• Publications
  • Influence
Security engineering - a guide to building dependable distributed systems (2. ed.)
In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. Expand
Information hiding-a survey
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptibleExpand
Why information security is hard - an economic perspective
  • Ross J. Anderson
  • Computer Science
  • Seventeenth Annual Computer Security Applications…
  • 10 December 2001
The author puts forward a contrary view: information insecurity is at least as much due to perverse incentives as it is due to technical measures. Expand
On the limits of steganography
It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography. Expand
Attacks on Copyright Marking Systems
A number of attacks are presented that enable the information hidden by copyright marks and other information in digital pictures, video, audio and other multimedia objects to be removed or otherwise rendered unusable. Expand
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
A resurrecting duckling security policy model is presented, which describes secure transient association of a device with multiple serialised owners over the air in a short range wireless channel. Expand
Combining Crypto with Biometrics Effectively
The first practical and secure way to integrate the iris biometric into cryptographic applications is proposed, and an error-free key can be reproduced reliably from genuine iris codes with a 99.5 percent success rate. Expand
Serpent: A Proposal for the Advanced Encryption Standard
A new block cipher is proposed that uses S-boxes similar to those of DES in a new structure that simultaneously allows a more rapid avalanche, a more efficient bitslice implementation, and an easy analysis that enables it to be more secure than three-key triple-DES. Expand
Tamper resistance: a cautionary note
An increasing number of systems from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems -- someExpand
Optical Fault Induction Attacks
A technology to block a new class of attacks on secure microcontrollers and smartcards whereby a logical 1 or 0 is not encoded by a high or low voltage on a single line, but by (HL or (LH) on a pair of lines. Expand