and Richard Clayton:
Proof-of-Work Proves Not to Work.
Third Annual Workshop on Economics and Information Security (WEIS04), Minneapolis MN, May 13--14 2004.
- Richard Clayton:
Improving Onion Notation.
In: Roger Dingledine (editor):
Privacy Enhancing Technologies, Third International Workshop, PET 2003,
Dresden, Germany, March 26--28 2003, volume 2760 of LNCS,
pages 81--87, Springer Verlag.
- Ellis Weinberger, Richard Clayton and Ross Anderson:
A Security Policy for a Digital Repository.
National Preservation Office Journal, 11, October 2002, pages 12--13.
- Richard Clayton and George Danezis:
Chaffinch: Confidentiality in the Face of Legal Threats.
In: Fabien A. P. Petitcolas (editor):
Information Hiding Workshop (IH 2002) Noordwijkerhout, The Netherlands, October 7--9 2002,
volume 2578 of LNCS, pages 70--86, Springer Verlag.
- Richard Clayton and Mike Bond:
Experience Using a Low-Cost FPGA Design to Crack DES Keys.
In: Burton S. Kaliski Jr., Çetin K. Koç and Christof Paar (editors):
Cryptographic Hardware and Embedded Systems -- CHES 2002, Redwood Shores CA, USA, August 13--15 2002, volume 2523 of LNCS, pages 579--592, Springer Verlag.
- Richard Clayton:
Workshop Report for IPTPS'02: 1st International Workshop on Peer-to-Peer Systems.
In: Peter Druschel, Frans Kaashoek and Antony Rowstron (editors):
Peer-to-Peer Systems, IPTPS 2002, Cambridge MA, USA, March 7--8 2002, volume 2429 of LNCS, pages 1--21, Springer Verlag.
- Richard Clayton, George Danezis and Markus G. Kuhn:
Real World Patterns of Failure in Anonymity Systems.
In: Ira S. Moskowitz (editor):
Information Hiding Workshop (IH 2001) Pittsburgh PA, USA, April 25--27 2001, volume 2137 of LNCS, pages 230--244, Springer Verlag.
-
Chris Hall and Richard Clayton:
Isolation of Assembler Coding `Optimizations'.
Software Practice & Experience, 9(3), March 1979, page 248.
Return to Richard Clayton's Home Page
last modified 1 JUN 2013 -- http://www.cl.cam.ac.uk/~rnc1/publications.html