Our cookies

We use cookies for three reasons: to give you the best experience on PGS, to make sure the PGS ads you see on other sites are relevant , and to measure website usage. Some of these cookies are necessary to help the site work properly and can’t be switched off. Cookies also support us to provide our services for free, and by click on “Accept” below, you are agreeing to our use of cookies .You can manage your preferences now or at any time.

Privacy overview

We use cookies, which are small text files placed on your computer, to allow the site to work for you, improve your user experience, to provide us with information about how our site is used, and to deliver personalised ads which help fund our work and deliver our service to you for free.

The information does not usually directly identify you, but it can give you a more personalised web experience.

You can accept all, or else manage cookies individually. However, blocking some types of cookies may affect your experience of the site and the services we are able to offer.

You can change your cookies preference at any time by visiting our Cookies Notice page. Please remember to clear your browsing data and cookies when you change your cookies preferences. This will remove all cookies previously placed on your browser.

For more detailed information about the cookies we use, or how to clear your browser cookies data see our Cookies Notice

Manage consent preferences

Strictly necessary cookies

These cookies are necessary for the website to function and cannot be switched off in our systems.

They are essential for you to browse the website and use its features.

You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. We can’t identify you from these cookies.

Functional cookies

These help us personalise our sites for you by remembering your preferences and settings. They may be set by us or by third party providers, whose services we have added to our pages. If you do not allow these cookies, then these services may not function properly.

Performance cookies

These cookies allow us to count visits and see where our traffic comes from, so we can measure and improve the performance of our site. They help us to know which pages are popular and see how visitors move around the site. The cookies cannot directly identify any individual users.

If you do not allow these cookies we will not know when you have visited our site and will not be able to improve its performance for you.

Marketing cookies

These cookies may be set through our site by social media services or our advertising partners. Social media cookies enable you to share our content with your friends and networks. They can track your browser across other sites and build up a profile of your interests. If you do not allow these cookies you may not be able to see or use the content sharing tools.

Advertising cookies may be used to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but work by uniquely identifying your browser and internet device. If you do not allow these cookies, you will still see ads, but they won’t be tailored to your interests.

Cybersecurity MPhil/PhD

Ucl (university college london), different course options.

  • Key information

Course Summary

Tuition fees, entry requirements, university information, similar courses at this uni, key information data source : idp connect, qualification type.

PhD/DPhil - Doctor of Philosophy

Subject areas

Computer Security Systems Internet Security Systems

Course type

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future. To do so, we select students who already recognise these intersections and seek to explore them further. We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security). All of our students will develop a level of expertise in their topic that incorporates the dimensions covered in our CDT and all of our students will leave the CDT with a network of colleagues working in and across these domains.

The UK National Cyber Security Strategy 2016-2021 identifies the “cyber skills shortage” as a systemic issue, with estimates suggesting that by 2022 there will be a shortage of 350K cybersecurity professionals. To help fill this gap, our students will be trained in how to address evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, our students will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

Depending on their research agenda, the programme will provide students with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

UK fees Course fees for UK students

For this course (per year)

International fees Course fees for EU and international students

A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.

UCL (University College London) is consistently ranked among the top ten universities in the world, conducting leading research across a wide range of subject areas. Throughout its long and prestigious history, it has inspired and educated countless minds and produced 30 Nobel prize recipients. With one campus located in the heart of Bloomsbury and a second campus in vibrant east London, the university is home to around 42,000 students... more

Information Security MSc

Full time | 1 year | 23-SEP-24

We value your privacy

We use cookies to allow this site to work for you, improve your user experience, and to serve you advertising tailored to your interests. Let us know if you agree to all cookies. You can manage your preferences at any time

Your Privacy

We use cookies, which are small text files placed on your computer, to allow the site to work for you, improve your user experience, to provide us with information about how our site is used, and to deliver personalised ads which help fund our work and deliver our service to you for free.

The information does not usually directly identify you, but it can give you a more personalised web experience.

You can accept all, or else manage cookies individually. However, blocking some types of cookies may affect your experience of the site and the services we are able to offer.

You can change your cookies preference at any time by visiting our Cookies Notice page. Please remember to clear your browsing data and cookies when you change your cookies preferences. This will remove all cookies previously placed on your browser.

For more detailed information about the cookies we use, or how to clear your browser cookies data see our Cookies Notice

Manage consent preferences

These cookies are necessary for the website to function and cannot be switched off in our systems.

They are essential for you to browse the website and use its features.

You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. We can’t identify you from these cookies.

These help us personalise our sites for you by remembering your preferences and settings. They may be set by us or by third party providers, whose services we have added to our pages. If you do not allow these cookies, then these services may not function properly.

These cookies allow us to count visits and see where our traffic comes from, so we can measure and improve the performance of our site. They help us to know which pages are popular and see how visitors move around the site. The cookies cannot directly identify any individual users.

If you do not allow these cookies we will not know when you have visited our site and will not be able to improve its performance for you.

These cookies may be set through our site by social media services or our advertising partners. Social media cookies enable you to share our content with your friends and networks. They can track your browser across other sites and build up a profile of your interests. If you do not allow these cookies you may not be able to see or use the content sharing tools.

Advertising cookies may be used to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but work by uniquely identifying your browser and internet device. If you do not allow these cookies, you will still see ads, but they won’t be tailored to your interests.

Personalise what you see on this page.

  • United States

LOOKING FOR

  • Undergraduate courses
  • Postgraduate courses
  • CHOOSE ONE OR MORE

Popular universities

  • University of Kent
  • University of East Anglia UEA
  • University of Chester
  • Coventry University
  • University of Aberdeen
  • University of Portmouth
  • Nottingham Trent University
  • University of Sunderland
  • London Metropolitan University
  • London South Bank University
  • University of East London
  • BROWSE ALL UNIVERSITIES

Course search

Popular undergraduate courses.

  • Computer Science
  • LLB Bachelor of Laws
  • Biomedical Sciences
  • Physiotherapy
  • Sports Science

Open days search

Upcoming open days.

  • University of Essex
  • BIMM University
  • University of Wales Trinity Saint David
  • Arts University Bournemouth
  • SRUC Scotland's Rural College

Article search

Popular articles.

  • What is UCAS Extra?
  • Replying to offers
  • What's a university open day
  • Student finance and funding
  • Types of degree in the UK
  • BROWSE ALL ARTICLES

Popular topics

  • Choosing what to study
  • Choosing where to study
  • Applying to university
  • League tables
  • Student life - after you start

Cybersecurity MPhil/PhD UCL (University College London)

UCL (University College London)

Course options

Qualification.

PhD/DPhil - Doctor of Philosophy

UCL (University College London)

  • TUITION FEES
  • ENTRY REQUIREMENT
  • UNIVERSITY INFO

Course summary

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future. To do so, we select students who already recognise these intersections and seek to explore them further. We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security). All of our students will develop a level of expertise in their topic that incorporates the dimensions covered in our CDT and all of our students will leave the CDT with a network of colleagues working in and across these domains.

The UK National Cyber Security Strategy 2016-2021 identifies the “cyber skills shortage” as a systemic issue, with estimates suggesting that by 2022 there will be a shortage of 350K cybersecurity professionals. To help fill this gap, our students will be trained in how to address evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, our students will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

Depending on their research agenda, the programme will provide students with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

Tuition fees

  • Afghanistan
  • Antigua & Barbuda
  • Bosnia and Herzegovina
  • Burkina Faso
  • Central African Republic
  • Congo (Democratic Republic)
  • Czech Republic
  • Dominican Republic
  • El Salvador
  • Equatorial Guinea
  • Guinea-Bissau
  • Ivory Coast
  • Korea DPR (North Korea)
  • Liechtenstein
  • Marshall Islands
  • Netherlands
  • New Zealand
  • Northern Ireland
  • Palestinian Authority
  • Papua New Guinea
  • Philippines
  • Puerto Rico
  • Republic of Ireland
  • Sao Tome and Principe
  • Saudi Arabia
  • Sierra Leone
  • Solomon Islands
  • South Africa
  • South Korea
  • South Sudan
  • St. Kitts & Nevis
  • Switzerland
  • Trinidad & Tobago
  • Turkmenistan
  • United Kingdom
  • Vatican City
  • Western Samoa

£ 29,000 per year

Tuition fees shown are for indicative purposes and may vary. Please check with the institution for most up to date details.

University information

University league table, campus address.

UCL (University College London), Gower Street, London, Camden, WC1E 6BT, England

Subject rankings

Subject ranking.

5th out of 115 3

Entry standards

Graduate prospects

Student satisfaction

Suggested courses

Kingston University

Network and Information Security with Management Studies MSc

Kingston University

University league table

University of Southampton

Cyber Security (MSc)

University of Southampton

Computer Science league table

University of Hertfordshire

MSc Cyber Security

University of Hertfordshire

Is this page useful?

Sorry about that..., how can we improve it, thanks for your feedback.

Photo of Prof Lorenzo Cavallaro

Lorenzo Cavallaro Profile page

  • Professor of Computer Science Dept of Computer Science
  • [email protected]
  • University College London, 169 Euston Road, R-106, London, NW1 2AE, United Kingdom
  • Systems Security Research Lab
  • Google Scholar

Lorenzo grew up on pizza, spaghetti, and Phrack, first. Underground and academic research interests followed shortly thereafter. He is a Full Professor of Computer Science at UCL Computer Science, where he leads the Systems Security Research Lab within the Information Security Research Group. He speaks, publishes at, and sits on the technical program committees of top-tier and well-known international conferences including IEEE S&P, USENIX Security, ACM CCS, NDSS, USENIX Enigma, RAID, ACSAC, and DIMVA, as well as emerging thematic workshops (e.g., Deep Learning for Security at IEEE S&P, and AISec at ACM CCS), and received the USENIX WOOT Best Paper Award in 2017. Lorenzo is Program Co-Chair of Deep Learning and Security 2021, DIMVA 2021-22, and he was Program Co-Chair of ACM EuroSec 2019-20 and General Co-Chair of ACM CCS 2019. He holds a PhD in Computer Science from the University of Milan (2008), held Post-Doctoral and Visiting Scholar positions at Vrije Universiteit Amsterdam (2010-2011), UC Santa Barbara (2008- 2009), and Stony Brook University (2006-2008), and worked in the Department of Informatics at King's College London (2018-2021), where he held the Chair in Cybersecurity (Systems Security), and the Information Security Group at Royal Holloway, University of London (Assistant Professor, 2012; Associate Professor, 2016; Full Professor, 2018). He’s definitely never stopped wondering and having fun throughout.

UNIVERSITY COLLEGE LONDON APPOINTMENTS

  • Professor of Computer Science University College London, Dept of Computer Science

ACADEMIC POSITIONS

  • Professor of Computer Science, Chair in Cybersecurity (Syste King's College London, Informatics, United Kingdom 18 Sep 2018 - 31 Jul 2021
  • Professor of Information Security Royal Holloway, University of London, Information Security, United Kingdom 1 Jan 2018 - 17 Sep 2018
  • Reader in Information Security Royal Holloway, University of London, Information Security, United Kingdom 1 Jan 2016 - 31 Dec 2017
  • Senior Lecturer in Information Security Royal Holloway, University of London, Information Security, United Kingdom 1 Jan 2014 - 31 Dec 2015
  • Lecturer (Assistant Professor) in Information Security Royal Holloway, University of London, Information Security, United Kingdom 1 Jan 2012 - 31 Dec 2013
  • Postdoctoral Researcher Vrije Universiteit Amsterdam, Computer Science, United Kingdom 1 Jan 2010 - 31 Dec 2011
  • Postdoctoral Researcher University of California, Santa Barbara, Computer Science, United Kingdom 1 Apr 2008 - 31 Dec 2009
  • Visiting Research Scholar Stony Brook University, Computer Science, Stony Brook, United States 1 Sep 2006 - 1 Apr 2008
  • Italian Can read, write, speak, understand and peer review
  • English Can read, write, speak, understand and peer review

AVAILABILITY

  • Advisory activities
  • Collaborative projects
  • Conference participation as a speaker or panellist
  • Consultancy
  • Grant application assessment
  • External examining
  • Industry projects
  • Outreach/community engagement
  • Supervision of taught course research projects
  • Supervision of research degrees
  • Reviewing for journals/conferences
  • Career advice
  • Media enquiries

FIELDS OF RESEARCH

  • Cybersecurity and privacy
  • Adversarial machine learning
  • System and network security
  • Artificial intelligence

Cybersecurity Guide

From scholar to expert: Cybersecurity PhD options

In this guide

  • Industry demand
  • 2024 rankings
  • Preparation
  • Considerations
  • School listings

The cybersecurity landscape is not just growing—it’s evolving at a breakneck pace. And what better way to stay ahead of the curve than by pursuing a PhD in cybersecurity?

This advanced degree is no longer confined to the realm of computer science. Today, it branches into diverse fields like law, policy, management, and strategy, reflecting the multifaceted nature of modern cyber threats.

If you’re looking to become a thought leader in this dynamic industry, a PhD in cybersecurity offers an unparalleled opportunity to deepen your expertise and broaden your horizons.

This guide is designed to give prospective cybersecurity PhD students a general overview of available cybersecurity PhD programs. It will also outline some of the factors to consider when trying to find the right PhD program fit, such as course requirements and tuition costs. 

Industry demand for PhDs in cybersecurity

Like other cutting edge technology fields, until recently, cybersecurity PhD programs were often training grounds for niche positions specialized research, often for government agencies (like the CIA, NSA, and FBI),  or closely adjacent research organizations or institutions. 

Today, however, as the cybersecurity field grows to become more pervasive and consumer-oriented, there are opportunities for cybersecurity PhDs to work at public-facing companies like startups and name-brand financial, software, infrastructure, and digital service firms.

One trend that is emerging in the cybersecurity field is that cybersecurity experts need to be well-versed in a variety of growing threats. If recent headlines about cybersecurity breaches are any indication, there are a number of new attack vectors and opportunities for cybercrime and related issues. Historically, committing cybercrime took resources and a level of sophistication that required specialized training or skill.

But now, because of the pervasiveness of the internet, committing cybercrime is becoming more commonplace. So training in a cybersecurity PhD program gives students an opportunity to become an expert in one part of a growing and multi-layered field.

In fact, this trend of needing well-trained, but adaptable cybersecurity professionals is reflected by the move by cybersecurity graduate schools to offer specialized master’s degrees and many companies and professional organizations offer certifications in cybersecurity that focus on particular issues related to cybersecurity technology, cybersecurity law , digital forensics , policy, or related topics.

That said, traditional research-oriented cybersecurity positions continue to be in demand in academia and elsewhere — a trend that will likely continue. 

One interesting facet of the cybersecurity field is trying to predict what future cybersecurity threats might look like and then develop tools and systems to protect against those threats.

As new technologies and services are developed and as more of the global population begins using internet services for everything from healthcare to banking — new ways of protecting those services will be required. Often, it’s up to academic researchers to think ahead and examine various threats and opportunities to insulate against those threats.

Another key trend coming out of academic circles is that cybersecurity students are becoming increasingly multidisciplinary.

As cybersecurity hacks impact more parts of people’s everyday lives, so too do the academic programs that are designed to prepare the next generation of cybersecurity professionals. This emerging trend creates an enormous amount of opportunity for students that have a variety of interests and who are looking to create a non-traditional career path.

The best cybersecurity PhD programs for 2024

Capella university, georgia institute of technology, northeastern university, marymount university, school of technology and innovation, nova southeastern university, college of computing & engineering, purdue university, stevens institute of technology, worcester polytechnic institute, university of illinois at urbana-champaign, mississippi state university, new york institute of technology.

These rankings were compiled from data accessed in November 2023 from Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

What is required to get a PhD in cybersecurity?

Good news first: Obtaining a PhD in a field related to cybersecurity will likely create tremendous employment opportunities and lead to interesting and dynamic career options.

Bad news: Getting a PhD requires a lot of investment of time and energy, and comes with a big opportunity cost (meaning you have to invest four to five years, or longer, or pursuing other opportunities to obtain a doctoral degree. 

Here’s a quick breakdown of what is required to get a PhD in cybersecurity. Of course, specific degree requirements will vary by program. One growing trend in the field is that students can now obtain degrees in a variety of formats, including traditional on-campus programs, online degree programs , and hybrid graduate degree programs that combine both on-campus learning with online learning. 

Related resources

  • Online PhD in cybersecurity – A guide to finding the right program
  • Cybersecurity degree programs
  • Podcast episodes and expert interviews

Preparing for a cybersecurity doctorate program

Cybersecurity is a relatively new formalized technology field, nonetheless, there are a number of ways that students or prospective PhD candidates can get involved or explore the field before and during a graduate school program. A few examples of ways to start networking and finding opportunities include: 

Join cybersecurity organizations with professional networks

Specialized professional organizations are a good place to find the latest in career advice and guidance. Often they publish newsletters or other kinds of information that provides insights into the emerging trends and issues facing cybersecurity professionals. A couple of examples include:

The Center for Internet Security  (CIS) is a non-profit dedicated to training cybersecurity professionals and fostering a sense of collaboration. The organization also publishes information and analysis of the latest cybersecurity threats and issues facing the professional community.

The SANS Institute runs a number of different kinds of courses for students (including certification programs) as well as ongoing professional cybersecurity education and training for people working in the field. The organization has several options including webinars, online training, and live in-person seminars. Additionally, SANS also publishes newsletters and maintains forums for cybersecurity professionals to interact and share information.

Leverage your social network

Places like LinkedIn and Twitter are a good place to start to find news and information about what is happening in the field, who the main leaders and influencers are, and what kinds of jobs and opportunities are available.

Starting a professional network early is also a great opportunity. Often professionals and members of the industry are willing to provide guidance and help to students that are genuinely interested in the field and looking for career opportunities. 

Cybersecurity competitions 

Cybersecurity competitions are a great way to get hands-on experience working on real cybersecurity problems and issues. As a PhD student or prospective student, cybersecurity competitions that are sponsored by industry groups are a great way to meet other cybersecurity professionals while getting working on projects that will help flesh out a resume or become talking points in later job interviews.

The US Cyber Challenge , for example, is a series of competitions and hackathon-style events hosted by the Department of Homeland Security Science and Technology Directorate and the Center for Internet Security with the goal of preparing the next generation of cybersecurity professionals.

Internships

Internships also continue to be a tried and true way to gain professional experience. Internships in technical fields like cybersecurity can also pay well. Like the industry itself, cybersecurity internships are available across a wide range of industries and can range from academic research-oriented to more corporate kinds of work. 

Things to consider when choosing a cybersecurity PhD program

There are a number of considerations to evaluate when considering any kind of graduate degree, but proper planning is essential in order to be able to obtain a doctoral degree. It’s also important to note that these are just guidelines and that each graduate program will have specific requirements, so be sure to double-check.

What you will need before applying to a cybersecurity PhD program:

  • All undergraduate and graduate transcripts
  • A statement of intent, which is like a cover letter outlining interest
  • Letters of reference
  • Application fee
  • Online application
  • A resume or CV outlining professional and academic accomplishments

What does a cybersecurity PhD program cost?

Obtaining a PhD is a massive investment, both in terms of time and money. Obviously, cybersecurity PhD students are weighing the cost of becoming an expert in the field with the payoff of having interesting and potentially lucrative career opportunities on the other side.

Degree requirements are usually satisfied in 60-75 hours, so the cost of a doctoral degree can be well into the six-figure range. Here’s a more specific breakdown:

Tuition rates

The Cybersecurity Guide research team looked at 26 programs that offer a cybersecurity-related PhD degree. Here’s a breakdown of tuition rates (all figures are based on out-of-state tuition).

$17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology.

$86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.

$197,820 is the most expensive cybersecurity PhD program and is available at Indiana University Bloomington.

The good news is that by the time students get to the PhD level there are a lot of funding options — including some graduate programs that are completely funded by the university or academic departments themselves. Check out the cybersecurity scholarship guide for more specifics .

Additionally, funding in the form of research grants and other kinds of scholarships are available for students interested in pursuing cybersecurity studies. 

One example is the CyberCorps: Scholarships for Service program. Administered by the National Science Foundation, PhD students studying cybersecurity are eligible for a $34,000 a year scholarship, along with a professional stipend of $6,000 to attend conferences in exchange for agreeing to work for a government agency in the cybersecurity space after the PhD program. 

Frequently asked questions about cybersecurity PhD programs

Most traditional and online cybersecurity graduate programs require a minimum number of credits that need to be completed in order to obtain a degree. On average, it takes 71 credits to graduate with a PhD in cybersecurity — far longer (almost double) than traditional master’s degree programs. In addition to coursework, most PhD students also have research and teaching responsibilities that can be simultaneously demanding and really great career preparation.

At the core of a cybersecurity doctoral program is In a data science doctoral program, you’ll be expected to learn many skills and also how to apply them across domains and disciplines. Core curriculums will vary from program to program, but almost all will have a core foundation of statistics.  

All PhD candidates will have to take a series of exams that act as checkpoints during the lengthy PhD process. The actual exam process and timing can vary depending on the university and the program, but the basic idea is that cybersecurity PhD candidates generally have to sit for a qualifying exam, which comes earlier in the program (usually the winter or spring of the second year of study), a preliminary exam, which a candidate takes to show they are ready to start the dissertation or research portion of the PhD program, and a final exam where PhD students present and defend their research and complete their degree requirements. 

A cybersecurity PhD dissertation the capstone of a doctoral program. The dissertation is the name of a formal paper that presents the findings of original research that the PhD candidate conducted during the program under the guidance of faculty advisors. Some example cybersecurity research topics that could potentially be turned into dissertation ideas include: * Policies and best practices around passwords * Ways to defend against the rise of bots * Policies around encryption and privacy * Corporate responsibility for employee security * Internet advertising targeting and privacy * The new frontier of social engineering attacks * Operation security (OpSec) strategy and policy * Network infrastructure and defense * Cybersecurity law and policy * The vulnerabilities of biometrics * The role of ethical hacking * Cybersecurity forensics and enforcement

A complete listing of cybersecurity PhD programs

The following is a list of cybersecurity PhD programs. The listing is intended to work as a high-level index that provides enough basic information to make quick side-by-side comparisons easy. 

You should find basic data about what each school requires (such as a GRE score or prior academic work) as well as the number of credits required, estimated costs, and a link to the program.

Arizona State University

  • Aim: Equip students with in-depth expertise in cybersecurity.
  • Study Modules: Delve into advanced computer science subjects and specific cybersecurity courses.
  • Research Component: Students undertake groundbreaking research in the cybersecurity domain.

Carnegie Mellon University

  • CNBC Collaboration: A joint effort between Carnegie Mellon and the University of Pittsburgh to train students in understanding the brain's role in cognition.
  • Training Program: Students take four main neuroscience courses and participate in seminars and ethics training.
  • Course Integration: Whether students have a B.S. or M.S. degree, they can combine the CNBC and ECE Ph.D. courses without extra workload.

Colorado School of Mines

  • Research Focus: Cybersecurity: Studying online security and privacy.
  • Cost and Financial Aid: Provides details on program costs and available financial support.
  • Current Mines Community: Offers specific information for those already affiliated with Mines.

Indiana University Bloomington

  • Focus Areas: Options include Animal Informatics, Bioinformatics, Computer Design, and more.
  • Information Sessions: The university holds events to guide potential students about admissions and study options.
  • Minor Requirement: All Ph.D. students must complete a minor, which can be from within the Luddy School of Informatics or from another approved school at IU Bloomington.

Iowa State University

  • Details: The program is open to both domestic and international students.
  • Time to Complete: Ph.D.: About 5.2 years
  • Goals: Students should gain deep knowledge, follow ethics, share their findings, and do advanced research if they're writing a thesis.
  • Learning Goals: Master core areas of Computer Science, achieve in-depth knowledge in a chosen subfield, obtain expertise to perform original research, and demonstrate the ability to communicate technical concepts and research results.
  • Duration: Median time to earn the doctorate is 5.8 years.
  • Application Information: The program is open to both domestic and international students.
  • Program's Aim: The Ph.D. program is tailored to produce scholars proficient in leading research initiatives, undertaking rigorous industrial research, or imparting high-level computer science education.
  • Entry Routes: The program welcomes both students holding a B.S. degree for direct admission and those with an M.S. degree.
  • Dissertation's Role: It stands as the pivotal component of the Ph.D. journey. Collaboration between the student, their dissertation director, and the guiding committee is essential.

Naval Postgraduate School

  • Program Essence: The Computer Science Ph.D. is a top-tier academic program in the U.S.
  • Admission Criteria: Open to military officers from the U.S. and abroad, U.S. governmental employees, and staff of foreign governments.
  • Curriculum: Designed to deepen knowledge in computing, with a focus on the needs of the U.S. Department of Defense.
  • Emphasis on Research: The college showcases its strength in research through sections dedicated to Research Areas, affiliated Institutes & Centers, ongoing Research Projects, and specialized Labs & Groups.
  • Holistic Student Growth: The college promotes a comprehensive student experience, spotlighting Clubs & Organizations, campus Facilities, and tech Systems.
  • Guidance for Future Students: Provides tailored insights for students considering joining at various academic levels, from Undergraduate to PhD.
  • Broad Learning: The program covers many areas, from software and policy to psychology and ethics, reflecting the wide scope of cybersecurity.
  • Course Design: Students learn foundational security topics first and then dive into specialized areas, like cyber forensics.
  • Successful Alumni: Past students now work in places like NASA, Amazon, and Google.
  • Feature: Students can apply to up to three different campuses and/or majors using a single application and fee payment.
  • Preparing for a Globalized World: Courses such as Global Supply Chain Management equip students for international careers.
  • Tech-Forward Curriculum: Purdue's commitment to advanced technology is evident.

Rochester Institute of Technology

  • Cyberinfrastructure Focus: The program dives deep into how hardware, data, and networks work together to create secure and efficient digital tools.
  • Broad Applications: The program uses computing to solve problems in fields like science, arts, and business.
  • Success Rate: All RIT graduates from this program have found relevant roles, especially in the Internet and Software sectors.

Sam Houston State University

  • Program's Objective: The course aims to nurture students to be technically adept and also to take on leadership roles in the digital and cyber forensic domain across various industries.
  • Assessments: Students undergo comprehensive tests to evaluate their understanding.
  • Research Paper (Dissertation): Once students reach the doctoral candidacy phase, they must produce and defend a significant research paper or dissertation.
  • Funding: All Ph.D. students get financial help, so they can start their research right away.
  • Teachers: The program has top experts, including those who've made big discoveries in computer science.
  • Research Areas: Students can study the latest topics like AI, computer vision, and online security.

The University of Tennessee

  • Study Areas: Options include Cybersecurity, Data Analytics, Computer Vision, and more.
  • Tests: You'll have to pass a few exams, including one when you start, one before your final project, and then present your final project.
  • Courses: Some specific courses are needed, and your main professor will help decide which ones.
  • Big Exam: Before moving forward, you'll take a detailed exam about your research topic.
  • Final Step: You'll present and defend your research project to experts.
  • Overview: This program is for those with a degree in Computer Science or similar fields. It has special focus areas like Cybersecurity and Machine Learning.

University of Arizona

  • Study Plan: Students start with learning research basics and then dive into modern tech topics.
  • Support for Students: All PhD students get funding that covers their studies, a stipend, and health insurance. Money for travel to conferences is also available.
  • After Graduation: Alumni work at top universities and big companies like Google and Microsoft.

University of California-Davis

  • About the Program: Students engage in deep research, ending with a dissertation.
  • Jobs After Graduation: Roles in companies or academic positions.
  • Vibrant Community: Beyond academics, students join a supportive community, enriching their Ph.D. experience.

University of Colorado - Colorado Springs

  • Recognition: UCCS is recognized by the National Security Agency (NSA) and the Department of Homeland Security for excellence in Information Assurance Education.
  • Course Approval: The NSA has approved UCCS's courses as meeting national security training standards.
  • Overview: This program focuses on vital areas like cyber security, physical security, and homeland security.

University of Idaho

  • Partnership with NSA and DHS: The university is part of a program to boost cyber defense education.
  • Recognition: The University of Idaho is among the institutions recognized as Centers of Academic Excellence in Cyber Defense.
  • Objective: To minimize vulnerabilities in the national information infrastructure.
  • Overview: This program is meticulously crafted to deliver premier legal education to its students.
  • Courses: Encompasses a balanced mix of traditional legal doctrines, theoretical viewpoints, and hands-on practical experiences.
  • Aim: The primary objective is to equip students with top-notch legal education.

University of Missouri-Columbia

  • Seminars: PhD students should attend 20 seminars. If they were previously Master's students, their past attendance counts.
  • Timeline Requirements: Comprehensive Exam must be completed within five years of starting the program.
  • Dissertation and Publication: At least one journal paper must be submitted, accepted, or published.

University of North Carolina at Charlotte

  • Faculty: The faculty members are renowned for their impactful research contributions on a global scale.
  • Curriculum: The curriculum is versatile, catering to individuals aiming for academia as well as those targeting roles in the corporate, commerce, or public sectors.
  • Program: A blend of theoretical and hands-on research is emphasized, offering a well-rounded educational experience.

Virginia Tech

  • Seminars and Ethics: Students attend special seminars and complete training on scholarly ethics and diversity.
  • Guidance: Each student gets a faculty advisor. A group of faculty members, called a committee, also guides them.
  • Major Exams: Students go through four main stages: a qualifying process, a preliminary proposal, a research presentation, and a final defense.
  • Strong Research: WPI's PhD program is recognized for its excellent research contributions.
  • Practical Focus: The program teaches students to tackle real tech challenges.
  • Modern Labs: Students use the latest labs like the Human-Robot Interaction Lab.

Dakota State University

  • Program Goal: Train students to handle and prevent cyber threats.
  • Awards: The university has received top cybersecurity awards.
  • What You'll Learn: Research skills, cyber defense techniques, and ethical decision-making.

New Jersey City University, College of Professional Studies

  • About: Focuses on best practices in areas like national security, cyber defense, and crisis communication.
  • Recognitions: The program has been honored by the National Security Agency since 2009 and was recognized for excellence in intelligence studies.
  • Jobs: Graduates are prepared for top roles in sectors like government and education.
  • Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas.
  • Location Benefits: The university is near many cybersecurity companies and government agencies, giving students unique opportunities.
  • For Working People: It's crafted for professionals, allowing them to experience various cybersecurity roles, from tech firms to government.
  • Completion Time: Students have up to ten years from starting to finish their dissertation.
  • Program: Trains students for roles in academia, government, and business.
  • Multidisciplinary Approach: The program combines both technical and managerial aspects of cybersecurity, offering a comprehensive understanding of the field.

The University of Rhode Island

  • Research Focus: The Ph.D. program is centered around a big research project in Computer Science.
  • Qualifying Exams: Students take exams on core topics, but some might get exemptions if they're already skilled in certain areas.
  • Equal Opportunity: The University of Rhode Island is committed to the principles of affirmative action and is an equal opportunity employer.

University of North Texas

  • Team Effort: The program is a collaboration between various UNT departments for a well-rounded view of cybersecurity.
  • Goals: The course aims to develop critical thinkers who are passionate about the role of information in our lives and can work across different fields.
  • Skills Gained: Students will learn about research, teaching methods, decision-making, leadership, and analyzing data.

New York University Tandon School of Engineering

  • Scholarships: Many students get scholarships that pay for tuition and give a monthly allowance.
  • Research Interest: Research areas include cybersecurity, computer games, web search, graphics, and more.
  • Experience: Students can also research in NYU's campuses in Shanghai or Abu Dhabi.
  • One Degree for All: Every student gets the same Ph.D., regardless of their specific area of study.
  • Research Focus: The program emphasizes deep research and prepares students for advanced roles.
  • Major Project: Students work on a big research project, adding new knowledge to the computing world.
  • Program: Prepares students for leadership roles in different sectors.
  • Opportunities: Qualified students might get opportunities as Research or Teaching Assistants.
  • Overview: Focuses on advanced research and modern technologies.

Augusta University

  • Goal: The program prepares students for research roles and to make new discoveries in tech.
  • Benefits: A Ph.D. opens up leadership opportunities in tech sectors.
  • Overview: It focuses on new discoveries in areas like security, artificial intelligence, and virtual reality.

University of Texas at San Antonio

  • Financial Support: Full-time students can get funding, which covers tuition and offers roles like teaching assistants.
  • Job Prospects: UTSA trains students for jobs that are in high demand, using data from official sources.
  • Overview: The program focuses on in-depth research and teaching.

University of Central Florida

  • Mix of Subjects: Students can take courses from different areas, giving them a broad view of security topics.
  • Many Job Options: Graduates can work in government, big companies, or teach in universities.
  • Hands-on Learning: The program offers research, study projects, and internships for real-world experience.
  • UCL Information Security

phd cyber security ucl

  • London, Europe

Upcoming events

  • How do I subscribe to seminar announcements? You can subscribe to our mailing list by sending an email with subject “subscribe” to infosec-seminars-join (at) ucl.ac.uk . You can also subscribe to our Google Calendar: [ ICS ] [ HTML ].
  • In what time zone are the seminars? All seminars are on London time (typically at 16:00).
  • Can people not affiliated with UCL attend the seminars? Yes, seminars are open to everyone! At the moment, we’re virtual, so you just need to register on Zoom or join the YouTube livestream. When we’ll restart in-person, we’ll post more details.
  • How can I learn more about InfoSec research and teaching activities at UCL? Check out the UCL’s InfoSec research group page . We also run an MSc in Information Security Degree and a Centre for Doctoral Training in Cybersecurity, and maintain a blog called Bentham’s Gaze.
  • Any other questions? Please email us!

Past Events

phd cyber security ucl

  • 9 March 2023, 16:00 Prof. Dr. Karola Marky, Ruhr-University Bochum, Germany Can we vote online? Or should we stay away from it? On overview of the unique security and human factors challenges in online voting Abstract: This talk provides a summary of state-of-the-art online voting protocols specifically considering security and human factors. Based on recent research, the audience will learn about the unique challenges that researchers and developers face when developing online voting systems that a) offer specific security properties, b) consider capabilities of the entire voter population and c) unique scalability aspects. Further challenges based on society about also global threats will be presented and discussed. Bio : Karola Marky is an associate professor at the Ruhr-University Bochum, Germany, where she leads the Digital Sovereignty Group. Her main research area is Human Factors in Cybersecurity and Privacy particularly focusing on Digital Sovereignty, i.e., informational self-determination of individuals in their digital lives. She has major research contributions in the fields of privacy solutions for IoT devices, (two-factor) authentication, and electronic voting published at top conferences and journal, such as CHI, TOCHI, SOUPS, or Usenix Security.

phd cyber security ucl

  • 14 June 2022 Savvas Zannettou (TU Delft) Towards Understanding Soft Moderation Interventions on the Web [ Recording ] Abstract: The spread of misinformation online is a challenging problem with a substantial societal impact. Motivated by this, social media platforms implement and have in-place content moderation systems that usually use a combination of AI and human moderators to mitigate the spread of harmful content like misinformation. In this talk, I will provide an overview of content moderation interventions that are applied online by social media platforms and present some of my work that focuses on understanding the use and effectiveness of soft moderation interventions (e.g., the addition of a warning label that is attached along with potentially harmful content) on two social media platforms (Twitter and TikTok). Bio : Savvas Zannettou is an Assistant Professor in the Technology, Policy, and Management (TPM) faculty at TU Delft and an associated researcher with the Max Planck Institute for Informatics. Before joining TU Delft, he was a Postdoctoral Researcher at Max Planck Institute for Informatics. Savvas’ research focuses on applying machine learning and data-driven quantitative analysis to understand emerging phenomena on the Web, such as the spread of false information and hateful rhetoric. Also, he is interested in understanding algorithmic recommendations on the Web, their effect on end-users, and to what extent algorithms recommend extreme content. Finally, he is interested in analyzing content moderation systems to understand the effectiveness of moderation interventions on the Web.

phd cyber security ucl

  • 26 May 2022 Megan Knittel, Michigan State University The Internet of Things and Intimate Partner Abuse: Examining Prevalence, Risks, and Outcomes [ Recording ] Abstract: In this talk, I will begin with a discussion of a recent paper examining prevalence, risk factors, support-seeking, and personal outcomes of Internet of Things (IoT)-mediated intimate partner abuse. We conducted a survey (N=384) using the MTurk platform of adult women living in the United States who self-reported having experienced intimate partner abuse. We found that approximately 20% of women reported experiencing adverse behavior from an intimate partner using an IoT device, with the most common perpetration occurring with personal assistant devices and GPS enabled devices. Additionally, we found that Internet use skills and privacy/security behavior did not mitigate experiencing violence or adverse outcomes. Finally, our data suggest that experiencing IoT-mediated abuse predicted more severe personal outcomes than non-IoT mediated abuse. I will discuss the implications of these findings for human computer interaction design and information policy. For the last part of my talk, I will also discuss preliminary findings from my dissertation. For this work, I am conducting a netnography of online support spaces in conjunction with interviews with survivors to further examine the role of networked homes in experiences of abuse and support-seeking. Bio : Megan Knittel is a 4th year PhD candidate in the Department of Media & Information and the James H. and Mary B. Quello Center for Media & Information Policy at Michigan State University. Her research centers on the role of social computing technologies in experiences of identity-related violence and marginalization. Much of her work is focused on online communities and how these spaces can support collaborative sense-making for the adoption and use of emerging technologies, particularly for marginalized communities and topics. Her dissertation project, “Smart Homes, Smart Harms: Understanding Risks, Impacts, and Support-Seeking in Cases of Internet of Things-Mediated Intimate Partner Violence”, centers on using qualitative methodologies to understand how sensor-based computing devices that make up the Internet of Things intersect with trajectories of intimate partner abuse, with an emphasis support-seeking strategies, barriers, and outcomes.

phd cyber security ucl

  • 13 January 2022 Mohamed Khamis, University of Glasgow Security and Privacy in the Age of Ubiquitous Computing [ Recording ] Abstract: Today, a thermal camera can be bought for < £150 and used to track the heat traces your fingers produced when entering your password on your keyboard. We recently found that thermal imaging can reveal 100% of PINs entered on smartphones up to 30 seconds after they have been entered. Other ubiquitous sensors are continuously becoming more powerful and affordable. They can now be maliciously exploited even by average non-tech-savvy users. The ubiquity of smartphones can itself be a threat to privacy; with personal data being accessible essentially everywhere, sensitive information can easily become subject to prying eyes. There is a significant increase in the number of novel platforms in which users need to perform secure transactions (e.g., payments in VR stores), yet we still use technologies from the 1960s to secure access to them. Mohamed will talk about the implications of these developments and his work in this area with a focus on the challenges, opportunities, and directions for future work. Bio : Dr Mohamed Khamis is a lecturer at the University of Glasgow’s School of Computing Science, where he leads research into Human-centered Security. Mohamed and his team a) investigate how ubiquitous sensors impact privacy, security and safety, and b) design user-centered approaches to overcome these threats. For example, he is currently studying how thermal cameras can be used maliciously to infer sensitive input on touchscreens and keyboards. He also collaborates with Facebook/Meta Reality Labs to uncover how Augmented and Virtual Reality headsets pose significant privacy risks to their users and bystanders in their vicinity. He has 90+ publications in TOCHI, CHI, IMWUT, UIST and other top human-computer interaction and usable security and privacy publication venues. He has served on the program committee of CHI since 2019, and he is an editorial board member of IMWUT and the International Journal on Human-Computer Studies. His research is supported by the UK National Cyber Security Centre, the UK Engineering & Physical Sciences Research Council, PETRAS, REPHRAIN, the Royal Society of Edinburgh and Facebook Reality Labs. Mohamed received his PhD from Ludwig Maximilian University of Munich.

phd cyber security ucl

  • 11 February 2021 Craig Costello, Microsoft Finding twin smooth integers for isogeny-based cryptography Virtual
  • 17 December 2020 Michael Veale, UCL Law The use and (potential) abuse of privacy-preserving infrastructures Virtual
  • 10 December 2020 Chelsea Komlo, University of Waterloo Introducing FROST: Flexible Round-Optimized Schnorr Threshold Signatures Virtual
  • 3 December 2020 Ryan Castelucci, White Ops BitCry Virtual
  • 26 November 2020 Arianna Trozze, UCL Explaining Prosecution Outcomes for Cryptocurrency-based Financial Crimes Virtual
  • 19 November 2020 Henry Skeoch, UCL Cyber-insurance: what is the right price? Virtual
  • 12 November 2020 Antonis Papasavva, UCL “Go back to Reddit!”: Detecting Hate and Analyzing Narratives of Online Fringe Communities Virtual
  • 5 November 2020 Alin Tomescu, VMware Authenticated Data Structures for Stateless Validation and Transparency Logs Virtual
  • 28 May 2020 Henry Corrigan-Gibbs, EPFL Private Information Retrieval with Sublinear Online Time Virtual
  • 7 May 2020 Fabio Pierazzi, King’s College London Intriguing Properties of Adversarial ML Attacks in the Problem Space Virtual
  • 11 March 2020 Yang Zhang, CISPA Helmholtz Center for Information Security Towards Understanding Privacy Risks of Machine Learning Models Malet Place Engineering Building 6.12A
  • 5 March 2020 Gene Tsudik, UC Irvine Reconciling security and real-time constraints for simple IoT devices Main Quad Pop Up 101
  • 12 December 2019 Mathieu Baudet, Facebook Calibra LibraBFTv2: Optimistically-linear BFT Consensus with Concrete Latency Bounds Roberts 421
  • 21 November 2019 Ilias Leontiadis, Samsung AI Learnings from industrial research on privacy and machine learning on wireless networks Roberts 421
  • 8 November 2019 Ian Goldberg, University of Waterloo Walking Onions: Scaling Anonymity Networks while Protecting Users Malet Place Engineering Building 1.03
  • 7 November 2019 Enrico Mariconti, UCL “You Know What to Do”: Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks Drayton House B03 Ricardo LT
  • 31 October 2019 Bristena Oprisanu, UCL How Much Does GenoGuard Really “Guard”? An Empirical Analysis of Long-Term Security for Genomic Data Drayton House B03 Ricardo LT
  • 17 October 2019 Kirill Nikitin, EPFL Reducing Metadata Leakage from Encrypted Files and Communication with PURBs Drayton House B03 Ricardo LT
  • 10 October 2019 Grace Cassey, CyLon First Steps Towards Building a Cybersecurity Spinout Drayton House B03 Ricardo LT
  • 3 October 2019 Nicolas Kourtellis, Telefonica Research Online user tracking and personal data leakage in the big data era Roberts Building G06
  • 5 September 2019 Simon Parkin and Albesa Demjaha, UCL “You’ve left me no choices”: Security economics to inform behaviour intervention support in organizations Roberts 309
  • 15 August 2019 Guillermo Suarez de Tangil Rotaeche, King’s College London A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth Roberts 309
  • 8 August 2019 Savvas Zannettou, Cyprus University of Technology Towards Understanding the Behavior of State-Sponsored Trolls and their Influence on the Web Roberts 309
  • 8 August 2019 Haaroon Yousaf, UCL Tracing Transactions Across Cryptocurrency Ledgers Roberts 309
  • 1 August 2019 Simon Parkin, UCL Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling Roberts 309
  • 25 July 2019 Matthew Wixey, UCL Sound Effects: Exploring Acoustic Cyber-Weapons Roberts 309
  • 18 July 2019 Prof. Dr. Christian Hammer, Uni Potsdam Security and Privacy Issues due to Android Intents Roberts 309
  • 4 July 2019 Alexandros Mittos, UCL Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective Roberts 309
  • 28 June 2019 Battista Biggio, University of Cagliari Wild Patterns: Ten Years after the Rise of Adversarial Machine Learning Alan Turing Institute, Jack Good Meeting Room
  • 27 June 2019 Colin Ife, UCL Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web Roberts 309
  • 10 June 2019 Matthew Wright, Rochester Institute of Technology Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning Roberts 309
  • 12 June 2019 Houman Homayoun, George Mason University Towards Hardware Cybersecurity Roberts 309
  • 30 May 2019 Nissy Sombatruang, UCL The Continued Risks of Public Wi-Fi and Why Users Keep Using It Roberts 309
  • 16 May 2019 Andrei Sabelfeld, Chalmers University of Technology Securing IoT Apps Roberts 309
  • 9 May 2019 Ilia Shumailov, University of Cambridge Towards Adversarial Sample Detection in Constraint Devices, Key Embedding and Neural Cryptography Roberts 309
  • 2 May 2019 Shi Zhou, UCL Twitter Botnets Detection – Star Wars and Failure of Supervised Learning Roberts 309
  • 25 April 2019 Adria Gascon, Alan Turing Institute Privacy-Preserving Data Analysis: Proofs, Algorithms, and Systems Roberts 309
  • 28 March 2019 Enrico Mariconti, UCL One Does Not Simply Walk Into Mordor A PhD Journey in Malicious Behavior Detection Roberts 309
  • 28 February 2019 Jonathan Lusthaus, Oxford University Industry of Anonymity: Inside the Business of Cybercrime Roberts 309
  • 14 February 2019 Simon Parkin, UCL Device Purchase as an Opportune Moment for Security Behavior Change / Perceptions and Reality of Windows 10 Home Edition Update Features Roberts 309
  • 7 February 2019 Mustafa Al-Bassam, UCL Fraud Proofs: Maximising Light Client Security and Scaling Blockchains with Dishonest Majorities Roberts 309
  • 29 January 2019 Alvaro Garcia-Perez, IMDEA Software Institute Federated Byzantine Quorum Systems Roberts 309
  • 31 January 2019 Vid Simoniti, University of Liverpool Deception and Politics Online: A Philosophical Approach Roberts 309
  • 17 January 2019 Soteris Demetriou, Imperial College London Security and Privacy Challenges in User-Facing, Complex, Interconnected Environments Roberts 309
  • 13 December 2018 Mark Goodwin, Mozilla Fixing Revocation: How We Failed and How We’ll Succeed Roberts 309
  • 17 December 2018 Nick Spooner, UC Berkeley Aurora: Transparent zkSNARKs for R1CS Robert 309
  • 6 December 2018 Konstantinos Chalkias, R3 Hash-Based Post-Quantum Signatures Tailored to Blockchains Roberts 309
  • 15 November 2018 Lucky Onwuzurike, UCL Measuring and Mitigating Security and Privacy Issues on Android Applications Roberts 309
  • 8 November 2018 Emiliano De Cristofaro, UCL On the Origins of Memes by Means of Fringe Web Communities Roberts 309
  • 1 November 2018 Didem Özkul, UCL Location (un)intelligence: Politics and limitations of location-based profiling Roberts 309
  • 11 October 2018 Ranjan Pal, University of Cambridge Privacy Trading in the Apps and IoT Age: Markets and Computation Roberts 309
  • 4 October 2018 Jonathan Spring, UCL Towards Scientific Incident Response Roberts 309
  • 30 August 2018 Apoorvaa Deshpande, Brown University Fully Homomorphic NIZK Proofs Roberts 421
  • 23 August 2018 Lucky Onwuzurike, UCL A Family of Droids–Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis Roberts 421
  • 23 August 2018 Neema Kotonya, UCL Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social Network Roberts 421
  • 9 August 2018 Luca Melis, UCL Public PhD Talk: Building and Evaluating Privacy-Preserving Data Processing Systems Roberts 421
  • 2 August 2018 Lina Dencik, Cardiff University Understanding data in relation to social justice Roberts 421
  • 19 July 2018 Sarah Meiklejohn and Mathilde McBride, UCL When technology and policy conflict: Distributed Ledgers and the GDPR right to be forgotten Roberts 421
  • 9 July 2018 Lujo Bauer, Carnegie Mellon University Back to the Future: From IFTTT to XSS, it’s all about the information-flow lattice Malet 1.03
  • 11 July 2018 Farinaz Koushanfar, UC San Diego Deep Learning on Private Data MPEB 1.03
  • 5 July 2018 Kat J. Cecil, UCL Talking whiteness: Black women’s narratives of working in UK Higher Education Roberts 421
  • 14 June 2018 Leonie Tanczer, UCL Gender and IoT: Discussing security principles for victims of Internet of Things (IoT)-supported tech abuse Roberts 421
  • 7 June 2018 Gareth Tyson, Queen Mary University of London Facebook (A)Live? Are live social broadcasts really broadcasts? Roberts 421
  • 31 May 2018 Ralph Holtz, University of Sydney Are we there yet? HTTPS security 7 years after DigiNotar Roberts 421
  • 17 May 2018 Andelka Phillips, Trinity College Dublin Of Contracts and DNA - Reading the fine print when buying your genetic self online Roberts 421
  • 10 May 2018 Jonathan Spring, UCL Meta-Issues in Information Security: Let’s talk about publication bias Roberts 421
  • 3 May 2018 Luca Viganò, Kings College A Formal Approach to Cyber-Physical Attacks Roberts 421
  • 30 April 2018 Jeremy Blackburn, University of Alabama at Birmingham Data-driven Research for Advanced Modeling and Analysis or: How I Learned to Stop Worrying and Love the DRAMA MPEB 1.20
  • 12 April 2018 Jonathan Bootle, UCL Cryptanalysis of Compact-LWE Roberts 421
  • 5 April 2018 Mustafa Al-Bassam, UCL Chainspace: A Sharded Smart Contracts Platform Roberts 421
  • 22 March 2018 Shehar Bano, UCL Meta-Issues in Information Security: Ethical Issues in Network Measurement Main Quad Pop-Up 102
  • 15 March 2018 Paul Grubbs, Cornell University Message Franking: From Invisible Salamanders to Encryptment Main Quad Pop-Up 102
  • 8 March 2018 Kasper Bonne Rasmussen, Oxford University Device Pairing at the Touch of an Electrode Main Quad Pop-Up 102
  • 1 March 2018 Apostolos Pyrgelis, UCL Knock Knock, Who’s There? Membership Inference on Aggregate Location Data Main Quad Pop-Up 102
  • 1 March 2018 Kit Smeets, UCL Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto Main Quad Pop-Up 102
  • 8 February 2018 Jaya Klara Brekke, Durham University Tracing Trustlessness Main Quad Pop-Up 102
  • 1 February 2018 Ben Livshits, Imperial College London Research Challenges in a Modern Web Browser Main Quad Pop-Up 102
  • 25 January 2018 Tristan Caulfield, UCL Meta-Issues in Information Security: fake news as a security incident Main Quad Pop-Up 102
  • 18 January 2018 Jamie Hayes, UCL Adversarial Machine Learning Main Quad Pop-Up 102
  • 11 January 2018 Mark Handley, UCL Meltdown and Spectre vulnerabilities: What went wrong? Roberts 508
  • 14 December 2017 Benedikt Bünz, Stanford University Bulletproofs: Short Proofs for Confidential Transactions and More Roberts 508
  • 7 December 2017 Luca Melis, UCL Differentially Private Mixture of Generative Neural Networks Roberts 508
  • 30 November 2017 Steven Murdoch, UCL Working with the media Roberts 508
  • 23 November 2017 Jonathan Bootle, UCL Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability Roberts 508
  • 16 November 2017 Alice Hutchings, University of Cambridge Cybercrime in the sky Roberts 508
  • 9 November 2017 Mobin Javed, Uc Berkeley Mining Large-Scale Internet Data to Find Stealthy Abuse Roberts 508
  • 3 November 2017 Alexander Koch, Karlsruhe Institute of Technology The Minimum Number of Cards in Practical Card-based Protocols MPEB 6.12
  • 26 October 2017 Vincent Primault, UCL Evaluating and Configuring Location Privacy Protection Mechanisms Roberts 508
  • 19 October 2017 Changyu Dong, Newcastle University Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing Roberts 508
  • 12 October 2017 Arthur Gervais, ETH Zurich On the Security and Scalability of Proof of Work Blockchains Roberts 508
  • 5 October 2017 Raphael Toledo, UCL Mix-ORAM: Towards Delegated Shuffles Roberts 508
  • 5 October 2017 Ania Piotrowska, UCL AnNotify: A Private Notification Service Roberts 508
  • 28 September 2017 Nicolas Christin, Carnegie Mellon University Bridging large-scale data collection and analysis Roberts G08
  • 14 September 2017 Jonathan Spring, UCL Practicing a Science of Security: A Philosophy of Science Perspective Roberts G08
  • 24 August 2017 Francois Labreche, École Polytechnique de Montreal POISED: Spotting Twitter Spam Off the Beaten Paths Gordon Street(25)
  • 10 August 2017 Ian Miers, Johns Hopkins University ZCash: past, present, and future of an Anonymous Bitcoin like Crypto-Currency Gordon Street(25)
  • 3 August 2017 Patrick McCorry, UCL Applications of the Blockchain using Cryptography Gordon Street(25)
  • 31 July 2017 Sanaz Taheri Boshrooyeh, Koç University Inonymous: Anonymous Invitation-Based System Roberts
  • 31 July 2017 Devris Isler, Koç University Threshold Single Password AuthenticationThreshold Single Password Authentication Roberts
  • 20 July 2017 Prof Adam O’Neill, Georgetown University New Results on Secure Outsourced Database Storage Gordon Street(25)
  • 13 July 2017 Apostolos Pyrgelis, UCL What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy Gordon Street(25)
  • 6 July 2017 Prof Negar Kiyavash, UIUC Adversarial machine learning: the case of optimal attack strategies against recommendation systems Gordon Street(25)
  • 22 June 2017 Prof Jintai Ding, University of Cincinnati Post Quantum key Exchange Gordon Street(25)
  • 15 June 2017 Guillermo Suárez-Tangil, UCL How to deal with that many apps: towards the use of lightweight techniques on the detection of mobile malware Gordon Street(25)
  • 6 June 2017 Prof Adam Doupé, Arizona State University The Effectiveness of Telephone Phishing Scams and Possible Solutions MPEB 1.02
  • 1 June 2017 Marjori Pomarole, Facebook Automatic Learning and Enforcement of Authorization Rules in Online Social Networks Gordon Street(25)
  • 4 May 2017 Ruba Abu-Salma, UCL Obstacles to the Adoption of Secure Communication Tools Gordon Street(25)
  • 27 April 2017 Anna Squicciarini, Penn State University Toward Controlling Malicious Users in Online Social Platforms Roberts 309
  • 6 April 2017 Paul Simmonds, Global Identity Foundation Fix digital identity! Stop the bad guys Gordon Street(25)
  • 27 March 2017 Brian Witten, Symantec Emerging Security Research at Symantec Research Labs MPEB 103
  • 23 March 2017 Shehar Bano, UCL Characterization of Internet Censorship from Multiple Perspectives Gordon Street(25)
  • 16 March 2017 Prof Foteini Baldimtsi, UCL TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub Gordon Street(25)
  • 9 March 2017 Katriel Cohn-Gordon, Oxford University Post-compromise Security and the Signal Protocol Gordon Street(25)
  • 2 March 2017 Hamish, UK Civil Service Perspectives on the Investigatory Powers Act Gordon Street(25)
  • 23 February 2017 Mohammad Hajiabadi, UCL Limitations of black-box constructions in cryptography Gordon Street(25)
  • 16 February 2017 Joanne Woodage, Royal Holloway, University of London Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Gordon Street(25)
  • 9 February 2017 Enrico Mariconti, UCL MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models Gordon Square (16-18) 101
  • 9 February 2017 Arman Khouzani, QMUL Universally Optimal Design For Minimum Information Leakage Gordon Square (16-18) 101
  • 2 February 2017 Prof Carlos Cid, Royal Holloway, University of London A Model for Secure and Mutually Beneficial Software Vulnerability Sharing in Competitive Environments Gordon Street(25)
  • 26 January 2017 Gerard Briscoe, UCL Designing Digital Cultures For Preferable Futures Gordon Street(25)
  • 19 January 2017 Vasilios Mavroudis, UCL On the Privacy and Security of the Ultrasound Ecosystem Gordon Street(25)
  • 7 December 2016 Lorenzo Cavallaro, Royal Holloway, University of London CopperDroid: Automatic Android Malware Analysis and Classification Anatomy G29
  • 1 December 2016 Alexandra Silva, UCL Automata learning - infinite alphabets and application to verification Gordon Street(25)
  • 24 November 2016 Peter Scholl, University of Bristol Identifying Cheaters in Secure Multi-Party Computation Gordon Street(25)
  • 24 November 2016 Gunes Acar, KU Leuven Advanced online tracking: A look into the past and the future Gordon Street(25)
  • 17 November 2016 Christophe Petit, Oxford University Post-quantum cryptography based on supersingular isogeny problems? Gordon Street(25)
  • 9 November 2016 Mary Maller, UCL Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions Roberts 309
  • 9 November 2016 Jeremiah Onaolapo, UCL Understanding The Use Of Leaked Webmail Credentials Roberts 309
  • 3 November 2016 N Asokan, Aalto University Technology Transfer from Security Research Projects: A Personal Perspective Gordon Street(25)
  • 27 October 2016 Apostolos Pyrgelis, UCL Privacy-Friendly Mobility Analytics using Aggregate Location Data Gordon Street(25)
  • 13 October 2016 Kostas Chatzikokolakis, LIX, École Polytechnique Geo-indistinguishability: A Principled Approach to Location Privacy Gordon Street(25)
  • 29 September 2016 Sune K. Jakobsen, UCL Cryptogenography: Anonymity without trust Roberts 110
  • 22 September 2016 Lukasz Olejnik, UCL Designing Web with Privacy MPEB 1.02
  • 15 September 2016 Pengfei Wang, National University of Defense Technology How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel Engineering Front Executive Suite 103
  • 15 September 2016 Liqun Chen, HP Cryptography in Practice Engineering Front Executive Suite 103
  • 5 August 2016 Sanjay K. Jha, University of New South Wales A Changing Landscape: Securing The Internet Of Things (IoT) MPEB 1.02
  • 28 July 2016 Delphine Reinhardt, University of Bonn Roberts 110
  • 26 July 2016 Gilles Barthe, IMDEA Software Institute Language-based techniques for cryptography and privacy Computer Science Distinguished Letcture, MPEB 1.02*
  • 14 July 2016 Yvo Desmedt, UCL, UT Dallas Internet Voting on Insecure Platforms Roberts 110
  • 7 July 2016 Sebastian Meiser, UCL Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms against Structural Attacks MPEB 1.04
  • 7 July 2016 Jonathan Bootle, UCL How to do Zero Knowledge from Discrete Logs in under 7kB MPEB 1.04
  • 30 June 2016 Raphael Toledo, UCL Roberts 110
  • 23 June 2016 Maura Paterson,, Birkbeck Algebraic Manipulation Detection Codes and Generalized Difference Families Roberts 422
  • 16 June 2016 Simon Parkin, UCL Productive Security: A scalable methodology for analysing employee security behaviours Robers 309
  • 10 June 2016 Eran Toch, Tel Aviv University Not Even Past: Longitudinal Privacy in Online Social Networks Roberts 508
  • 9 June 2016 Ingolf Becker, UCL International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms Roberts 110
  • 26 May 2016 David Bernhard, Bristol University Ballot Privacy Roberts 110
  • 19 May 2016 Panagiotis Andriotis, UCL Digital Forensics: Retrieving Evidence from Mobile Devices Roberts 110
  • 12 May 2016 Prof Aris Pagourtzis, NTUA Reliable Message Transmission Despite Limited Knowledge and Powerful Adversaries Roberts 110
  • 28 April 2016 Pyrros Chaidos, UCL Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting Roberts 110
  • 21 April 2016 Mirco Musolesi, UCL Identity and Identification in the Smartphone Era Roberts 110
  • 14 April 2016 Robin Wilton, The Internet Society Trust, Ethics and Autonomy - the ethics of the Internet Roberts 4.22
  • 7 April 2016 Prof Kenny Paterson, Royal Holloway,University of London Cryptographic Vulnerability Disclosure - The Good, The Bad, and The Ugly Roberts 110
  • 31 March 2016 Gábor Gulyás, Inria Taking Re-identification Attacks of Social Networks to the Next Level Roberts 110
  • 24 March 2016 Prof Jens Groth, UCL Cryptography for Eagles Roberts 110
  • 17 March 2016 Wouter Lueks, University of Nijmegen Distributed encryption and applications Roberts 110
  • 10 March 2016 Bingsheng Zhang, Lancaster University On Secure E-voting systems — End-2-end Verifiability, Privacy, Scalability, Accountability Roberts 110
  • 9 March 2016 Ben Livshits, Microsoft Research Redmond Finding Malware at Web Scale CS Seminar, Medawar G02 Watson LT*
  • 3 March 2016 Prof Aurélien Francillon, Eurecom Trust, but verify: why and how to establish trust in embedded devices Roberts 110
  • 25 February 2016 Prof Fabio Massacci, University of Trento Cyberinsurance: good for your company, bad for your country? MPEB 6.12
  • 18 February 2016 Luca Melis, UCL Efficient Private Statistics with Succinct Sketches Roberts 110
  • 18 February 2016 Sheharbano Khattak, University of Cambridge Do You See What I See? Differential Treatment of Anonymous Users Roberts 110
  • 15 February 2016 Cecilie Oerting, UCL Shining Light on Darknet: Does anonymity disinhibit user behavior on underground marketplaces? Roberts 110
  • 11 February 2016 Tristan Caulfield, UCL Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption Roberts 110
  • 11 February 2016 Simon Parkin, UCL Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement Technology Roberts 110
  • 11 February 2016 Simon Parkin, UCL An Exploratory Study of User Perceptions of Payment Methods in the UK and the US Roberts 110
  • 28 January 2016 Jonathan Spring, UCL Avoiding pseudoscience: prudence, logic, and verification in studying information security Roberts 110
  • 21 January 2016 Marcel Keller, Bristol University Malicious-for-free OT Extension and Its Application to MPC Roberts 110
  • 14 January 2016 Anil Madhavapeddy, University of Cambridge Unikernels: Library operating systems for the masses Roberts 110
  • 17 December 2015 Peter Ryan, University of Luxembourg Voting with Transparent Verification and Coercion Mitigation MPEB 6.12
  • 10 December 2015 Kasper Bonne Rasmussen, University of Oxford Efficient and Scalable Oblivious User Matching Birbeck B30
  • 3 December 2015 Bruce Christianson, University of Hertfordshire Implementing Impossible Requirements - changing the role of trust in secure systems design Torrington (1-19) 115 Galton LT
  • 27 November 2015 Alexandros Kapravelos, NCSU Analyzing and understanding in depth malicious browser extensions MPEB 6.12
  • 26 November 2015 Prof Bhavani Thuraisingham, University of Texas Cloud-Centric Assured Information Sharing Birkbeck B30
  • 19 November 2015 Sergio Maffeis, Imperial College Language based Web security Birkbeck B30
  • 17 November 2015 Geoffroy Couteau, ENS Encryption Switching Protocols Roberts 4.21
  • 12 November 2015 Seny Kamara, Microsoft Research Inference Attacks on Property-Preserving Encrypted Databases MPEB 1.02
  • 12 November 2015 Melissa Chase, Microsoft Research Algebraic MACs and Lightweight Anonymous Credentials MPEB 1.02
  • 6 November 2015 Radu Sion, Stony Brook University Privacy, Security, and Energy in Modern Clouds. Three Buzzwords in A Boat: The Amusing Adventures of a Naive Academic on Wall Street MPEB 6.12
  • 30 October 2015 Prof Susanne Bødker, Aarhus University Experiencing Security MPEB 1.02
  • 29 October 2015 Benoit Libert, ENS Lyon Fully secure functional encryption for linear functions from standard assumptions Birkbeck B30
  • 15 October 2015 Thomas Peters, ENS Paris Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions Birkbeck B30
  • 8 October 2015 Henrik Ziegeldorf, RWTH Aachen University Secure and Anonymous Decentralized Bitcoin Mixing Birbeck B30
  • 2 October 2015 Khilan Gudka, University of Cambridge Clean Application Compartmentalization with SOAAP Roberts 309
  • 1 October 2015 Prof Chris Mitchell, Royal Holloway Real-world security analyses of OAuth 2.0 and OpenID Connect Birkbeck B30
  • 24 September 2015 Dr. Ana Salagean, Loughborough University Higher order differential attacks on stream ciphers MPEB 1.02
  • 18 September 2015 Pyrros Chaidos, UCL Short Accountable Ring Signatures Based on DDH MPEB 1.02
  • 10 September 2015 Sarah Meiklejohn, UCL Centrally Banked Cryptocurrencies Birkbeck B30
  • 27 August 2015 Odette Beris, UCL The Behavioural Security Grid (BSG) Risk and Emotion Roberts 422
  • 27 August 2015 Steve Dodier-Lazaro, UCL Appropriation and Principled Security Roberts 422
  • 27 August 2015 Simon Parkin, UCL Title: Appropriation of security technologies in the workplace Roberts 422
  • 20 August 2015 Oliver Hohlfeld, Aachen University An Internet Census Taken by an Illegal Botnet Roberts 421
  • 20 August 2015 Dali Kaafar, NICTA How smart is our addiction? Some experimental analyses of Security and Privacy in the mobile apps ecosystem Roberts 421
  • 13 August 2015 Steve Dodier-Lazaro, UCL Research tools for remote user studies within UCL ISRG Roberts 309
  • 30 July 2015 Ingolf Becker, UCL Applying Sentiment Analysis to Identify Different Conceptions of Security and Usability MPEB 1.02
  • 30 July 2015 Kat Krol, UCL “Too taxing on the mind!” Authentication grids are not for everyone MPEB 1.02
  • 23 July 2015 Gareth Tyson, Queen Mary Is your VPN keeping you safe? MPEB 1.02
  • 9 July 2015 Andreas M. Antonopoulos, University of Nicosia Consensus algorithms, blockchain technology and bitcoin Roberts G06 Sir Ambrose Fleming LT
  • 2 July 2015 Gennaro Parlato, University of Southampton Security Analysis of Self-Administrated Role-Based Access Control through Program Verification South Wing 9 Garwood LT
  • 25 June 2015 Mauro Migliardi, University of Padova Green, Energy-Aware Security? What are we talking about? And Why? MPEB 1.02
  • 18 June 2015 Elisabeth Oswald, University of Bristol Making the most of leakage Roberts 421
  • 11 June 2015 Lucky Onwuzurike, UCL Danger is My Middle Name - Experimenting with SSL Vulnerabilities on Android Apps Torrington (1-19) 115 Galton LT
  • 11 June 2015 Emiliano de Cristofaro, UCL Controlled Data Sharing for Collaborative Predictive Blacklisting Torrington (1-19) 115 Galton LT
  • 3 June 2015 Matthew Smith, University of Bonn System Security meets Usable Security – Administrators and Developers are humans too MPEB 1.02
  • 4 June 2015 Ben Smith, École Polytechnique (Slightly) more practical quantum factoring MPEB 1.20
  • 28 May 2015 Jamie Hayes, UCL Guard Sets for Onion Routing MPEB 1.02
  • 28 May 2015 Angela Sasse, UCL Current and emerging attacks on banking systems: report from a practitioner workshop MPEB 1.02
  • 21 May 2015 Sandra Scott-Hayward, Queen’s University Belfast Design for deployment of Secure, Robust, and Resilient Software-Defined Networks MPEB 1.02
  • 21 May 2015 Michiel Kosters, Nanyang Technological University The last fall degree and an application to HFE MPEB 1.02
  • 14 May 2015 Mariana Raykova, SRI International Candidate Indistinguishability Obfuscation and Applications Roberts 309
  • 14 May 2015 Marco Cova, Lastline, Inc. Analyzing Malware at Scale Roberts 309
  • 12 May 2015 Luciano Bello, Chalmers Technical University Information-flow tracking for web technologies MPEB 1.03
  • 7 May 2015 Martin Albrecht, RHUL So, how hard is this LWE thing, anyway? MPEB 1.03
  • 30 April 2015 Steve Brierley, University of Cambridge The impact of quantum computing on cryptography Roberts 309
  • 23 April 2015 Prof Mark Ryan , Birmingham University Du-Vote: Remote Electronic Voting with Untrusted Computers MPEB 1.03
  • 16 April 2015 Emiliano De Cristofaro, UCL The Genomics Revolution: Innovation Dream or Privacy Nightmare? MPEB 1.03
  • 9 April 2015 Essam Ghadafi, UCL Decentralized Traceable Attribute-Based Signatures MPEB 1.03
  • 26 March 2015 Pyrros Chaidos, UCL Making Sigma-protocols Non-interactive and Building Referendums without Random Oracles MPEB 1.02
  • 19 March 2015 Paul Burton, University of Bristol DataSHIELD: taking the analysis to the data not the data to the analysis MPEB 1.03
  • 12 March 2015 Markulf Kohlweiss, Microsoft Research Triple Handshake: Can cryptography, formal methods, and applied security be friends? MPEB 1.03
  • 5 March 2015 J. Clark, G. Eydmann, Wynyard Group Wynyard Group – Advance Crime Analytics for Foreign Fighters Analysis MPEB 1.03
  • 26 February 2015 Nicolas Courtois, UCL Bad randoms, key management and how to steal bitcoins MPEB 1.03
  • 19 February 2015 Emil Lupu, Imperial College On the Challenges of Detecting and Diagnosing Malicious Data InjectionsOn the Challenges of Detecting and Diagnosing Malicious Data Injections MPEB 1.03
  • 12 February 2015 Ian Goldberg, University of Waterloo Ibis: An Overlay Mix Network for Microblogging MPEB 1.03
  • 5 February 2015 David Clark, UCL Detecting Malware with Information Complexity MPEB 1.03
  • 29 January 2015 K. Krol, I. Kirlappos, UCL Upcoming papers at NDSS Usable Security Workshop (USEC’15) MPEB 1.03
  • 19 January 2015 Ben Livshits, Microsoft Research PrePose: Security and Privacy for Gesture-Based Programming MPEB 6.12
  • 22 January 2015 Ioannis Papagiannis, Facebook Uncovering Large Groups of Active Malicious Accounts in Online Social Networks MPEB 1.03
  • 15 January 2015 Tristan Caulfield, UCL Modelling Security Policy MPEB 1.03
  • 12 January 2015 Alptekin Küpçü, Koç University Single Password Authentication MPEB 6.12
  • 18 December 2014 Jon Crowcroft, University of Cambridge Can we build a Europe-only cloud, and should we? Roberts 110
  • 11 December 2014 Ian Brown, Oxford Internet Institute The feasibility of transatlantic privacy-protective standards for surveillance Roberts 110
  • 4 December 2014 Nik Whitfield, Panaseer Adventures in cyber risk metrics and anomaly detection for Insider and APT Roberts 110
  • 27 November 2014 George Danezis, UCL An Automated Social Graph De-anonymization Technique Roberts 110
  • 20 November 2014 Vasileios Routsis, UCL The evolution of online self-disclosure and privacy ethics. Normalising modern-day surveillance Roberts 110
  • 13 November 2014 Mike Bond, Cryptomathic EMV Pre-Play and Relay Attacks - A New Frontier Roberts 110
  • 31 October 2014 Prof Stefan Dziembowski, University of Warsaw Bitcoin contracts — digital economy without lawyers? MPEB 1.02
  • 16 October 2014 Emiliano De Cristofaro, UCL What’s wrong with the Interwebs? Recent results measuring Web Filtering and Facebook Like Fraud Roberts 110
  • 9 October 2014 Giovanni Vigna, UC Santa Barbara Eliciting maliciousness: from exploit toolkits to evasive malware Roberts 110
  • 18 September 2014 Adrian Perrig, ETH Zurich PoliCert: A Highly Resilient Public-Key Infrastructure MPEB 6.12
  • 12 September 2014 Andelka Phillips, Oxford University Genetic Testing Goes Online An overview of the industry and the challenges for regulators MPEB 6.12
  • 8 September 2014 Martin Emms, Newcastle University Is the future of credit card fraud contactless? MPEB 6.12
  • 4 September 2014 Christophe Petit, UCL On the complexity of the elliptic curve discrete logarithm problem for binary curves MPEB 6.12
  • 7 August 2014 Susan E. McGregor, Columbia University Communicating Securely, Communicating Security: Information Security Issues for Journalists MPEB 6.12
  • 22 July 2014 Gene Tsudik, UC Irvine Elements of Trust in Named-Data Networking MPEB 1.02
  • 10 July 2014 Angela Sasse, UCL What security practitioners really think about usability – Insights from 3 case studies MPEB 6.12
  • 26 June 2014 Amir Herzberg, Bar-Ilan University AnonPoP: the Anonymous Post-Office Protocol MPEB 1.20
  • 26 June 2014 Srdjan Capkun, ETH Zurich Selected Results in Location-Based Security MPEB 6.12
  • 12 June 2014 Steve Dodier-Lazaro, UCL Towards systematic application sandboxing on Linux MPEB 6.12
  • 29 May 2014 Ivan Martinovic, Oxford University Fasten Your Seatbelts – An Overview and Security Considerations of Next Generation Air Traffic Communication MPEB 6.12
  • 15 May 2014 Odette Beris and Tony Morton, UCL Employee Risk Understanding and Compliance: Looking Through a Johari Window MPEB 6.12
  • 1 May 2014 Flavio Garcia, University of Birmingham The Pitfalls of Cyber-Security Research: From an Ethical and Legal Perspective MPEB 6.12
  • Boise State News
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn
  • Share through Email
  • Health, Science and Technology
  • News for the Campus Community

Cybersecurity and AI scholarships available for undergraduate and graduate students

There is an urgent need for cybersecurity and artificial intelligence (AI) experts dedicated to public service.

Through the BRONCO SHIELD (Securing Homeland Infrastructure through cybersecurity scholars Development) program, CyberCorps® Scholarship for Service (SFS) seeks to address this need by awarding scholarships to a diverse group of undergraduate, master’s and doctoral students at Boise State.

The program aims to offer scholars comprehensive exposure to integrated AI and cybersecurity, fostering the development of robust, reliable and trustworthy cybersecurity systems. Additionally, it provides professional development to the scholars, preparing them to transition into cybersecurity professionals equipped to serve in public sector organizations, safeguarding the nation’s assets from cyber threats.

Throughout each year in the BRONCO SHIELD program, scholars receive comprehensive financial support, which includes:

  • Complete tuition coverage
  • A stipend of $27,000 for undergraduates and $37,000 for graduate students
  • Financial support for health insurance
  • Professional Development Allowance of $6,000

To learn more, visit the CyberCorps® Scholarship for Service website .

Office of Communications and Marketing

Local News | CSUF cybersecurity students compete to hack…

Share this:.

  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to print (Opens in new window)
  • Orange County
  • Things to Do

Local News | CSUF cybersecurity students compete to hack into vulnerable systems

Experience prepares them for jobs.

phd cyber security ucl

Last fall, Cal State Fullerton cybersecurity students competed in the Collegiate Penetration Testing Competition where teams of students from the region met to determine how to hack the security systems of an airport and then presented a report of their findings to executives.

The Cal State Fullerton team of six students placed second in the high-pressure competition, which provided real-world experience that they will bring to the jobs that await them once they graduate. Business sponsors often recruit winners for employment during these events, said Mikhail Gofman, professor of computer science and director of the ECS Center for Cybersecurity in the College of Engineering and Computer Science.

Penetration testing means trying to break through the security systems of a business by using the same tools and techniques that hackers use. If a penetration tester can discover and exploit a vulnerability, Gofman said, then so can an attacker.

“This is often called the security governance,” Gofman said, “the goal of which is to ensure the cybersecurity of the company. It is driven by risk management, and, of course, cyberattacks are a big part of the company risk management, because a cyberattack can have very devastating consequences.”

The regional competition focused on the security systems of an airport. “They weren’t actually real airport systems, but real networks which simulated what a network infrastructure of an airport would look like,” Gofman said. “The students had 12 hours, from morning to night, to conduct the penetration test to find and exploit as many security vulnerabilities as possible.”

Then they had to write a professional penetration testing report that communicated their findings in plain language.

“Our goal as a team was to try to fully compromise the company, given only a set of IP ranges and some scattered fictitious employee information they left on the internet for us to exploit,” said fourth-year student Katherine Chen, who was a member of the winning team.

“You use public information on the internet to impersonate someone and use their information for malicious purposes, which we were successfully able to do,” Chen said. “At the end of the competition, we had to submit a huge report on our findings, which our report detailed to almost about 90 pages. At the end of the day, you want to present your findings to C-level executives who don’t know anything about technology. The report is what makes you win in CPTC.”

To replicate a real work situation, students were interrupted from time to time by pretend executives with a request.

“One example which students told me about was that they were approached by an individual claiming that he was going to have a meeting with the CO in five minutes, and he just wanted to get an update on how they were progressing,” Gofman said. “They had to be able to give a nice, concise, executively digestible formulation of where they were.”

The Cal State Fullerton team participated in a global competition in January but did not place in the top three spots. For the global competition, they had to complete the penetration test, write a report, and give a presentation to the room of mock executives.

“My students worked very hard on this,” Gofman said, praising their energy and enthusiasm, especially those in the Offensive Security Society Club. He also credited the dedicated faculty in the Center for Cybersecurity, who added hands-on experience to cybersecurity classes.

Gofman sees an important role for his students in the world of cybersecurity.

“Here at CSUF, a lot of our students are from underrepresented backgrounds and are first-generation students. I think it’s great to help those students take advantage of this growing job market. We are helping the nation by providing the desperately needed cybersecurity professional expertise while helping people who need to benefit from this demand.”

Many former students work in cybersecurity, and some of Gofman’s current students have lined up jobs ahead of graduation.

Chen is currently interning as a vulnerability researcher at a company based in Virginia. “I really love deeply understanding something, and that is exactly what cyber offers you,” she said. “Cyber is a field of being patient and being very meticulous, looking really hard for just a small hole to wiggle yourself into and wreak havoc. I always loved computer science, and I think cyber is basically computer science on steroids.”

Cybersecurity student Katie Tran, who also participated in the competitions, has landed a job this summer as a cybersecurity analyst at Deloitte, a cybersecurity company.

“My cybersecurity classes with Professor Gofman have prepared me for employment,” she said. “Cybersecurity classes with him cover a huge amount of material in detail, and he ensured that we learned and got hands-on experience with the subjects. He also provided a lot of guidance and coaching for competition.”

  • Newsroom Guidelines
  • Report an Error

More in Local News

Kids follow in their parents footsteps into citizenship during a ceremony at the Nixon library.

Local News | Nixon Library hosts young new citizens taking their oath

The proposed ordinance could be back on the City Council's agenda in May.

Local News | Irvine takes no action on banning protests near residences

Only 811,000 cubic yards of the expected 1.1 million cubic yards were delivered for the long-awaited, $23 million project.

SUBSCRIBER ONLY

Local news | surfside-sunset sand replenishment project complete, but short of goal.

City and congressional leaders are asking the Army Corps to waive the additional cost, arguing sand was never delivered.

Local News | Army Corps of Engineers wants San Clemente to pay $2.6 million more for stalled sand project

IMAGES

  1. Student profiles

    phd cyber security ucl

  2. UCL's Academic Centre of Excellence in Cyber Security Research presents

    phd cyber security ucl

  3. UCL Academic Centre of Excellence in Cyber Security Research (ACE-CSR

    phd cyber security ucl

  4. PHD IN CYBER SECURITY IN UK

    phd cyber security ucl

  5. Working across Government, Academia and Industry: The Role of the NCSC

    phd cyber security ucl

  6. Mission

    phd cyber security ucl

VIDEO

  1. Start Your Coding Journey: Certified Junior Software Developer Training

  2. Live with Restream

  3. WebAppAttackVectorEnumerator 1.0

  4. Smart Phone Security

  5. Studying a Master's degree in Computing and Communications

  6. Dr Sridhar Adepu

COMMENTS

  1. Cybersecurity MPhil/PhD

    UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024, giving you an exciting opportunity to study at one of the world's best universities. UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS).

  2. Centre for Doctoral Training in Cybersecurity

    This exciting collaboration brings together research teams in three of UCL's departments - Computer Science, Security and Crime Science, and Science, Technology, Engineering and Public Policy - in order to increase the capacity of the UK to respond to future information and cybersecurity challenges.

  3. Study

    Year 1. Students complete a portfolio of training elements, which are a requirement of funding under the CDT. In Year 1, students will audit five taught modules to develop their expertise in conceptual foundations, information security management, cybersecurity, and cybercrime. They are also provided with a solid grounding in research methods.

  4. Security and Crime Science MPhil/PhD

    UCL Security and Crime Science is widely recognised for the impact of its research on real-world crime problems. The Department has long-standing links with police forces, policy makers, academic research centres of excellence and security organisations in the UK and internationally. A PhD with us allows you to pursue original research and make a distinct and significant

  5. Cybersecurity MPhil/PhD Program By UCL |Top Universities

    UCL. It has long been recognised that cybersecurity is a 'wicked problem' - one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

  6. Computer Science (4 Year Programme) MPhil/PhD

    The PhD programme in UCL Computer Science is a 4-year programme, in which you will work within research groups on important and challenging problems in the development of computer science. We have research groups that cover many of the leading-edge topics in computer science, and you will be supervised by academics at the very forefront of their field.

  7. About

    UCL is recognized by GCHQ as an Academic Centre of Excellence in Cyber Security Research and Teaching. The departments involved hold active research grants worth £17.9M in cybersecurity, funded by the EPSRC, Royal Society, EU H2020, and the ERC amongst others, including £300K of active direct financial gifts from industrial partners.

  8. PhD scholarships

    The UCL Centre for Doctoral Training in Cybersecurity is an exciting collaboration between three UCL departments: Computer Science (CS), Security and Crime Science (SCS), and Science, Technology, Engineering and Public Policy (STEaPP) and designed to increase the capacity of the UK to respond to future information and cybersecurity challenges.

  9. Cybersecurity MPhil/PhD at UCL (University College London)

    The UK National Cyber Security Strategy 2016-2021 identifies the "cyber skills shortage" as a systemic issue, with estimates suggesting that by 2022 there will be a shortage of 350K cybersecurity professionals. To help fill this gap, our students will be trained in how to address evolving cybersecurity challenges through multidisciplinary ...

  10. Cybersecurity MPhil/PhD at UCL (University College London)

    Find course details for Cybersecurity MPhil/PhD at UCL (University College London) including subject rankings, tuition fees and key entry requirements. ... The UK National Cyber Security Strategy 2016-2021 identifies the "cyber skills shortage" as a systemic issue, with estimates suggesting that by 2022 there will be a shortage of 350K ...

  11. Applying for a PhD

    Route B: Security and Crime Science MPhil/PhD (3 years) Your application must be made online via UCL Select. In order for your application to be considered, it must include the following information: 1. The names and email addresses of TWO potential supervisors who you would like to review your application. 2.

  12. Security Science MRes + MPhil/PhD

    The Department of Security and Crime Science is widely recognised for the impact of its research on real-world crime problems. It has long established links with police forces, policy makers, academic research centres of excellence and security organisations from both the UK and further afield. Our MRes allows students from a wide variety of backgrounds to use our taught

  13. Information Security MSc

    Become a cybersecurity expert through one of the most established Master's programmes in this field. The Information Security MSc provides a core education in all aspects related to cybersecurity, including an opportunity to study a module certified by the National Cyber Security Centre - part of GCHQ. Taught at UCL, world-renowned for computer science research, this is an

  14. 2021/22 student profiles (Cohort 3)

    Jennifer Dwyer-Joyce I'm a current PhD student with the Cybersecurity department at UCL supervised by Dr Steven Murdoch. I graduated with a BSc (Hons) Computer Science from Newcastle University and was looking to further my knowledge in computer science and cybersecurity in a way that is unique to me and that can advance research in the field.

  15. Student Profiles

    I am a PhD Student under the supervision of Prof Emiliano De Cristofaro. In 2016 I received my BSc degree in Computer Science from Frederick University of Cyprus where my research was in the fields of robotics, unmanned surface vehicles, and autopilot software systems. The work and efforts of my BSc research resulted in two IEEE publications ...

  16. 2022/23 student profiles (Cohort 4)

    Pinaki is a cybersecurity CDT student in the Department of Computer Science who works with Professor David Pym. His research focuses on computational logic and its applications to systems modelling, using proof theory and model checking. Read more. University College London, Gower Street, London, WC1E 6BT Tel: +44 (0) 20 7679 2000.

  17. Crime Science with Cybercrime MSc

    UCL is regulated by the Office for Students. The Crime Science with Cybercrime MSc focuses on the drivers, motives, and dynamics of cybercriminal operations, and the various actors involved in carrying these out. Students will gain a foundation in cutting-edge cyber-security technologies, and will develop knowledge of how multidisciplinary ...

  18. A career in cyber security

    I work as a Tech Lead Cyber Data Scientist at G-Research, a fintech organisation. Cyber security is very important for the business. The cyber function collects a huge volume and diversity of data, big data. So my role is to help the cyber analyst sift through the data quicker with the help of data science. One particular area of focus is the ...

  19. Lorenzo Cavallaro Profile

    Lorenzo is Program Co-Chair of Deep Learning and Security 2021, DIMVA 2021-22, and he was Program Co-Chair of ACM EuroSec 2019-20 and General Co-Chair of ACM CCS 2019. He holds a PhD in Computer Science from the University of Milan (2008), held Post-Doctoral and Visiting Scholar positions at Vrije Universiteit Amsterdam (2010-2011), UC Santa ...

  20. List of Cybersecurity PhD Programs

    website. Syracuse University. Online MS in Cybersecurity | Complete in 15 Months. website. University of Pennsylvania. Penn Cybersecurity Bootcamp. website. If you're looking to become a thought leader in this dynamic industry, a PhD in cybersecurity offers an unparalleled opportunity to deepen your expertise and broaden your horizons.

  21. UCL-CS InfSec: Angela's PhD students

    Academic Centre of Excellence for Cyber Security Research. Contact Us. M. Angela Sasse's list of PhD students Current Students. Ruba Abu-Salma, Usable Encryption for the Masses; Nissy Sombatruang, Economic Drivers in Security Decisions ... University College London - Gower Street - London - WC1E 6BT - +44 (0)20 7679 7214 ...

  22. Seminars

    Bio: I am currently a fourth year PhD student, part of the CDT for Cybersecurity and the Information Security group at University College London. My main interests are post-quantum cryptography, specifically isogeny-based protocols, and applications. My main supervisors are Philipp Jovanovic and Sarah Meiklejohn.

  23. How To Become A Cybersecurity Engineer: Salary, Education and ...

    According to Payscale, these engineers make an average base cybersecurity salary of over $101,000. Their wages are likely to increase as they gain experience and earn certifications. Junior ...

  24. Everything You Should Know About Earning A Master's In Cybersecurity

    You can tailor your graduate curriculum to fill marketwide skill gaps, such as cloud computing security, as reported in the 2023 ISC2 Cybersecurity Workforce Study. Opt for a master's program ...

  25. Cybersecurity and AI scholarships available for undergraduate and

    There is an urgent need for cybersecurity and artificial intelligence (AI) experts dedicated to public service. Through the BRONCO SHIELD (Securing Homeland Infrastructure through cybersecurity scholars Development) program, CyberCorps® Scholarship for Service (SFS) seeks to address this need by awarding scholarships to a diverse group of undergraduate, master's and doctoral students at ...

  26. CSUF cybersecurity students compete to hack into vulnerable systems

    Last fall, Cal State Fullerton cybersecurity students competed in the Collegiate Penetration Testing Competition where teams of students from the region met to determine how to hack the security ...

  27. Cybersecurity Certifications For Beginners: Everything You Need To Know

    The cost of a cybersecurity certification ranges from about $250 to around $980. Certifications with lab requirements may cost $1,500 or more. Generally speaking, cybersecurity employers do not ...