Department of Computer Science and Technology

Security Group

Academic staff

  • Alastair Beresford
    security & privacy, mobile computing, programming languages
  • Alice Hutchings
    cybercrime, underground markets, crime prevention, ethics
  • Martin Kleppmann
    decentralisation, local-first collaboration software, distributed systems security
  • Markus Kuhn
    hardware and signal-processing aspects of security, positioning systems, display security, semi-structured data
  • Simon Moore
    hardware and VLSI design, asynchronous logic
  • Larry Paulson
    protocol verification, formal methods
  • Frank Stajano
    security and human factors, usability, authentication, Pico, scams, privacy, cyber security education (Inter-ACE and C2C)
  • Robert Watson
    operating systems, capability systems, network stacks, CPU security models, I/O security, tracing

Post-doctoral and post-graduate researchers

  • Ruslan Bukin
    embedded systems, operating systems
  • Richard Clayton
    traceability, distributed denial of service, spam, phish
  • Hridoy Dutta
    cybercrime
  • Lawrence Esswood (Watson)
    capability-based protection, control-flow integrity, language security
  • Daniel Hugenroth (Beresford)
    mobile systems, cybersecurity
  • Jack Hughes (Hutchings)
    cybercrime, cybersecurity
  • Yanna Papadodimitraki
    cybercrime
  • Alex Richardson (Watson)
    capability-based security, persistent memory, program analysis
  • Michael Roe
    capability systems, cryptographic protocols, formal methods

CHERI project RAs: Edward Napierala, Allison Randal, Konrad Witaszczyk, Alfredo Mazzinghi, Alex Richardson, Andrew Turner

Visitors

  • John Baldwin
  • David Chisnall
    domain and problem-specific languages, compiler architecture, hardware and human influence on language design
  • Yi Ting Chua
    cybercrime, social network analysis, online communities
  • Ben Collier
    cybercrime, science and technology studies, theoretical criminology, quantitative and qualitative research methods
  • Brooks Davis (SRI International)
    capability systems, operating systems
  • Li-Wen Hsu
    operating systems, tracing
  • Nathaniel Filardo
    CHERI
  • Ben Laurie (Google)
    capability systems, cryptographic protocols, various security and privacy topics (blog)
  • Ed Maste (FreeBSD Foundation)
  • Steven Murdoch (University College London)
    covert channels, anonymous communication, traffic analysis
  • Peter Neumann (SRI International)
  • George Neville-Neil
    operating systems, networking, time, code spelunking
  • Daniel Thomas (Strathclyde)
  • Shih-Chun You (Kuhn)
    side-channel analysis, template attacks
  • Bjoern A. Zeeb
    operating systems, network stacks, microarchitectural simulation

Research students

The entire group, along with other members of the department and nearby research labs with related interests, are on the cl-security-research mailing list. For individual contact details, see also the Laboratory’s list of all members. A list of former members is available.

July 2024:

group photo

June 2022:

group photo
Hridoy Dutta, Shih-Chun You, Eric Peng, Jose Gilberto Atondo Siu, Henry Caushi, Jenny Blessing, Luis A. Saavedra del Toro
Ilia Shumailov, Yanna Papadodimitraki, Diana Vasile, Frank Courbon, Dimitrije Erdeljan, Sergei Skorobogatov, Ruslan Bukin, Dapeng Gao, Kieron Ivy Turk
Robert Watson, Alice Hutchings, Alastair Beresford, Frank Stajano, Ross Anderson, Markus Kuhn, Richard Clayton

Earlier group photos: 2019, 2018, 2014, 2012, 2008, 2000, 1997.

See also: