Security Group
Academic staff
- Alastair Beresford
security & privacy, mobile computing, programming languages - Alice Hutchings
cybercrime, underground markets, crime prevention, ethics - Martin Kleppmann
decentralisation, local-first collaboration software, distributed systems security - Markus Kuhn
hardware and signal-processing aspects of security, positioning systems, display security, semi-structured data - Simon Moore
hardware and VLSI design, asynchronous logic - Larry Paulson
protocol verification, formal methods - Frank Stajano
security and human factors, usability, authentication, Pico, scams, privacy, cyber security education (Inter-ACE and C2C) - Robert Watson
operating systems, capability systems, network stacks, CPU security models, I/O security, tracing
Post-doctoral and post-graduate researchers
- Ruslan Bukin
embedded systems, operating systems - Richard Clayton
traceability, distributed denial of service, spam, phish - Hridoy Dutta
cybercrime - Lawrence Esswood (Watson)
capability-based protection, control-flow integrity, language security - Daniel Hugenroth (Beresford)
mobile systems, cybersecurity - Jack Hughes (Hutchings)
cybercrime, cybersecurity - Yanna Papadodimitraki
cybercrime - Alex Richardson (Watson)
capability-based security, persistent memory, program analysis - Michael Roe
capability systems, cryptographic protocols, formal methods
CHERI project RAs: Edward Napierala, Allison Randal, Konrad Witaszczyk, Alfredo Mazzinghi, Alex Richardson, Andrew Turner
Visitors
- John Baldwin
- David Chisnall
domain and problem-specific languages, compiler architecture, hardware and human influence on language design - Yi Ting Chua
cybercrime, social network analysis, online communities - Ben Collier
cybercrime, science and technology studies, theoretical criminology, quantitative and qualitative research methods - Brooks Davis (SRI International)
capability systems, operating systems - Li-Wen Hsu
operating systems, tracing - Nathaniel Filardo
CHERI - Ben Laurie
(Google)
capability systems, cryptographic protocols, various security and privacy topics (blog) - Ed Maste (FreeBSD Foundation)
- Steven Murdoch (University College London)
covert channels, anonymous communication, traffic analysis - Peter Neumann
(SRI International)
- George Neville-Neil
operating systems, networking, time, code spelunking - Daniel Thomas (Strathclyde)
- Shih-Chun You (Kuhn)
side-channel analysis, template attacks - Bjoern A. Zeeb
operating systems, network stacks, microarchitectural simulation
Research students
- Rosie Baish (Watson)
CHERI - Peter Blandford-Baker (Watson)
- Jenny Blessing (Beresford/Anderson)
IoT vulnerabilities - Nicholas Boucher (Anderson)
homomorphic encryption, election integrity, adversarial machine learning - Jessica Clarke (Watson)
- Luis A. Saavedra del Toro (Beresford)
privacy, mobile ecosystems, cybercrime - Dimitrije Erdeljan (Kuhn)
emission security - Michael Christian Fink Amores (Beresford)
- Dapeng Gao (Watson)
- David Khachaturov (Mullins/Anderson)
automated security analysis - Ceren Kocaoğullar (Beresford)
distributed systems security, anonymity networks, privacy - Tina Marjanov
stolen data in underground marketplaces - Alfredo Mazzinghi (Watson)
capability-based security, kernel memory protection, program analysis - Chun-Yu “Eric” Peng (Kuhn)
side-channel analysis, post-quantum cryptography - Anna Talas (Hutchings)
- Luis A. Saavedra del Toro (Beresford)
privacy, mobile ecosystems, cybercrime - Jose Gilberto Atondo Siu (Hutchings)
- Domagoj Stolfa (Watson)
tracing, distributed systems, capability systems - Kieron Ivy Turk (Hutchings)
- Anh Viet Vu (Hutchings)
- Chunlu “Raymond” Wang (Hutchings/Caines)
hate speech detection
The entire group, along with other members of the department and nearby research labs with related interests, are on the cl-security-research mailing list. For individual contact details, see also the Laboratory’s list of all members. A list of former members is available.
Past group photos: 2019, 2018, 2014, 2012, 2008, 2000, 1997.