Cybersecurity threats are the source of many broad challenges for academic research. The layered, composite nature of today’s cyber systems means that cyber security research challenges tend to be rapidly evolving and that they add to or modify, rather than replace existing issues. They require new approaches, insights and techniques, for example those leveraging the power of data science, machine learning and artificial intelligence. These new techniques can build on and work alongside continuing activity in more established areas such as cryptography, computational privacy, confidential computing, formal methods, software testing, malware analysis and intrusion detection. Areas that may not traditionally have been considered to be enablers of better cybersecurity, such as behavioural science and economics, continue to assume an increasingly important role in the field. 

Imperial has been recognised by EPSRC and the National Cyber Security Centre as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR) continuously since the scheme was first introduced in 2012. Most academics involved in our centre are from the Department of Computing. They lead the Research Institute in Trustworthy Industrial Control Systems (RITICS), co-lead the UK Research Institute on Verified Trustworthy Software Systems (VeTSS), and have played a major role in the creation and running of the PETRAS National (UK) Centre of Excellence for IoT Systems Cybersecurity amongst other initiatives. Our academics have graduated 18 PhD students and currently supervise 25 PhD students working on related projects. They have also held about £25M in funding, through research projects whose majority is led by our academics. Our research funds come from a variety of sources including UKRI, EU, Industry, and Defence.  

Our research groups boast world-leading expertise across a variety of cybersecurity domains including security and privacy in machine learning and artificial intelligence (AI), systems security, software and platform security, infrastructure security, attacks and defenses, and human, organisational and regulatory aspects of cybersecurity and privacy. 

Through collaborations with other departments, we apply interdisciplinary approaches to develop secure and private systems and methods with applications in healthcare, transportation and finance among others. We work with established industrial partners to transfer knowledge to products used by billions of users; we help run, advice or found start-ups to address novel real-world challenges; we work with national and international institutes, working groups and individuals to help shape policy, regulations, and national cybersecurity strategies.  

The following links lead you to related videos describing some of our work, the websites of specific groups working in this area in Computing, and our ACE-CSR and ACE-CSR Affiliate academics. 

Related videos

Should you believe anything you see and interact with online

The twenty first century has already been defined by cyberspace, powering a technology and information revolution that will have a profound impact on societies, industries, and the public sector. Smartphones, augmented reality glasses and 'thinking' robots are examples of how we will feel the influence of cyberspace on what we do and who we are.

Should you believe anything you see and interact with online

Should you believe anything you see and interact with online

The twenty first century has been defined by cyberspace

The twenty first century has already been defined by cyberspace, powering a technology and information revolution that will have a profound impact on societies, industries, and the public sector. Smartphones, augmented reality glasses and 'thinking' robots are examples of how we will feel the influence of cyberspace on what we do and who we are.

Defining the legal and ethical boundaries at the cyber front

Defining the legal and ethical boundaries at the cyber front

The 3rd Vincent Briscoe Annual Security Lecture

The 3rd Vincent Briscoe Annual Security Lecture - "Defining the legal and ethical boundaries at the cyber frontier" - Guest Speaker: The Honorable Michael Chertoff.

Accurate, robust metrics for usable security

Accurate, robust metrics for usable security

A critical part of building secure systems is verifying that they're usable and secure

A critical part of building secure systems is verifying that they're usable and secure in practice, and not just theoretically. This requires accurate and robust metrics for quantifying this "usability" and "practical security". For several years, we've been studying how to help users create passwords that are hard for attackers to crack, but are still easy for users to remember and use.

The dark net: inside the digital underworld

The dark net: inside the digital underworld

Explore the world of dark internet subcultures, crypto-currencies and the hidden web

Explore the world of dark internet subcultures, crypto-currencies and the hidden web. Jamie Bartlett delivers the Vincent Briscoe annual security lecture at Imperial College London.

Research Outputs

You can view our cyber security related publications here.

Academics

ACE-CSR Academics

  • Dr Cristian Cadar

    Personal details

    Dr Cristian Cadar Professor of Software Reliability

    +44 (0)20 7594 8244

    Location

    435, Huxley Building

    Research interests

    Software engineering, computer systems, software security, practical techniques for improving software reliability and security.

  • Professor Yves-Alexandre de Montjoye

    Personal details

    Professor Yves-Alexandre de Montjoye Professor of Applied Mathematics and Computer Science

    Location

    Data Science Institute, William Penney Laboratory

    Research interests

    AI Security and privacy, machine learning, AI safety, memorization, automated attacks.

  • Dr Soteris Demetriou

    Personal details

    Dr Soteris Demetriou Associate Professor

    Location

    353, ACE Extension

    Research Interest

    AI safety, security and privacy, mobile computing, computer systems security, smartphone security, Internet-of-Things (IoT) and cyber-physical systems (CPS) security

  • Professor Alastair Donaldson

    Personal details

    Professor Alastair Donaldson Professor of Programming Languages

    +44 (0)20 7594 8266

    Location

    422, Huxley Building

    Research interests

    Formal verification for multicore software, software performance optimization.

  • Professor Philippa Gardner

    Personal details

    Professor Philippa Gardner Professor of Theoretical Computer Science

    +44 (0)20 7594 8292

    Location

    453, Huxley Building

    Research interests

    Programming languages, program analysis and verification, concurrency and resource reasoning.

  • Professor Hamed Haddadi

    Personal details

    Professor Hamed Haddadi Professor of Human-Centred Systems

    +44 20 7594 2584

    Location

    I-X, Translation and Innovation Hub (I-HUB), White City Campus

    Research interests

    User-centred systems, networking, applied machine learning, privacy, security.

  • Professor Chris Hankin

    Personal details

    Professor Chris Hankin Professor of Computing Science

    +44 (0)20 7594 7619

    Location

    Sherfield Building

    Research interests

    Security, program analysis and programming language theory.

  • Professor Emil Lupu

    Personal details

    Professor Emil Lupu Professor of Computer Systems

    +44 (0)20 7594 8249

    Location

    564, Huxley Building

    Research interests

    Security and resilience of enterprise, IoT and cyber-physical systems. Co-design for security and safety. Security of AI systems. Use of AI in systems’ cyber security. Security management and automation.  

     

  • Dr Sergio Maffeis

    Personal details

    Dr Sergio Maffeis Associate Professor of Computer Security

    +44 (0)20 7594 8390

    Location

    441, Huxley Building

    Research interests

    Software security, network and web security, applications of AI to security, security of AI, formal methods.

  • Professor Julie McCann

    Personal details

    Professor Julie McCann Co-director of Space, Security and Telecoms

    +44 (0) 20 7594 8375

    Location

    258, ACE Extension

    Research interests

    Advanced connectivity, integrated sensing and communications, mmWave and WiFi sensing, frugal decentralised intelligence, sensor networks, physical and embodied computing.

  • Professor Peter Pietzuch

    Personal details

    Professor Peter Pietzuch Professor of Distributed Systems

    +44 (0)20 7594 8314

    Location

    442, Huxley Building

    Research interests

    Distributed systems, operating systems, machine learning systems, data management, data-intensive applications, networked systems, systems security, confidential computing, trusted hardware, and decentralised ledgers .  

     

  • Dr Azalea Raad

    Personal details

    Dr Azalea Raad Associate Professor in Programming Languages

    Location

    Huxley Building

    Research interests

    Programming languages, formal methods, verification, non-volatile memory, concurrency, persistency, weak memory models, transactional memory, program logics, and stateless model checking.

  • Dr Lluis Vilanova

    Personal details

    Dr Lluis Vilanova Associate Professor

    Location

    556, Huxley Building

    Research interests

    Computer architecture, operating systems, distributed systems, security and privacy, heterogeneous, parallel and accelerated systems, virtualisation, cloud, hardware/software interfaces and co-design.

ACE-CSR Affiliate Academics

  • Dr Dalal Alrajeh

    Personal details

    Dr Dalal Alrajeh Associate Professor of Computer Science

    +44 (0)20 7594 2421

    Location

    557, Huxley Building

    Research interests

    Formal methods, software engineering, artificial intelligence for correct software, and software for digital forensics.

  • Prof. Pantelis J Beaghton

    Personal details

    Prof. Pantelis J Beaghton Professor of Practice

    Location

    Room E257, 2nd Floor, ACE Extension

    Research interests

    Associate Director  Institute for Security Science and Technology

  • Dr Mahdi Cheraghchi

    Personal details

    Dr Mahdi Cheraghchi Visiting Reader

    +44 (0)20 7594 9043

    Research interests

    Communication and computing, randomness and computing, information and coding theory, algorithms and complexity theory, Boolean functional analysis, foundations of cryptography.

  • Dr Naranker Dulay

    Personal details

    Dr Naranker Dulay Associate Professor of Computing Science

    +44 (0)20 7594 8288

    Location

    562, Huxley Building

    Research interests

    Security, pervasive/mobile/distributed systems, networking, software engineering, systems, and network management, applied machine learning.

  • Dr Ben Livshits

    Personal details

    Dr Ben Livshits Associate Professor of Computing

    Location

     ACE 355 

    Research interests

    Blockchain, s ecurity, privacy, program analysis, compilers, software engineering.  

  • Professor Alessio Lomuscio

    Personal details

    Professor Alessio Lomuscio Professor of Safe Artificial Intelligence

    + 44 (0)20 7594 8414

    Location

    I-X, Translation and Innovation Hub (I-HUB), White City Campus

    Research interests

    Verification and assurance of AI-based systems, v alidation of computer vision systems, r obustness, certified learning, neurosymbolic systems, l ogic-based specification and verification of autonomous systems.  

  • Professor Alessandra Russo

    Personal details

    Professor Alessandra Russo Professor in Applied Computational Logic

    +44 (0)20 7594 8312

    Location

    I-X, Translation and Innovation Hub (I-HUB), White City Campus

    Research interests

    Computational logic, logic-based machine learning, probabilistic and distributed Inference, cognitive systems, autonomous systems.

  • Dr Herbert Wiklicky

    Personal details

    Dr Herbert Wiklicky Associate Professor

    +44 (0)20 7594 8206

    Location

    424, Huxley Building

    Research interests

    Program analysis, programming languages, semantics, probabilistic models, program synthesis, semantics in computer security, quantum computation.