Publications
My research papers are divided into topics of interest.
Side-channel and Fault Injection Attacks
- C. Shepherd, B. Semal, K. Markantonakis, Investigating Black-box Function Recognition Using Hardware Performance Counters, IEEE Transactions on Computers, IEEE, 2022. [View PDF]
- C. Shepherd, B. Semal, J. Kalbantner, K. Markantonakis, A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices, IEEE Transactions on Dependable and Secure Computing, 2023. [View PDF]
- C. Shepherd, K. Markantonakis, N. van Heijningen, D. Aboulkassimi, C. Gaine, T. Heckmann, D. Naccache, Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis, Computers & Security, Elsevier, 2021. [View PDF]
Trusted Execution Environments and Attestation
- C. Shepherd, K. Markontonakis, G-A. Jaloyan, LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices, IEEE Workshop on the Internet of Safe Things (SafeThings), in conjunction with IEEE Security & Privacy, IEEE, 2021.[View PDF]
- C. Shepherd, Techniques for Establishing Trust in Remote Sensing Devices Using Trusted Execution Environments, Ph.D. Thesis, Royal Holloway, University of London, 2019. [View PDF]
- C. Shepherd, R. N. Akram, K. Markantonakis, Remote Credential Management with Mutual Attestation for Trusted Execution Environments. In: O. Blazy and C. Yeun, eds. 12th IFIP Int’l Conference on Information Security Theory and Practice (WISTP ‘18), vol. 11469 of Lecture Notes in Computer Science, Springer, 2018. [View PDF]
- C. Shepherd, R. N. Akram, K. Markantonakis, EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. In: G. P. Hancke and E. Damiani, eds. 11th IFIP Int’l Conference on Information Security Theory and Practice (WISTP ‘17), vol. 10741 of Lecture Notes in Computer Science, Springer, 2017. [View PDF]
- C. Shepherd, R. N. Akram, K. Markantonakis, Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. In: 12th Int’l Conference on Availability, Reliability and Security (ARES ‘17), ACM, 2017. [View PDF]
- C. Shepherd, R. N. Akram, K. Markantonakis, Towards Trusted Execution of Multi-modal Continuous Authentication Schemes. In: Proceedings of the 32nd Symposium on Applied Computing (ACM SAC ‘17), ACM, 2017. [View PDF]
- C. Shepherd, G. Arfaoui, I. Gurulian, R. P. Lee, K. Markantonakis, R. N. Akram, D. Sauveron, E. Conchon, Secure and Trusted Execution: Past, Present and Future–A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. In: 15th IEEE Int’l Conference on Trust, Security and Privacy in Computing and Communications (TrustCom ‘16), IEEE, 2016. [View PDF]
Mobile and Internet of Things Security
- I. Gurulian, C. Shepherd, K. Markantonakis, E. Frank, R. N. Akram, K. Mayes, On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. In: 16th IEEE Int’l Conference on Trust, Security and Privacy in Computing and Communications (TrustCom ‘17), IEEE, 2017. [View PDF]
- (Invited Paper) I. Gurulian, K. Markantonakis, C. Shepherd, E. Frank, R. N. Akram, Proximity Assurances Based on Natural and Artificial Ambient Environments.
In: P. Farshim and E. Simion, Eds. 10th Int’l Conference on Innovative Security Solutions for Information Technology and Communications (SECITC ‘17), vol. 10542 of Lecture Notes in Computer Science, Springer, 2017. [View PDF]
- C. Shepherd, I. Gurulian, E. Frank, K. Markantonakis, R. N. Akram, K. Mayes, E. Panaousis, The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. In: Mobile Security Technologies, IEEE Security & Privacy Workshops, IEEE, 2017. [View PDF]
- P. Mainali and C. Shepherd, Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation, In: Proceedings of the 14th Int’l Conference on Availability, Reliability and Security (ARES ‘19), ACM, 2019. [View PDF]
- P. Mainali, C. Shepherd, F. A. P. Petitcolas, Privacy-Enhancing Context Authentication from Location-Sensitive Data, In: Proceedings of the 14th Int’l Conference on Availability, Reliability and Security (ARES ‘19), ACM, 2019. [View PDF]
- Y. Shen, C. Shepherd, C. M. Ahmed, S. Shen, X. Wu, W. Ke, S. Yu, Game-theoretic Analytics for Privacy Preservation in Internet of Things Networks: A Survey. Engineering Applications of Artificial Intelligence, Elsevier, 2024.
- Y. Shen, C. Shepherd, C. M. Ahmed, S. Shen, S. Yu, SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things. IEEE Transactions on Information Forensics and Security, IEEE, 2024.
- Y. Shen, C. Shepherd, C. M. Ahmed, S. Yu, T. Li, Comparative DQN-improved Algorithms for Stochastic Games-based Automated Edge Intelligence-enabled IoT Malware Spread-suppression Strategies. IEEE Internet of Things Journal, IEEE, 2024.
Other Work
- (Best Paper Award) V. Vagal, K. Markantonakis, C. Shepherd, A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles, Proceedings of the 40th AIAA/IEEE Digital Avionics Systems Conference (DASC), IEEE, 2021. [View PDF]
- C. Shepherd, F. A. P. Petitcolas, R. N. Akram, K. Markantonakis, An Exploratory Analysis of the Security Risks of the Internet of Things in Finance. In: J. Lopez, S. Fischer-Hübner and C. Lambrinoudakis, Eds. 14th Int’l Conference on Trust, Security and Privacy in Digital Business (TrustBus ‘17), vol. 10042 of Lecture Notes in Computer Science, Springer, 2017. [View PDF]
- R. Kirkham, C. Shepherd, T. Plotz, BlobSnake: Gamification of Feature Extraction for ‘Plug and Play’ Human Activity Recognition. In: Proceedings of the 2015 British HCI Conference, ACM, 2015. [View PDF]
- F. Hao, D. Clarke, C. Shepherd, Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. In: B. Christianson, J. Malcolm, F. Stajano, R. J. Anderson and J. Bonneau, Eds. Security Protocols XXI, vol. 8263 of Lecture Notes in Computer Science, Springer, 2013. [View PDF]