Department of Computer Science and Technology

Security Group

Academic staff

  • Ross Anderson
    security engineering, protocols, peer-to-peer systems, dependability, economics of security
  • Alastair Beresford
    security & privacy, mobile computing, programming languages
  • Markus Kuhn
    hardware and signal-processing aspects of security, positioning systems, display security, semi-structured data
  • Simon Moore
    hardware and VLSI design, asynchronous logic
  • Larry Paulson
    protocol verification, formal methods
  • Frank Stajano
    security and human factors, usability, authentication, Pico, scams, privacy, cyber security education (Inter-ACE and C2C)
  • Robert Watson
    operating systems, capability systems, network stacks, CPU security models, I/O security, tracing

Post-doctoral and post-graduate researchers

  • Ruslan Bukin
    embedded systems, operating systems
  • David Chisnall
    domain and problem-specific languages, compiler architecture, hardware and human influence on language design
  • Richard Clayton
    traceability, distributed denial of service, spam, phish
  • Franck Courbon
    hardware security
  • Khilan Gudka
    programming models, software compartmentalisation, compilers/runtimes, static/dynamic program analysis, capability systems, concurrency
  • Alice Hutchings
  • Graeme Jenkinson
    distributed tracing for security, usable security
  • Paul Leyland
    cybercrime, cryptography, computational number theory
  • David Modic
    psychology of scams
  • Sergio Pastrana
    cybercrime
  • Michael Roe
    capability systems, cryptographic protocols, formal methods
  • Sergei Skorobogatov
    hardware security of microcontrollers, smartcards, FPGAs, ASICs and secure memory ICs, tamper resistance
  • Daniel R. Thomas
    cybercrime, mobile security, cryptography, secure updates
  • Sven Uebelacker
    cybercrime

Visitors

  • Mike Bond
  • Brooks Davis (SRI International)
    capability systems, operating systems
  • Ben Laurie (Google)
    capability systems, cryptographic protocols, various security and privacy topics (blog)
  • Ed Maste (FreeBSD Foundation)
  • Steven Murdoch (University College London)
    covert channels, anonymous communication, traffic analysis
  • Peter Neumann (SRI International)
  • George Neville-Neil
    operating systems, networking, time, code spelunking
  • Andrew Turner (FreeBSD Foundation)

Research students

  • Khaled Baqer (Anderson)
    mobile payment, digital currencies, anonymity systems
  • Lawrence Esswood (Watson)
    capability-based protection, control-flow integrity, language security
  • Ilias Marinos (Watson)
    program analysis and transformation for security, clean-slate I/O
  • Alfredo Mazzinghi (Watson)
    capability-based security, kernel memory protection, program analysis
  • Christian O'Connell (Kuhn)
    eavesdropping, compromising emanations, hardware security
  • Alex Richardson (Watson)
    capability-based security, persistent memory, program analysis
  • Ilia Shumailov (Anderson)
    authentication under pervasive surveillance
  • Domagoj Stolfa (Watson)
    tracing, distributed systems, capability systems
  • Alexander Vetterl (Clayton/Anderson)
    Cybercrime, IoT, honeypot architectures, intrusion detection systems
  • Bjoern A. Zeeb (A. Moore/Watson)
    operating systems, network stacks, microarchitectural simulation

The entire group, along with other members of the department and nearby research labs with related interests, are on the cl-security-research mailing list. For individual contact details, see also the Laboratory’s list of all members. A list of former members is available.

group photo
July 2014

Past group photos: 2012, 2008, 2000, 1997.