Steven Murdoch

Last updated

Professor Steven Murdoch
Steven J Murdoch (cropped).jpg
Born
Steven James Murdoch
NationalityBritish
Alma mater University of Cambridge
Known for Tor project [1] [2]
EMV/Chip and PIN [1] [3]
Scientific career
Fields Security
Privacy
Anonymous communication [4] [5]
Chip and PIN
Europay, Master and Visa (EMV) [1]
InstitutionsComputer Science Department, University College London
Thesis Covert channel vulnerabilities in anonymity systems  (2008)
Doctoral advisor Markus Kuhn [6]
Website murdoch.is OOjs UI icon edit-ltr-progressive.svg

Steven James Murdoch FBCS FIET is Professor of Security Engineering [7] in the Computer Science Department, University College London. [7] His research covers privacy-enhancing technology, Internet censorship, [8] and anonymous communication, in particular Tor. [9] [10] He is also known for discovering several vulnerabilities in the EMV bank chipcard payment system (Chip and PIN) [1] [11] [12] [13] and for creating Tor Browser. [14] [15]

Contents

Education and career

Murdoch was educated at the University of Cambridge completing a PhD on computer security supervised by Markus Kuhn in 2008. [5] In March 2022, he joined the board of Open Rights Group. [16] [17]

Awards and honours

He is a Fellow of the British Computer Society and Fellow of the Institution of Engineering and Technology. [7] He received the 2008 ERCIM Security and Trust Management Working Group Award for his PhD thesis "Covert channel vulnerabilities in anonymity systems". [18] . In 2012 he was appointed as a Royal Society University Research Fellow. [19]

Related Research Articles

<span class="mw-page-title-main">David Chaum</span> American computer scientist and cryptographer (born 1955)

David Lee Chaum is an American computer scientist, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of digital cash. His 1982 dissertation "Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups" is the first known proposal for a blockchain protocol. Complete with the code to implement the protocol, Chaum's dissertation proposed all but one element of the blockchain later detailed in the Bitcoin whitepaper. He has been referred to as "the father of online anonymity", and "the godfather of cryptocurrency".

<span class="mw-page-title-main">Martin Hellman</span> American cryptologist (born 1945)

Martin Edward Hellman is an American cryptologist and mathematician, best known for his invention of public-key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to the computer privacy debate, and has applied risk analysis to a potential failure of nuclear deterrence.

<span class="mw-page-title-main">Onion routing</span> Technique for anonymous communication over a computer network

Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.

Markus Guenther Kuhn is a German computer scientist, currently working at the Computer Laboratory, University of Cambridge and a fellow of Wolfson College, Cambridge.

The Free Haven Project was formed in 1999 by a group of Massachusetts Institute of Technology students with the aim to develop a secure, decentralized system of data storage. The group's work led to a collaboration with the United States Naval Research Laboratory to develop Tor, funded by DARPA.

<span class="mw-page-title-main">Matt Blaze</span> American researcher

Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the Tor Project.

A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header. Commercial anonymous proxies are usually sold as VPN services.

Virgil Dorin Gligor is a Romanian-American professor of electrical and computer engineering who specializes in the research of network security and applied cryptography.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide volunteer overlay network that consists of more than seven thousand relays.

<span class="mw-page-title-main">Farinaz Koushanfar</span> Computer scientist

Farinaz Koushanfar is an Iranian-American computer scientist whose research concerns embedded systems, ad-hoc networks, and computer security. She is a professor and Henry Booker Faculty Scholar of Electrical and Computer Engineering at the University of California, San Diego.

Stephanie Forrest is an American computer scientist and director of the Biodesign Center for Biocomputing, Security and Society at the Biodesign Institute at Arizona State University. She was previously Distinguished Professor of Computer Science at the University of New Mexico in Albuquerque. She is best known for her work in adaptive systems, including genetic algorithms, computational immunology, biological modeling, automated software repair, and computer security.

<span class="mw-page-title-main">Matthew D. Green</span> American cryptographer and security technologist (born 1976)

Matthew Daniel Green is an American cryptographer and security technologist. Green is an Associate Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enhanced information storage systems, anonymous cryptocurrencies, elliptic curve crypto-systems, and satellite television piracy. He is a member of the teams that developed the Zerocoin anonymous cryptocurrency and Zerocash. He has also been influential in the development of the Zcash system. He has been involved in the groups that exposed vulnerabilities in RSA BSAFE, Speedpass and E-ZPass. Green lives in Baltimore, MD with his wife, Melissa, 2 children and 2 miniature dachshunds.

<span class="mw-page-title-main">Roger Dingledine</span> American computer scientist

Roger Dingledine is an American computer scientist known for having co-founded the Tor Project. A student of mathematics, computer science, and electrical engineering, Dingledine is also known by the pseudonym arma. As of December 2016, he continues in a leadership role with the Tor Project, as a project Leader, Director, and Research Director.

<span class="mw-page-title-main">Yuval Elovici</span>

Yuval Elovici is a computer scientist. He is a professor in the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev (BGU), where he is the incumbent of the Davide and Irene Sala Chair in Homeland Security Research. He is the director of the Cyber Security Research Center at BGU and the founder and director of the Telekom Innovation Laboratories at Ben-Gurion University. In addition to his roles at BGU, he also serves as the lab director of Singapore University of Technology and Design’s (SUTD) ST Electronics-SUTD Cyber Security Laboratory, as well as the research director of iTrust. In 2014 he co-founded Morphisec, a start-up company, that develops cyber security mechanisms related to moving target defense.

A wireless onion router is a router that uses Tor to connect securely to a network. The onion router allows the user to connect to the internet anonymously creating an anonymous connection. Tor works using an overlaid network which is free throughout the world, this overlay network is created by using numerous relay points created using volunteer which helps the user hide personal information behind layers of encrypted data like layers of an onion. Routers are being created using Raspberry Pi adding a wireless module or using its own inbuilt wireless module in the later versions.

<span class="mw-page-title-main">George Danezis</span> Computer scientist

George Danezis, FBCS is a computer scientist and Professor of Security and Privacy Engineering at the Department of Computer Science, University College London where he is part of the Information Security Research Group, and a fellow at the Alan Turing Institute. He co-founded Chainspace, a sharded smart contract platform, and was Head of Research before it was acquired by Facebook. After leaving Facebook he co-founded MystenLabs and is one of the designers of the Sui Blockchain. He currently works part-time as a Professor at University College London and as Chief Scientist at MystenLabs.

Mathias Payer is a Liechtensteinian computer scientist. His research is invested in software and system security. He is Associate Professor at the École Polytechnique Fédérale de Lausanne (EPFL) and head of the HexHive research group.

Security Controls for Computer Systems, commonly called the Ware report, is a 1970 text by Willis Ware that was foundational in the field of computer security.

IEEE Symposium on Security and Privacy also known as the Oakland Conference is an annual conference focussing on topics related to computer security and privacy. The conference was founded in 1980 by Stan Ames and George Davida and is considered to be among the top conferences in the field. The conference has a single track and follows a double-blind review process to ensure fairness during peer review.

References

  1. 1 2 3 4 Grossman, Wendy (23 August 2016). "Steven Murdoch – Privacy and Financial Security". Bentham's Gaze. UCL. Retrieved 22 January 2020.
  2. Murdoch, Steven J.; Danezis, George (2005). "Low-Cost Traffic Analysis of Tor" (PDF). 2005 IEEE Symposium on Security and Privacy (S&P'05). p. 183. doi:10.1109/SP.2005.12. ISBN   978-0-7695-2339-2. S2CID   14029551.
  3. Murdoch, Steven J.; Drimer, Saar; Anderson, Ross; Bond, Mike (2010). "Chip and PIN is Broken" (PDF). 2010 IEEE Symposium on Security and Privacy. p. 433. doi:10.1109/SP.2010.33. ISBN   978-1-4244-6894-2. S2CID   206578688.
  4. Murdoch, S. J.; Lewis, S. (2005). "Embedding Covert Channels into TCP/IP". Information Hiding. Lecture Notes in Computer Science. Vol. 3727. p. 247. CiteSeerX   10.1.1.66.1389 . doi:10.1007/11558859_19. ISBN   978-3-540-29039-1.
  5. 1 2 Murdoch, Steven James (2008). Covert channel vulnerabilities in anonymity systems (PhD thesis). University of Cambridge.
  6. Steven J. Murdoch at the Mathematics Genealogy Project OOjs UI icon edit-ltr-progressive.svg
  7. 1 2 3 "Institutional Research Information Service". University College London. Retrieved 17 January 2020.
  8. Deibert, Ronald; Palfrey, John; Rohozinski, Rafal; Zittrain, Jonathan, eds. (January 2008). Access Denied: The Practice and Policy of Global Internet Filtering. The MIT Press. p. x. ISBN   9780262541961. ...Dr. Steven Murdoch, who has gone on to become the ONI's chief technology officer. Steven's quiet and diligent manner has led to some of the ONI's more interesting findings, and he continues to spearhead the development of tools and methods that will keep our work ahead of the emerging trends.
  9. Newitz, Annalee (28 December 2006). "Your Computer is Hot -- And I Know Where You Live". Popular Science. Retrieved 22 January 2020.
  10. Gallagher, Sean (28 October 2011). "Tor Project patches critical flaw in its anonymizing network". Ars Technica. Retrieved 22 January 2020.
  11. Watts, Susan (26 February 2006). "How secure is Chip and PIN?". BBC Newsnight. Retrieved 22 January 2020.
  12. Banking security, Computer Laboratory, University of Cambridge
  13. Threat to chip-and-pin terminals, BBC News, 2 January 2010
  14. "Tor Project History". The Tor Project. Retrieved 9 April 2021.
  15. Murdoch, Steven (30 January 2008). "New Tor distribution for testing: Tor Browser Bundle". Tor Talk (Mailing list). Retrieved 9 April 2021.
  16. "Steven James Murdoch: Appointments". Companies House. 10 March 2022. Retrieved 28 September 2022.
  17. "Steven Murdoch". Open Rights Group. June 2022. Archived from the original on 28 September 2022. Retrieved 28 September 2022.
  18. "Steven J. Murdoch wins the ERCIM Security and Trust Management Working Group Award". ERCIM. 19 June 2008. Retrieved 9 April 2021.
  19. "Royal Society announces prestigious University Research Fellowships for 2012". The Royal Society. 4 October 2012. Retrieved 9 April 2021.