Department of Computer Science and Technology

Security Group

Academic staff

  • Ross Anderson
    security engineering, protocols, peer-to-peer systems, dependability, economics of security
  • Alastair Beresford
    security & privacy, mobile computing, programming languages
  • Markus Kuhn
    hardware and signal-processing aspects of security, positioning systems, display security, semi-structured data
  • Simon Moore
    hardware and VLSI design, asynchronous logic
  • Larry Paulson
    protocol verification, formal methods
  • Frank Stajano
    frauds and scams, eliminating passwords (pico), security and human factors, security usability, ubiquitous computing
  • Robert Watson
    operating systems, capability systems, network stacks, CPU security models, I/O security, tracing

Post-doctoral and post-graduate researchers

Visitors

  • Mike Bond
  • Brooks Davis (SRI International)
    capability systems, operating systems
  • Ben Laurie (Google)
    capability systems, cryptographic protocols, various security and privacy topics (blog)
  • Ed Maste (FreeBSD Foundation)
  • Steven Murdoch (University College London)
    covert channels, anonymous communication, traffic analysis
  • Peter Neumann (SRI International)
  • George Neville-Neil
    operating systems, networking, time, code spelunking
  • Andrew Turner (FreeBSD Foundation)

Research students

  • Khaled Baqer (Anderson)
    mobile payment, digital currencies, anonymity systems
  • Lawrence Esswood (Watson)
    capability-based protection, control-flow integrity, language security
  • Ilias Marinos (Watson)
    program analysis and transformation for security, clean-slate I/O
  • Alfredo Mazzinghi (Watson)
    capability-based security, kernel memory protection, program analysis
  • Christian O'Connell (Kuhn)
    eavesdropping, compromising emanations, hardware security
  • Alex Richardson (Watson)
    capability-based security, persistent memory, program analysis
  • Ilia Shumailov (Anderson)
    authentication under pervasive surveillance
  • Domagoj Stolfa (Watson)
    tracing, distributed systems, capability systems
  • Alexander Vetterl (Clayton/Anderson)
    Cybercrime, IoT, honeypot architectures, intrusion detection systems
  • Bjoern A. Zeeb (A. Moore/Watson)
    operating systems, network stacks, microarchitectural simulation

The entire group, along with other members of the department and nearby research labs with related interests, are on the cl-security-research mailing list. For individual contact details, see also the Laboratory’s list of all members. A list of former members is available.

group photo
July 2014

Past group photos: 2012, 2008, 2000, 1997.