Computer Laboratory

Security Group

Academic staff

  • Ross Anderson
    security engineering, protocols, peer-to-peer systems, dependability, economics of security
  • Alastair Beresford
    security & privacy, mobile computing, programming languages
  • John Daugman
    biometric identification
  • Markus Kuhn
    hardware and signal-processing aspects of security, positioning systems, display security, semi-structured data
  • Andrew Moore
  • Simon Moore
    hardware and VLSI design, asynchronous logic
  • Steven Murdoch
    covert channels, anonymous communication, traffic analysis
  • Larry Paulson
    protocol verification, formal methods
  • Frank Stajano
    frauds and scams, eliminating passwords (pico), security and human factors, security usability, ubiquitous computing
  • Robert Watson
    operating systems, capability systems, network stacks, CPU security models, I/O security, tracing

Post-doctoral and post-graduate researchers

  • Ruslan Bukin
    embedded systems, operating systems
  • David Chisnall
    domain and problem-specific languages, compiler architecture, hardware and human influence on language design
  • Richard Clayton
    traceability, distributed denial of service, spam, phish
  • Franck Courbon
    hardware security
  • Khilan Gudka
    programming models, software compartmentalisation, compilers/runtimes, static/dynamic program analysis, capability systems, concurrency
  • Alice Hutchings
  • Graeme Jenkinson
    distributed tracing for security, usable security
  • Paul Leyland
    cybercrime, cryptography, computational number theory
  • David Llewellyn-Jones
    Pico project
  • David Modic
    psychology of scams
  • Julia Powles
    legal aspects of cybercrime data sharing
  • Michael Roe
    capability systems, cryptographic protocols, formal methods
  • Sergei Skorobogatov
    hardware security of microcontrollers, smartcards, FPGAs, ASICs and secure memory ICs, tamper resistance
  • Daniel Thomas
    cybercrime, mobile security, cryptography, secure updates

Visiting industrial fellows

  • Mike Bond
  • Brooks Davis (SRI International)
    capability systems, operating systems
  • Ben Laurie (Google)
    capability systems, cryptographic protocols, various security and privacy topics (blog)
  • Peter Neumann (SRI International)
  • George Neville-Neil
    operating systems, networking, time, code spelunking

Research students

  • Khaled Baqer (Anderson)
    mobile payment, digital currencies, anonymity systems
  • Lawrence Esswood (Watson)
    capability-based protection, control-flow integrity, language security
  • Sheharbano Khattak (Murdoch)
    measuring censorship, censorship circumvention/resistance technologies
  • Ilias Marinos (Watson)
    program analysis and transform for security
  • Christian O'Connell (Kuhn)
    eavesdropping, compromising emanations, hardware security
  • Alex Richardson (Watson)
    capability-based security, non-volatile memory, program analysis
  • Laurent Simon (Anderson)
    mobile payment, mobile security
  • Kumar Sharad (Murdoch)
    mobile payments, privacy
  • Dongting Yu (Anderson)
    BGP security
  • Bjoern A. Zeeb (A. Moore/Watson)
    operating-system security, network stacks

Industrial visitors

  • Ed Maste (FreeBSD Foundation)
  • Andrew Turner (FreeBSD Foundation)

The entire group, along with other members of the department and nearby research labs with related interests, are on the cl-security-research mailing list. For individual contact details, see also the Laboratory’s list of all members. A list of former members is available.

group photo
July 2014

Past group photos: 2012, 2008, 2000, 1997.