Personal information

Activities

Works (14)

USB Proxy

2023-01-30 | Conference paper
Contributors: Robbie Dumitru; Mark Beaumont; Bradley Hopkins; Simon Windows
Source: check_circle
Crossref

Cross domain desktop compositor

2020-06 | Other
Contributors: Beaumont, Mark Robert
Source: Self-asserted source
Mark Beaumont

Information Associations for Multi-Domain Applications: Addressing Data Utility in Segregated Networks

ACM International Conference Proceeding Series
2019 | Conference paper
EID:

2-s2.0-85061237330

Contributors: Shield, J.; Chenoweth, S.; Prendergast, P.; Beaumont, M.; North, C.; Hopkins, B.
Source: Self-asserted source
Mark Beaumont via Scopus - Elsevier

StRAM: Measuring the trustworthiness of computer-based systems

ACM Computing Surveys
2019 | Journal article
EID:

2-s2.0-85061271144

Part of ISSN: 15577341 03600300
Contributors: Cho, J.-H.; Xu, S.; Hurley, P.M.; Mackay, M.; Benjamin, T.; Beaumont, M.
Source: Self-asserted source
Mark Beaumont via Scopus - Elsevier

The cross domain desktop compositor: Using hardware-based video compositing for a multi-level secure user interface

ACM International Conference Proceeding Series
2016 | Conference paper
EID:

2-s2.0-85007595790

Contributors: Beaumont, M.; McCarthy, J.; Murray, T.
Source: Self-asserted source
Mark Beaumont via Scopus - Elsevier

Hardware trojans - A systemic threat

Conferences in Research and Practice in Information Technology Series
2015 | Conference paper
EID:

2-s2.0-84941084773

Part of ISSN: 14451336
Contributors: Shield, J.; Hopkins, B.; Beaumont, M.; North, C.
Source: Self-asserted source
Mark Beaumont via Scopus - Elsevier

Digital video guard

2014-04 | Other
Contributors: Beaumont, Mark Robert Grant; North, Christopher James Guildford; Yiu, Kenneth Kwok-Hei; Green, Joshua David
Source: Self-asserted source
Mark Beaumont

Hardware trojan resistant computation using heterogeneous cots processors

Conferences in Research and Practice in Information Technology Series
2013 | Conference paper
EID:

2-s2.0-85003033380

Part of ISSN: 14451336
Contributors: Beaumont, M.; Hopkins, B.; Newby, T.
Source: Self-asserted source
Mark Beaumont via Scopus - Elsevier

Digital video guard

2013-10 | Other
Contributors: Beaumont, Mark Robert Grant; North, Christopher James Guildford; Yiu, Kenneth Kwok-Hei; Green, Joshua David
Source: Self-asserted source
Mark Beaumont

SAFER PATH: Security architecture using fragmented execution and replication for protection against Trojaned Hardware

Proceedings -Design, Automation and Test in Europe, DATE
2012 | Conference paper
EID:

2-s2.0-84862067232

Part of ISSN: 15301591
Contributors: Beaumont, M.; Hopkins, B.; Newby, T.
Source: Self-asserted source
Mark Beaumont via Scopus - Elsevier

Hard disk guard based policy enforcement

Proceedings - 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2011
2011 | Conference paper
EID:

2-s2.0-80052393912

Contributors: Beaumont, M.; North, C.; Hopkins, B.; Yiu, K.
Source: Self-asserted source
Mark Beaumont via Scopus - Elsevier

Hardware trojans-prevention, detection, countermeasures (a literature review)

2011 | Journal article
Contributors: Beaumont, Mark; Hopkins, Bradley; Newby, Tristan
Source: Self-asserted source
Mark Beaumont

Digital Video Guard.

2009 | Journal article
Contributors: Beaumont, Mark; North, Christopher; Green, Joshua
Source: Self-asserted source
Mark Beaumont

An overview of the annex system

Proceedings - Annual Computer Security Applications Conference, ACSAC
2007 | Conference paper
EID:

2-s2.0-48649106400

Part of ISSN: 10639527
Contributors: Grove, D.A.; Murray, T.C.; Owen, C.A.; North, C.J.; Jones, J.A.; Beaumont, M.R.; Hopkins, B.D.
Source: Self-asserted source
Mark Beaumont via Scopus - Elsevier