Professor Mark Ryan

Professor Mark Ryan

School of Computer Science
Professor in Computer Security

Contact details

Address
School of Computer Science
University of Birmingham
Edgbaston
Birmingham
B15 2TT
UK

Mark Ryan is a Professor in Computer Security for the School of Computer Science and the lead for the Centre of Security and Privacy at the University of Birmingham. For more information, please see Mark's homepage.

Offensive cyber research

Publications

Recent publications

Article

Arapinis, M, Mancini, LI, Ritter, E & Ryan, MD 2017, 'Analysis of privacy in mobile telephony systems', International Journal of Information Security, vol. 16, no. 5, pp. 491–523. https://doi.org/10.1007/s10207-016-0338-9

Yu, J, Ryan, M & Cremers, C 2017, 'DECIM: Detecting Endpoint Compromise In Messaging', IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2017.2738609

Conference article

Li, R, Wang, Q, Wang, Q, Galindo, D & Ryan, M 2022, 'SoK: TEE-assisted confidential smart contract', Proceedings on Privacy Enhancing Technologies, vol. 2022, no. 3, pp. 711-731. https://doi.org/10.56553/popets-2022-0093

Conference contribution

Moreira-Sanchez, J, Ryan, M & Garcia, F 2022, Protocols for a two-tiered trusted computing base. in V Atluri, R Di Pietro, C D. Jensen & W Meng (eds), Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III. 1 edn, Lecture Notes in Computer Science, vol. 13556, Springer, Cham, pp. 229–249, 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, 26/09/22. https://doi.org/10.1007/978-3-031-17143-7_12

Laing, T, Marin, E, Ryan, MD, Schiffman, J & Wattiau, G 2022, Symbolon: Enabling Flexible Multi-device-based User Authentication. in 2022 IEEE Conference on Dependable and Secure Computing (DSC)., 9888854, IEEE Conference on Dependable and Secure Computing, Institute of Electrical and Electronics Engineers (IEEE), 5th IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, United Kingdom, 22/06/22. https://doi.org/10.1109/DSC54232.2022.9888854

Fotiadis, G, Moreira-Sanchez, J, Giannetsos, T, Chen, L, Ronne, PB, Ryan, M & Ryan, PYA 2021, Root-of-trust abstractions for symbolic analysis: application to attestation protocols. in R Roman & J Zhou (eds), Security and Trust Management: 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 13075, Springer, Cham, pp. 163-184. https://doi.org/10.1007/978-3-030-91859-0_9

Singh, RR, Moreira-Sanchez, J, Chothia, T & Ryan, M 2020, Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties. in STM 2020: Security and Trust Management . Springer, pp. 3. https://doi.org/10.1007/978-3-030-59817-4_1

Oxford, M, Parker, D & Ryan, M 2020, Quantitative Verification of Certificate Transparency Gossip Protocols. in Proceedings of 6th International Workshop on Security and Privacy in the Cloud (SPC'20). IEEE Computer Society Press, 6th International Workshop on Security and Privacy in the Cloud (SPC'20), Virtual event, 29/06/20.

Ordean, M, Ryan, M & Galindo Chacon, D 2019, CAOS: Concurrent-Access Obfuscated Store. in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019). Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, Association for Computing Machinery (ACM), pp. 13-24, 24th ACM Symposium on Access Control Models and Technologies, Toronto, Ontario, Canada, 4/06/19. https://doi.org/10.1145/3322431.3325101

Denzel, M, Ryan, M & Ritter, E 2018, A Malware-Tolerant, Self-Healing Industrial Control System Framework. in S De Capitani di Vimercati & F Martinelli (eds), ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology , vol. 502, Springer, pp. 46-60, 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), Rome, Italy, 29/05/17. https://doi.org/10.1007/978-3-319-58469-0_4

Denzel, M & Ryan, M 2018, Malware Tolerant (Mesh-) Networks. in Proceedings of the 17th International Conference on Cryptology And Network Security (CANS 2018) . Lecture Notes in Computer Science, vol. 11124, Springer, pp. 133-153, 17th International Conference on Cryptology And Network Security (CANS 2018) , Naples, Italy, 30/09/18. https://doi.org/10.1007/978-3-030-00434-7_7

Yu, J, Ryan, M & Chen, L 2017, Authenticating compromisable storage systems. in Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE Computer Society Press, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australia, 1/08/17. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216

Milner, K, Cremers, C, Yu, J & Ryan, M 2017, Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. in Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017., 8049721, Proceedings - IEEE Computer Security Foundations Symposium, IEEE Computer Society Press, pp. 203-216, 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, United States, 21/08/17. https://doi.org/10.1109/CSF.2017.21

Ryan, MD 2017, Making Decryption Accountable. in J Anderson, B Christianson, V Matyas & F Stajano (eds), Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. 1st edn, vol. XXV, Lecture Notes in Computer Science, vol. XXV (25), Springer, pp. 93-98, Twenty-fifth International Workshop on Security Protocols, Cambridge, United Kingdom, 20/03/17. https://doi.org/10.1007/978-3-319-71075-4

Preprint

Cheval, V, Moreira, J & Ryan, M 2023 'Automatic verification of transparency protocols (extended version)' arXiv. https://doi.org/10.48550/arXiv.2303.04500

View all publications in research portal

Expertise

Computer security, cloud computing, electronic voting, TPM, trusted computing, hardware-based security, Google, Linux, software security, privacy, mobile security, wireless communication, online privacy, privacy protection.

Expertise

Computer security; cloud computing, electronic voting; TPM, trusted computing; hardware-based security; Google; Linux; software security; privacy; mobile security; wireless communication; online privacy; privacy protection; and crypto-currencies in which there are several mutually-distrusting parties web-based systems.

Policy experience

Recent policy experience includes producing the technical report for the UK Government's Electronic balloting for industrial action: Knight review. The technical report constitutes an appendix of the review.