Mark Ryan

Prof

Accepting PhD Students

PhD projects

Mark Ryan’s work broadly concerns reasoning about computer systems, in order to verify their properties. In particular, he works on logic-based specification and verification of systems and programs. Professor Ryan’s research interests include:

Electronic voting, in particular, verification of voting protocols and systems
Verification of security properties in pervasive and ubiquitous computing
Balancing the requirements of security and privacy
Trusted computing and the Trusted Platform Module (TPM)
Access control systems

1995 …2023

Research activity per year

Filter
Conference contribution

Search results

  • 2022

    Protocols for a two-tiered trusted computing base

    Moreira-Sanchez, J., Ryan, M. & Garcia, F., 24 Sept 2022, Computer Security – ESORICS 2022: 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part III. Atluri, V., Di Pietro, R., D. Jensen, C. & Meng, W. (eds.). 1 ed. Cham: Springer, p. 229–249 21 p. (Lecture Notes in Computer Science; vol. 13556).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    23 Downloads (Pure)
  • Symbolon: Enabling Flexible Multi-device-based User Authentication

    Laing, T., Marin, E., Ryan, M. D., Schiffman, J. & Wattiau, G., 26 Sept 2022, 2022 IEEE Conference on Dependable and Secure Computing (DSC). Institute of Electrical and Electronics Engineers (IEEE), 12 p. 9888854. (IEEE Conference on Dependable and Secure Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Root-of-trust abstractions for symbolic analysis: application to attestation protocols

    Fotiadis, G., Moreira-Sanchez, J., Giannetsos, T., Chen, L., Ronne, P. B., Ryan, M. & Ryan, P. Y. A., 8 Dec 2021, Security and Trust Management: 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings. Roman, R. & Zhou, J. (eds.). 1 ed. Springer, Cham, p. 163-184 22 p. (Lecture Notes in Computer Science; vol. 13075).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    82 Downloads (Pure)
  • 2020

    Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties

    Singh, R. R., Moreira-Sanchez, J., Chothia, T. & Ryan, M., 16 Sept 2020, STM 2020: Security and Trust Management . Springer, p. 3 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Quantitative Verification of Certificate Transparency Gossip Protocols

    Oxford, M., Parker, D. & Ryan, M., 3 May 2020, (Accepted/In press) Proceedings of 6th International Workshop on Security and Privacy in the Cloud (SPC'20). IEEE Computer Society Press, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    CAOS: Concurrent-Access Obfuscated Store

    Ordean, M., Ryan, M. & Galindo Chacon, D., 28 May 2019, Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019). Association for Computing Machinery (ACM), p. 13-24 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    219 Downloads (Pure)
  • 2018

    A Malware-Tolerant, Self-Healing Industrial Control System Framework

    Denzel, M., Ryan, M. & Ritter, E., 22 Jul 2018, ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer, p. 46-60 (IFIP Advances in Information and Communication Technology ; vol. 502).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Malware Tolerant (Mesh-) Networks

    Denzel, M. & Ryan, M., 1 Sept 2018, Proceedings of the 17th International Conference on Cryptology And Network Security (CANS 2018) . Springer, p. 133-153 (Lecture Notes in Computer Science; vol. 11124).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    217 Downloads (Pure)
  • 2017

    Authenticating compromisable storage systems

    Yu, J., Ryan, M. & Chen, L., 11 Sept 2017, Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    220 Downloads (Pure)
  • Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications

    Milner, K., Cremers, C., Yu, J. & Ryan, M., 25 Sept 2017, Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017. IEEE Computer Society Press, p. 203-216 14 p. 8049721. (Proceedings - IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Making Decryption Accountable

    Ryan, M. D., 2017, Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Anderson, J., Christianson, B., Matyas, V. & Stajano, F. (eds.). 1st ed. Springer, Vol. XXV. p. 93-98 6 p. (Lecture Notes in Computer Science; vol. XXV (25)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    276 Downloads (Pure)
  • Smart-Guard: defending user input from malware

    Denzel, M., Bruni, A. & Ryan, M., 16 Jan 2017, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). El Baz, D. & Bourgeois, J. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 502-509 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    2 Citations (Scopus)
    426 Downloads (Pure)
  • 2015

    Du-Vote: Remote Electronic Voting with Untrusted Computers

    Grewal, G. S., Ryan, M. D., Chen, L. & Clarkson, M. R., 7 Sept 2015, 2015 IEEE 28th Computer Security Foundations Symposium . IEEE Computer Society Press, p. 155-169

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    21 Citations (Scopus)
  • 2014

    Balancing societal security and individual privacy: Accountable escrow system

    Liu, J., Ryan, M. D. & Chen, L., Jul 2014, Proceedings of the 27th Computer Security Foundations Workshop 2014. Institute of Electrical and Electronics Engineers (IEEE), p. 427-440

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Dynamic Measurement and Protected Execution: Model and Analysis

    Xu, S., Batten, I. & Ryan, M., 8 Mar 2014, Trustworthy Global Computing: 8th International Symposium TGC 2013; Buenos Aires; Argentina; 30-31 August, Revised Selected Papers. Abadi, M. & Lafuente, A. L. (eds.). Springer, Vol. 8358 LNCS. p. 45-63 Chapter 4. (Lecture Notes in Computer Science; vol. 8358).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Privacy through Pseudonymity in Mobile Telephony Systems

    Arapinis, M., Mancini, L. I., Ritter, E. & Ryan, M., 23 Feb 2014, 21st Annual Network and Distributed System Security Symposium (NDSS'14). The Internet Society, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2013

    Caveat coercitor: Coercion-evidence in electronic voting

    Grewal, G. S., Ryan, M. D., Bursuc, S. & Ryan, P. Y. A., 2013, Proceedings - 2013 IEEE Symposium on Security and Privacy, SP 2013. p. 367-381 15 p. 6547121. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    34 Citations (Scopus)
  • Model checking agent knowledge in dynamic access control policies

    Koleini, M., Ritter, E. & Ryan, M., 2013, Tools and Algorithms for the Construction and Analysis of Systems : 19th International Conference, TACAS 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Piterman, N. & Smolka, SA. (eds.). Springer, p. 448-462 (Lecture Notes in Computer Science; vol. 7795).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Practical everlasting privacy

    Arapinis, M., Cortier, V., Kremer, S. & Ryan, M., 2013, Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Proceedings. p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7796 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    15 Citations (Scopus)
  • 2011

    StatVerif: Verification of Stateful Processes

    Arapinis, M., Ritter, E. & Ryan, M., 29 Jun 2011, Proceedings 2011 IEEE 24th Computer Security Foundations Symposium (CSF). Institute of Electrical and Electronics Engineers (IEEE), p. 33-47 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Citations (Scopus)
  • 2010

    Attack, Solution and Verification for Shared Authorisation Data in TCG TPM

    Chen, L. & Ryan, M., 1 Jan 2010, Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers. Degano, P. & Guttman, JD. (eds.). Springer, p. 201-216 16 p. (Lecture Notes in Computer Science; vol. 5983).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)