Experience

 
 
 
 
 
August 2018 – Present
UK

Lecturer/Assistant Professor

University of Bristol

Member of the Cyber Security Group.
 
 
 
 
 
December 2017 – August 2018
UK

Research Associate

University of Cambridge

Member of the Digital Technology Group and Fellow at St Edmund’s College.
 
 
 
 
 
July 2016 – November 2017
USA

Postdoctoral Fellow

Harvard University

 
 
 
 
 
January 2013 – June 2016
UK

Research Assistant

University of Cambridge

 
 
 
 
 
September 2008 – August 2011
France

Software Engineer

Gemalto

R&D Team member.
 
 
 
 
 
September 2006 – August 2008
France

Electronic Engineer

SRETT

R&D Team member.

Recent Publications

Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance …

Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known …

Open data and open-source software may be part of the solution to science’s “reproducibility crisis”, but they are insufficient to …

Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data …

Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been …

In the last few decades, data-driven methods have come to dominate many fields of scientific inquiry. Open data and open-source …

We present FRAPpuccino (or FRAP), a provenance-based fault detection mechanism for Platform as a Service (PaaS) users, who run many …

Unikernels are a rapidly emerging technology in the world of cloud computing. Unikernels build on research on library operating systems …

Internet of Things (IoT) applications, systems and services are subject to law. We argue that for the IoT to develop lawfully, there …

The usual approach to security for cloud-hosted applications is strong separation. However, it is often the case that the same data is …

Recent & Upcoming Talks

In this talk, provenance-based intrusion detection will be discussed. We are building a full stack solution to perform host-based …

Provenance is the representation of a system execution as a directed acyclic graph. Whole-system provenance graph, representing the …

Provenance is the representation of a system execution as a directed acyclic graph. Whole-system provenance graph, representing the …

Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance …

Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known …

Jobs & Studentships

Projects

A practical implementation of Linux Provenance Capture.

Capture and analyze provenance to improve data science.

The Microsoft Cloud Computing Research Centre (MCCRC) is a virtual research centre in which technology lawyers and computer scientists collaborate to conduct cutting-edge research on challenges in cloud computing at the intersection of technology and regulation.

End-to-end application security in the cloud explores the use of Information Flow Control to achieve greater security in cloud computing.

Teaching

I am the Unit Director for the following units at the University of Bristol:

  • COMSM1500: Systems Security

Contact