People

Academics

Mark Ryan

Prof. Mark Ryan

Professor of Computer Security
Head of research group

  • Applied cryptography and security protocols
  • Analysis of security systems
  • Cloud computing security
  • Internet of things security
  • Privacy
  • Electronic voting
  • Mobile phone protocols
Karen Yeung

Prof. Karen Yeung

Interdisciplinary Professor in Law, Ethics and Informatics

  • Law, regulation and technology
  • Democracy and governance
  • Constitutional values
  • Individual rights
  • Equality and social justice
  • Authority, responsibilty and machines
  • Interdisciplinary scholarship
k.yeung@bham.ac.uk
Flavio Garcia

Prof. Flavio Garcia

Professor of Computer Security

  • Embedded device security
  • Automotive security
  • Reverse engineering
  • Cryptographic protocols
  • Primitives and privacy
Tom Chothia

Dr Tom Chothia

Senior Lecturer

  • Statistics and information theory
  • Anonymity
  • Distributed systems
  • RFID

Dr David Oswald

Lecturer

  • Embedded system security
  • Side-channel analysis
  • Implementation attacks
  • Real-world attacks
  • RFID

Dr David Galindo

Senior Lecturer

  • Design and analysis of cryptographic protocols
  • Distributed ledger technologies
  • Electronic voting
  • Privacy-enhancing technologies
  • Societal aspects of computer security
Christophe Petit

Dr Christophe Petit

Lecturer

  • Classical and post-quantum cryptography
  • Cryptanalysis
  • Cryptographic protocls
  • Computer algebra
  • Algorithmic number theory
C.Petit.1@bham.ac.uk
Eike Ritter

Dr Eike Ritter

Senior Lecturer

  • Modelling and analysing protocols
  • Operating systems
  • Security of pervasive systems
Ian Batten

Dr Ian Batten

Lecturer
Programme Director MSc Cyber Security

  • Cyber security education
  • Network security
  • Secure systems management
  • Computer systems architecture
Sujoy-Sinha-Roy

Dr Sujoy Sinha Roy

Lecturer

  • Efficient implementations
  • Cryptography
  • Lattice-based cryptography
  • Homomorphic encryption
David Parker

Dr David Parker

Reader

  • Quantitative verification
  • Verification of probabilistic systems
  • Real-time analysis
Rami Bahsoon

Dr Rami Bahsoon

Senior Lecturer

  • Cloud computing security
  • Software engineering for security
  • Self-adaptive, self-aware and managed software
  • Economics-driven software engineering
  • Architecture-level testing for security

Postdoctoral Researchers

Mihai Ordean

Dr Mihai Ordean

Research Fellow

  • Secure cloud computing
  • Systems security
  • ICS & IoT security
  • Authentication
Jose Moreira

Dr Jose Moreira

Research Fellow

  • Coding and information theory
  • Cryptography
  • Algorithms
  • Machine learning
  • Electronic voting
j.moreira-sanchez@cs.bham.ac.uk
Chris Novakovic

Dr Chris Novakovic

Research Fellow

  • Formal verification
  • Web security and privacy
  • Information flow control
  • Distributed systems
  • Security-centric usability
Jiangshan Yu

Dr Jiangshan Yu

Honorary Research Fellow

  • Applied cryptography
  • Authentication and verification
  • Cryptographic keys
  • Secure cloud storage

PhD Students

Nada Alruhaily

Nada Alruhaily

Research student

  • Malware detection
Jan van den Herrewegen

Jan van den Herrewegen

Research student

  • Automotive security
Chris Hicks

Chris Hicks

Research student

  • Cryptographic key management
  • Embedded systems security
  • Applied cryptography
Allister Hill

Allister Hill

Research student

  • Authentication
  • Embedded systems security
  • Security protocols
Philipp Jakubeit

Philipp Jakubeit

Research student

  • Embedded devices security
  • Applied cryptography
  • Privacy
Rujia Li

Rujia Li

Research student

  • Cryptography
  • Blockchain
Chris McMahon-Stone

Chris McMahon-Stone

Research student

  • Automated protocol learning
  • Mobile apps
  • IoT
  • Wireless security
Michael Oxford

Michael Oxford

Research student

  • Probabilistic verification
  • Certificate transparency
Andreea Radu

Andreea-Ina Radu

Research student

  • Automotive security
  • Embedded devices
Rajiv Singh

Rajiv Singh

Research student

  • Protocols
  • Measurement
  • Stealth attacks
Richard Thomas

Richard Thomas

Research student

  • Rail security
  • Industrial control system security
  • IoT security
  • GSM and wireless security
Giannis Tziakouris

Giannis Tziakouris

Research student

  • Cloud security
Sebastian Vasile

Sebastian Vasile

Research student

  • IoT security
  • Embedded devices