Guest Seminar Series


2019/20 Guest Seminar Series:






Wednesday 9th October - Lizzie Coles-Kemp (Royal Holloway)

Title: Reframing Digital Security Inquiry: Unknotting Some of the Paradoxes of Digital Technology Use

Abstract: The use of digital technology is often described as paradoxical; for example, whilst there might be a desire for privacy, people routinely use digital technology to disclose personal information without privacy protection.  This talk presents a creative security approach that is designed to critically examine lived experiences of digital technology and, in so doing, unknot technology practices that might seem paradoxical. The theoretical framing of this approach, together with their use, is explained through a presentation of a case study that examines the use of smart technology in the home. 


Tuesday 12th November - Yves Montjoye (Imperial College London)

Title: Anonymisation Debate with Prof. Mark Elliot 



Wednesday 4th December - Christian Cadar (Imperial College London)

Title: Finding Bugs and Security Vulnerabilities with Dynamic Symbolic Execution

Abstract: Software systems are affected on a regular basis by bugs and security vulnerabilities. In this talk, I will present dynamic symbolic execution, a technique that can help detect many of these problems before they make it into production. Dynamic symbolic execution has already started to make a positive impact on the reliability and security of software, with several high-profile companies using it on a regular basis to analyse their software.

The talk will focus on recent advances and ongoing challenges in the area of dynamic symbolic execution, drawing upon our experience developing several symbolic execution tools for many different scenarios, such as high-coverage test input generation, bug detection, patch testing and bounded verification. 


Wednesday 19th February - Wendy Montcur (University of Dundee)

Title: Keeping Secrets Online:

Abstract: What strategies do people deploy in keeping secrets online? And how can these strategies be repurposed to (i) enhance the capacity of UK security agencies to detect & mitigate threats generated via online channels, and (ii) support those who keep secrets as parts of their jobs in countering UK & International security threats.

We reviewed over 7500 research papers, uncovering a range of strategies, barriers and enablers involved in keeping secrets online. Three example contexts were used: supply and purchase of illegal drugs, escaping from intimate partner violence, and infidelity. We then condensed our findings, producing a short graphic novel - the “Illustrated Guide to Keeping secrets Online” – for use with security and law enforcement stakeholders in a series of well-received interactive workshops.

This talk describes the approach taken, key findings, development of the Guide and subsequent impact workshops with stakeholders.


Wednesday 4th March - Mike Levi (Cardiff University)

Title: Responses to Cyber-Enabled Scams and Fears of Cybercrime: Rethinking the Standard Models

Abstract: Government strategies have involved adapting counter-terrorism models to all serious and organised crime, including cyber-enabled crimes.  Based on research over the last decade, the aim is to re-examine public policing and public-private partnership policing to consider what may be required to ‘satisfice’ victimisation, repeat victimisation, and fear of cyber scams.


Wednesday 29th April - Emily Overton (Records Management Girl Consultancy)



Wednesday 6th May - Delaram Kahrobaei (University of York)

Title: Post Quantum Algebraic Cryptography

Past Seminars:

2018/19 Guest Seminars: