Positions available

Lecturer in Computer Security

The role is to create and disseminate knowledge by initiating, conducting and publishing (in journals or conference proceedings) original, high-quality research, by seeking external funding and by developing and delivering undergraduate and postgraduate computer security and computer science programmes. Read more...

To apply for the post, please follow the instructions that you find by following the link above. You are also welcome to send your application to me, but that is just for my information and does not constitute making a formal application. Your application should include a covering letter, your CV and two of your research papers. You are welcome to send me informal enquiries.

Job reference number
43734
Application deadline
31st August 2011

Research Fellow

We have a vacancy for a research fellow for the project Analysing Security and Privacy Properties. The project uses formal methods to analyse security and privacy properties of systems. Currently, we are working on analysing electronic voting systems, hardware-based security systems (such as the TPM), mobile telephony systems and cloud computing systems. We use process calculi and logic-based methods. We are interested in candidates that enhance or extend our expertise, both in terms of the class of systems and the kinds of formal methods used. The research group contains about 6 researchers at different levels in the areas just listed, and we have another 12 researchers in various other aspects of security.

The job is available for up to 36 months. For further details and to apply, follow this link.

Job reference number
43678
Application deadline
9th September 2011

Positions available (deadline 30 April 2011)

Funded PhD student position available

Workshop

  • Foundations of Computer security & Privacy Modelling
    FCS-PrivMod 2010 (papers due: 23 March 2010)

Opportunity

SoCS runners

SoCS Runners SoCS Runners Participants in the University's Corporate Relay Challenge, 17 June 2009 (1 mile run):
The Robot Kids: Laura Ewers, Charles Gretton, Joan Beard (13:0);
Odd SoCS: Ben Jones (6:06), Ben Smyth (4:43), Anh Dinh (6:49), Rob Minson (5:35).

Expired deadlines



Books

Feature Interaction (Malte Plaith)

What is a feature?

A feature can be informally described as something adding new functionality to an existing system. One standard example is the Plain Old Telephone System (POTS) with new services, such as Ring Back When Free, Call Divert, Call Waiting, etc.

What is feature interaction?

When a feature prevents the system or other features from working properly, we call this feature interaction. As this loose definition suggests, it is very difficult to find a suitable formal definition.

When do we say that the (extended) system is "working properly"? One of the main problems is that features are designed to "interact" with the system; they change it not only by adding new behaviours but also by preventing old ones. (Call Divert, for example, prevents one phone from ringing but lets a different one ring.) The extended system will generally react differently to the same inputs - and (part of) this is intended.

Relevant publications

Source code