Professor John Clark
School of Computer Science
Professor of Computer and Information Security
Director of Siemens Digital MINE
Head of the Security of Advanced Systems research group
+44 114 222 1802
Full contact details
School of Computer Science
Regent Court (DCS)
211 Portobello
Sheffield
S1 4DP
- Profile
-
John Clark is a Professor of Computer and Information Security at the University of Sheffield since April 2017 and leads the Security of Advanced Systems Research Group. Previously he was Professor of Critical Systems at the University of York, having joined academia in 1992 as a Lecturer in Safety Critical Systems.
He studied Maths and then Applied Statistics at Oxford, before joining the security division of the software and systems house Logica (where he worked on security evaluation and security R&D).
- Research interests
-
His major research interests lie in cybersecurity and software engineering, most notably the use of Artificial Intelligence to these areas. Publications have included work on: threat modelling, security policies, covert channel analysis, cryptographic building blocks, intrusion detection, insider detection, and automated synthesis of security protocols.
Current work addresses the automated discovery of classical cryptanalytic strategies, intrusion detection, and the search for quantum approaches to cryptanalysis via evolutionary computation.
He is particularly interested right now in building up research in the security of robotic and autonomous systems and in the security of advanced manufacturing systems.
- Publications
-
Books
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface.
- Formalizing anonymity: A review. Department of Computer Science, University of York.
- Writing Effective Security Abuse Cases. Department of Computer Science, University of York.
- Security Zonal Analysis. Department of Computer Science, University of York.
- Automatic test-data generation for testing simulink models. Department of Computer Science, University of York.
- Breaking the Model: finalisation and a taxonomy of security attack. Department of Computer Science, University of York.
- A search-based approach to the automated design of security protocols.
- Four methods for maintenance scheduling. Citeseer.
- A survey of authentication protocol literature: Version 1.0. Citeseer.
Journal articles
- User-empowered secure privacy-preserving authentication scheme for Digital Twin. Computers & Security, 140, 103793-103793.
- AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks.. IEEE/ACM Trans. Netw., 32, 1080-1095.
- Incremental hybrid intrusion detection for 6LoWPAN. Computers & Security, 135, 103447-103447.
- AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks. IEEE/ACM Transactions on Networking, 1-16.
- Covering arrays ML HPO for static malware detection. Eng, 4(1), 543-554.
- A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids.. CoRR, abs/2303.13204.
- Adversarial RL-based IDS for Evolving Data Environment in 6LoWPAN. IEEE Transactions on Information Forensics and Security, 1-1.
- Bayesian hyper-parameter optimisation for malware detection. Electronics, 11(10).
- Intrusion Detection Systems in RPL-based 6LoWPAN: A Systematic Literature Review. IEEE Sensors Journal, 1-1.
- Evaluation of Mutation Testing in a Nuclear Industry Case Study. IEEE Transactions on Reliability, 67(4), 1406-1419.
- Subdomain-based test data generation. Journal of Systems and Software, 103, 328-342.
- The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing. Journal of Systems and Software, 103, 296-310.
- Trustworthy placements: Improving quality and resilience in collaborative attack detection. Computer Networks, 58, 70-86. View this article in WRRO
- Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise. Information Systems Frontiers, 15(1), 17-34.
- Genetic algorithms and solid state NMR pulse sequences. Journal of Magnetic Resonance, 228, 66-75.
- An orchestrated survey of methodologies for automated software test case generation. Journal of Systems and Software, 86(8), 1978-2001.
- Guest Editorial: Special section of the best papers from the 2nd International Symposium on Search Based Software Engineering 2010. Information and Software Technology, 55(1), 111-111.
- The placement-configuration problem for intrusion detection nodes in wireless sensor networks. Computers & Electrical Engineering, 39(7), 2306-2317.
- Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55(15), 3441-3457.
- Evolutionary Improvement of Programs. IEEE Transactions on Evolutionary Computation, 15(4), 515-538.
- Masquerade mimicry attack detection: A randomised approach. Computers & Security, 30(5), 297-310.
- Cryptanalysis of Song’s advanced smart card based password authentication protocol. Arxiv preprint arXiv:1111.2744.
- Defending the weakest link: phishing websites detection by analysing user behaviours. Telecommunication Systems, 45(2-3), 215-226.
- SBST: 3rd International Workshop on Search-Based Software Testing. computer.org.
- Efficient Software Verification: Statistical Testing Using Automated Search. IEEE Transactions on Software Engineering, 36(6), 763-777.
- Risk profiles and distributed risk assessment. Computers & Security, 28(7), 521-535.
- Towards scalable intrusion detection. Network Security, 2009(6), 12-16.
- Security Threats in Mobile Ad Hoc Networks. www-users.cs.york.ac.uk.
- Intrusion Detection in Mobile Ad Hoc Networks, 427-454.
- Highly entangled multi-qubit states with simple algebraic structure. Journal of Physics A: Mathematical and Theoretical, 42(41), 415301-415301.
- False positive response. Network Security, 2008(12), 11-15.
- Network reconnaissance. Network Security, 2008(11), 12-16.
- Characterising intrusion detection sensors, part 2. Network Security, 2008(10), 8-11.
- Characterising intrusion detection sensors. Network Security, 2008(9), 10-12.
- Searching for Quantum Programs and Quantum Protocols. Journal of Computational and Theoretical Nanoscience, 5(5), 942-969.
- A search-based framework for automatic testing of MATLAB/Simulink models. Journal of Systems and Software, 81(2), 262-285.
- Searching for quantum programs and quantum protocols: a review. Journal of Computational and Theoretical Nanoscience, 5, 942-969.
- A user-phishing interaction model. Conference on Human System Interaction.
- The certification of the Mondex electronic purse to ITSEC Level E6. Formal Aspects of Computing, 20(1), 5-19.
- Journeys in non-classical computation II: initial journeys and waypoints. International Journal of Parallel, Emergent and Distributed Systems, 21(2), 97-125.
- Human-competitive evolution of quantum computing artefacts by genetic programming. Evolutionary Computation, 14, 21-40.
- The design of S-boxes by simulated annealing. New Generation Computing, 23(3), 219-231.
- The design of S-boxes by simulated annealing. New Generation Computing, 23, 219-231.
- Stressing Security Requirements: exploiting the Flaw Hypothesis Method with Deviational Techniques. Symposium on Requirements Engineering for Information Security (SREIS 2005).
- Smart dust, friend or foe?––Replacing identity with configuration trust. Computer Networks, 46(5), 723-740.
- Editorial: Software testing in the United Kingdom. Software Testing, Verification and Reliability, 14(3), 165-166.
- Automated Design of Security Protocols. Computational Intelligence, 20(3), 503-516.
- Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion. Computational Intelligence, 20(3), 450-462.
- Test Data Generation for Product Lines–A Mutation Testing Approach. SPLiT International Workshop on Software Product Line Testing.
- Smart Devices and Software Agents: The Basics of Good Behaviour, 39-52.
- Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions, 161-177.
- Search Based Automatic Test-Data Generation at an Architectural Level, 1413-1424.
- Evolving Quantum Circuits and Programs Through Genetic Programming, 569-580.
- Playing the game. ACM SIGCAS Computers and Society, 34(2), 3-3.
- Formulating software engineering as a search problem. IEE Proceedings - Software, 150, 161-175.
- Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It, 2022-2033.
- Using Ants to Attack a Classical Cipher, 146-147.
- Artificial Immune Systems and the Grand Challenge for Non-classical Computation, 204-216.
- Reformulating software engineering as a search problem. IEE Proceedings - Software, 150(3), 161-161.
- Fault Injection and a Timing Channel on an Analysis Technique, 181-196.
- Protocols are programs too: the meta-heuristic search for security protocols. Information and Software Technology, 43(14), 891-904.
- Investigating the effectiveness of object-oriented testing strategies using the mutation method. Software Testing, Verification and Reliability, 11(4), 207-225.
- Abstract Testing, Proof and Automation: An Integrated Approach. Citeseer.
- Automated test-data generation for exception conditions. Software: Practice and Experience, 30(1), 61-79.
- Integrating Automated Testing with Exception Freeness Proofs for Safety Critical Systems. Proceedings of 4th Australian Workshop on Safety Critical Systems and Software. Australian Computer Society..
- CONVERSE: A change-oriented process for engine controllers. IEE Proceedings - Software, 146, 130-136.
- Software fault injection. Software: Practice and Experience, 28(15), 1637-1637.
- Automated program flaw finding using simulated annealing. ACM SIGSOFT Software Engineering Notes, 23(2), 73-81.
- The way forward for unifying dynamic test-case generation: The optimisation-based approach. Proceedings of the IFIP International Workshop on Dependable Computing and Its Applications (DCIA)..
- Attacking authentication protocols. High Integrity Systems.
- On the security of recent protocols. Information Processing Letters, 56(3), 151-155.
- Automated intrusion detection: theory and practice. High integrity systems, 1(3), 313-322.
- Satisfaction of PLC timing constraints. HIGH INTEGR SYST.
- An introduction to security in distributed systems. High Integrity Systems.
- Holistic schedulability analysis for distributed hard real-time systems. Microprocessing and Microprogramming, 40(2-3), 117-134.
- Analysing high-integrity systems. Computing & Control Engineering Journal, 5(1), 18-23.
- Systematic review of features for co‐simulating security incidents in Cyber‐Physical Systems. Security and Privacy.
Chapters
- On Optimal Configuration of IDS for RPL Resource-Constrained Networks Using Evolutionary Algorithm, Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2 (pp. 514-535). Springer International Publishing
- Privacy Awareness Among Users of Digital Healthcare Services in Saudi Arabia, HCI for Cybersecurity, Privacy and Trust (pp. 247-261). Springer Nature Switzerland
- Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids, Information and Communications Security (pp. 281-300). Springer International Publishing
- Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots, The 21st Century Industrial Robot: When Tools Become Collaborators (pp. 191-214). Springer International Publishing
- Cybersecurity Roadmap for Active Buildings, Active Building Energy Systems (pp. 219-249).
- Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots, Innovative Security Solutions for Information Technology and Communications (pp. 185-197). Springer International Publishing
- Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction, Lecture Notes in Computer Science (pp. 111-126). Springer International Publishing
- Security Threats in Mobile Ad Hoc Networks, Security of Self-Organizing Networks (pp. 145-164). Auerbach Publications
- The Human Factor in Mobile Phishing, New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 53-65). IGI Global
- Selecting Highly Efficient Sets of Subdomains for Mutation Adequacy IEEE
- Risk Based Access Control with Uncertain and Time-dependent Sensitivity In Katsikas S & Samarati P (Ed.), Proceedings of the 2010 International Conference on Security and Cryptography (pp. 1-9). SciTePress
- Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol, 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009 (pp. 1-5). IEEE
- Power-Aware Intrusion Detection in Mobile Ad Hoc Networks, Ad Hoc Networks, First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers (pp. 224-239). Springer
- User Behaviour Based Phishing Websites Detection In Ganzha M, Paprzycki M & PelechPilichowski T (Ed.), 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2 (pp. 728-735). IEEE
- Modelling User-Phishing Interaction, 2008 CONFERENCE ON HUMAN SYSTEM INTERACTIONS, VOLS 1 AND 2 (pp. 633-638). IEEE
- Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks In Ho TB & Zhou ZH (Ed.), PRICAI 2008: TRENDS IN ARTIFICIAL INTELLIGENCE (pp. 1053-1058). SPRINGER-VERLAG BERLIN
- Unentangling nuclear magnetic resonance computing, Unconventional Computing 2007 (pp. 1-18). Luniver Press
- Challenging formal specifications by mutation: A CSP security example (pp. 340-350).
- Invited paper. Nature-inspired cryptography: Past, present and future, CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS (pp. 1647-1654). IEEE
- CONVERSE: A Family Oriented Software Development Process for Engine Controllers, Systems Engineering for Business Process Change (pp. 38-73). Springer-verlag
- Evolving Boolean Functions Satisfying Multiple Criteria, Progress in Cryptology — INDOCRYPT 2002 (pp. 246-259). Springer Berlin Heidelberg
- A Search-Based Automated Test-Data Generation Framework for Safety-Critical Systems, Systems Engineering for Business Process Change (pp. 174-213). Springer-verlag
- Investigating the Effectiveness of Object-Oriented Strategies with the Mutation Method, Mutation Testing for the New Century (pp. 4-4). Springer US
- Automated Verification and Validation for High Integrity Systems: A Targeted Formal Methods Approach, Proceedings of the NASA Langley Formal Methods Workshop
- Searching for a solution: engineering tradeoffs and the evolution of provably secure protocols IEEE Comput. Soc
- Integrating Safety Analysis with Automatic Test-Data Generation for Software Safety Verification, Proceedings of 17th International System Safety Conference (pp. 128-137).
Conference proceedings papers
- Toward a Design of User’s Consent Tool for IoT-based Healthcare System. 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), 23 January 2023 - 25 January 2023.
- Enhanced Scanning in SDN Networks and its Detection using Machine Learning. 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), 14 December 2022 - 17 December 2022.
- Neural Network Approximation of Simulation-based IDS Fitness Evaluation. 2022 IEEE 25th International Conference on Computational Science and Engineering (CSE), 9 December 2022 - 11 December 2022.
- Transfer Learning Approach to Discover IDS Configurations Using Deep Neural Networks. 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 17 October 2022 - 19 October 2022.
- Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based Multi-feature Detection Model. 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 25 October 2021 - 28 October 2021. View this article in WRRO
- Reinforcement-Learning-based IDS for 6LoWPAN. 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 20 October 2021 - 22 October 2021.
- Continuous User Authentication for Human-Robot Collaboration (pp 1-9)
- Grammatical Evolution for Detecting Cyberattacks in Internet of Things Environments. 2021 International Conference on Computer Communications and Networks (ICCCN), 19 July 2021 - 22 July 2021.
- Using Genetic Improvement to Retarget quantum Software on Differing Hardware. 2021 IEEE/ACM International Workshop on Genetic Improvement (GI), 30 May 2021 - 30 May 2021.
- Optimising trotter-suzuki decompositions for quantum simulation using evolutionary strategies. GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference (pp 1223-1231). Prague, Czech Republic, 13 July 2019 - 13 July 2019. View this article in WRRO
- Efficient Evolutionary Fuzzing for Android Application Installation Process. 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), 22 July 2019 - 26 July 2019.
- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks (pp 170-184)
- Applying Cartesian Genetic Programming to Evolve Rules for Intrusion Detection System. Proceedings of the 10th International Joint Conference on Computational Intelligence, 18 September 2018 - 20 September 2018.
- SAFEDroid: Using Structural Features for Detecting Android Malwares (pp 255-270)
- Search-Based Temporal Testing in an Embedded Multicore Platform (pp 794-809)
- The executable experimental template pattern for the systematic comparison of metaheuristics. Proceedings of the 2014 conference companion on Genetic and evolutionary computation companion - GECCO Comp '14, 12 July 2014 - 16 July 2014.
- Mutation Testing for Jason Agents. EMAS 2014. Lecture Notes in Computer Science, Vol. 8758 (pp 309-327). Cham, Switzerland, 5 May 2015 - 6 May 2014.
- Engineering Multi-Agent Systems
- Probability-Based Semantic Interpretation of Mutants. 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops, 31 March 2014 - 4 April 2014.
- Semantic mutation testing. Science of Computer Programming, Vol. 78(4) (pp 345-363)
- Dynamic adaptive Search Based Software Engineering needs fast approximate metrics (keynote). 2013 4th International Workshop on Emerging Trends in Software Metrics (WETSoM), 21 May 2013 - 21 May 2013.
- Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis (pp 120-140)
- SE and AI: A two-way street. 2013 2nd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE), 25 May 2013 - 26 May 2013.
- Efficient Subdomains for Random Testing (pp 251-256)
- The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing. Proceeding of the fifteenth annual conference on Genetic and evolutionary computation conference - GECCO '13, 6 July 2013 - 10 July 2013.
- Using Mutation Analysis to Evolve Subdomains for Random Testing. 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops, 18 March 2013 - 22 March 2013.
- METAHEURISTIC TRACEABILITY ATTACK AGAINST SLMAP, AN RFID LIGHTWEIGHT AUTHENTICATION PROTOCOL. International Journal of Foundations of Computer Science, Vol. 23(02) (pp 543-553)
- The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper). Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering - ASE 2012, 3 September 2012 - 7 September 2012.
- Modelling Uncertain and Time-Dependent Security Labels in MLS Systems (pp 158-171)
- Searching for Pareto-optimal Randomised Algorithms (pp 183-197)
- MESSI: Mutant Evaluation by Static Semantic Interpretation. 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, 17 April 2012 - 21 April 2012.
- Dynamic adaptive search based software engineering. Proceedings of the ACM-IEEE international symposium on Empirical software engineering and measurement - ESEM '12, 19 September 2012 - 20 September 2012.
- Searching for invariants using genetic programming and mutation testing. Proceedings of the 13th annual conference on Genetic and evolutionary computation - GECCO '11, 12 July 2011 - 16 July 2011.
- Segmentation and Normalisation in Grapheme Codebooks. 2011 International Conference on Document Analysis and Recognition, 18 September 2011 - 21 September 2011.
- Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing (pp 207-218)
- F for fake. Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11, 7 May 2011 - 12 May 2011.
- Finding short counterexamples in promela models using estimation of distribution algorithms. Proceedings of the 13th annual conference on Genetic and evolutionary computation - GECCO '11, 12 July 2011 - 16 July 2011.
- A Principled Evaluation of the Effect of Directed Mutation on Search-Based Statistical Testing. 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops, 21 March 2011 - 25 March 2011.
- Applications of Model Reuse When Using Estimation of Distribution Algorithms to Test Concurrent Software (pp 97-111)
- Power-Aware Intrusion Detection in Mobile Ad Hoc Networks (pp 224-239)
- Semantic Mutation Testing. 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, 6 April 2010 - 10 April 2010.
- Message from the Program Chairs. 2nd International Symposium on Search Based Software Engineering, 7 September 2010 - 9 September 2010.
- Risk based access control with uncertain and time-dependent sensitivity. SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography (pp 5-13)
- Optimising IDS Sensor Placement. 2010 International Conference on Availability, Reliability and Security, 15 February 2010 - 18 February 2010.
- Searching for Safety Violations Using Estimation of Distribution Algorithms. 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, 6 April 2010 - 10 April 2010.
- Fine-grained timing using genetic programming. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 6021 LNCS (pp 325-336)
- Learning Autonomic Security Reconfiguration Policies. 2010 10th IEEE International Conference on Computer and Information Technology, 29 June 2010 - 1 July 2010.
- Information-Theoretic Detection of Masquerade Mimicry Attacks. 2010 Fourth International Conference on Network and System Security, 1 September 2010 - 3 September 2010.
- Scribe Identification in Medieval English Manuscripts. 2010 20th International Conference on Pattern Recognition, 23 August 2010 - 26 August 2010.
- TAIC PART 2007 and Mutation 2007 special issue editorial. Journal of Systems and Software, Vol. 82(11) (pp 1753-1754)
- Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. 2009 IEEE International Symposium on Parallel & Distributed Processing (pp 363-374)
- Comparing algorithms for search-based test data generation of Matlab (pp 2940-2947)
- Accumulating evidence of insider attacks. CEUR Workshop Proceedings, Vol. 469 (pp 34-50)
- A Multi-objective Optimisation Approach to IDS Sensor Placement (pp 101-108)
- Dynamic security policy learning. Proceedings of the first ACM workshop on Information security governance - WISG '09, 13 November 2009 - 13 November 2009.
- Using automated search to generate test data for matlab. Proceedings of the 11th Annual conference on Genetic and evolutionary computation - GECCO '09, 8 July 2009 - 12 July 2009.
- Widening the Goal Posts: Program Stretching to Aid Search Based Software Testing. 2009 1st International Symposium on Search Based Software Engineering, 13 May 2009 - 15 May 2009.
- Automatic Test Data Generation for Multiple Condition and MCDC Coverage. 2009 Fourth International Conference on Software Engineering Advances, 20 September 2009 - 25 September 2009.
- Comparing algorithms for search-based test data generation of Matlab® Simulink® models. 2009 IEEE Congress on Evolutionary Computation, 18 May 2009 - 21 May 2009.
- A Deployment Value Model for Intrusion Detection Sensors (pp 250-259)
- A grammatical evolution approach to intrusion detection on mobile ad hoc networks. Proceedings of the second ACM conference on Wireless network security - WiSec '09, 16 March 2009 - 19 March 2009.
- Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5 (pp 2265-+)
- Reputation Attacks in Mediated and Automated Systems
- Policy evolution with genetic programming
- Modelling user-phishing interaction. 2008 Conference on Human System Interactions, 25 May 2008 - 27 May 2008.
- Threat modelling in user performed authentication. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 5308 LNCS (pp 49-64)
- User behaviour based phishing websites detection. 2008 International Multiconference on Computer Science and Information Technology, 20 October 2008 - 22 October 2008.
- Strengthening Inferred Specifications using Search Based Testing. 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, 9 April 2008 - 11 April 2008.
- Policy evolution with Genetic Programming: A comparison of three approaches. 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence), 1 June 2008 - 6 June 2008.
- Policy Evolution with Grammatical Evolution (pp 71-80)
- Searching for resource-efficient programs. Proceedings of the 10th annual conference on Genetic and evolutionary computation - GECCO '08, 12 July 2008 - 16 July 2008.
- MLS security policy evolution with genetic programming. Proceedings of the 10th annual conference on Genetic and evolutionary computation - GECCO '08, 12 July 2008 - 16 July 2008.
- Multi-objective Improvement of Software Using Co-evolution and Smart Seeding (pp 61-70)
- Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks (pp 1053-1058)
- Threat Modelling for Mobile ad hoc and Sensor Networks
- Aggregation of Information leaked by a MANET
- Heuristic search for non-linear cryptanalytic approximations. 2007 IEEE Congress on Evolutionary Computation, 25 September 2007 - 28 September 2007.
- An efficient experimental methodology for configuring search-based design algorithms. Proceedings of IEEE International Symposium on High Assurance Systems Engineering (pp 53-62)
- Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
- Deviational analyses for validating regulations on real systems. CEUR Workshop Proceedings, Vol. 241 (pp 813-817)
- The state problem for test generation in Simulink. Proceedings of the 8th annual conference on Genetic and evolutionary computation - GECCO '06, 8 July 2006 - 12 July 2006.
- Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming. Evolutionary Computation, Vol. 14(1) (pp 21-40)
- Human competitive security protocols synthesis. Proceedings of the 8th annual conference on Genetic and evolutionary computation - GECCO '06, 8 July 2006 - 12 July 2006.
- Breaking the Model: Finalisation and a Taxonomy of Security Attacks. Electronic Notes in Theoretical Computer Science, Vol. 137(2) (pp 225-242)
- Synthesising Efficient and Effective Security Protocols. Electronic Notes in Theoretical Computer Science, Vol. 125(1) (pp 25-41)
- Journeys in non-classical computation I: A grand challenge for computing research. International Journal of Parallel, Emergent and Distributed Systems, Vol. 20(1) (pp 5-19)
- “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example (pp 31-45)
- Evolution of a human-competitive quantum fourier transform algorithm using genetic programming. Proceedings of the 2005 conference on Genetic and evolutionary computation - GECCO '05, 25 June 2005 - 29 June 2005.
- Search-based mutation testing for Simulink models. Proceedings of the 2005 conference on Genetic and evolutionary computation - GECCO '05, 25 June 2005 - 29 June 2005.
- The design of S-boxes by simulated annealing (pp 1533–1537-1533–1537)
- Can Secure Systems be Built Using Today’s Development Processes?
- Metrics Are Fitness Functions Too (pp 58-69)
- Acquiring a Debt Worth Repaying: why Evolutionary Computation should gain yet further inspiration from Biology
- Effective Security Requirements Analysis: HAZOP and Use Cases (pp 416-427)
- Smart Devices and Software Agents: The Basics of Good Behaviour (pp 39-52)
- Automatic generation of tests from Statechart specifications
- Two-Stage Optimisation in the Design of Boolean Functions (pp 242-254)
- Investigating the Applicability of Traditional Test Adequacy Criteria for Object-Oriented Programs
- Class Mutation: Mutation Testing for Object-Oriented Programs
- The Rigorous Generation of Java Mutation Operators using HAZOP
- Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation (pp 72-83)
- A Safety Change Oriented Process for Safety-Critical Systems
- Automated program flaw finding using simulated annealing. Proceedings of ACM SIGSOFT international symposium on Software testing and analysis - ISSTA '98, 2 March 1998 - 4 March 1998.
- Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes (pp 99-117)
- Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range. 2006 IEEE International Conference on Evolutionary Computation
- Searching for cost functions. Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)
- The design of s-boxes by simulated annealing. Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)
- Metrics are fitness functions too. 10th International Symposium on Software Metrics, 2004. Proceedings.
- Challenging formal specifications by mutation: a CSP security example. Tenth Asia-Pacific Software Engineering Conference, 2003.
- Making the most of two heuristics: breaking transposition ciphers with ants. The 2003 Congress on Evolutionary Computation, 2003. CEC '03.
- Nature-inspired cryptography: past, present and future. The 2003 Congress on Evolutionary Computation, 2003. CEC '03.
- Almost Boolean functions: the design of Boolean functions by spectral inversion. The 2003 Congress on Evolutionary Computation, 2003. CEC '03.
- Automated design of security protocols. The 2003 Congress on Evolutionary Computation, 2003. CEC '03.
- FORTEST: formal methods and testing. Proceedings 26th Annual International Computer Software and Applications
- Towards industrially applicable formal methods: three small steps, and one giant leap. Proceedings Second International Conference on Formal Engineering Methods (Cat.No.98EX241)
- An automated framework for structural test-data generation. Proceedings 13th IEEE International Conference on Automated Software Engineering (Cat. No.98EX239)
- Dependent Input Sampling Strategies: Using Metaheuristics for Generating Parameterised Random Sampling Regimes. Proceedings of the 20th annual conference on Genetic and evolutionary computation
- The Phish in the Pond: scam emails as literature
- A Research Agenda for Metaheuristic Standardization (pp 1-3)
Theses / Dissertations
Other
Preprints
- Improving the Reliability of Quantum Circuits by Evolving Heterogeneous Ensembles, arXiv.
- AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks, arXiv.
- A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids, arXiv.
- Adaptive Hybrid Heterogeneous IDS for 6LoWPAN, arXiv.
- Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots, arXiv.
- Genetic algorithms and solid state NMR pulse sequences, arXiv.
- Cryptanalysis of Song's advanced smart card based password authentication protocol, arXiv.
- Highly entangled multi-qubit states with simple algebraic structure, arXiv.
- Grants
-
Current grants
- Security of Digital Twins in Manufacturing, EPSRC, 10/2021 - 01/2025, £774,954, as PI
Previous grants
- Studentship, EPSRC, £150,304, 02/2019 - 01/2021, as PI
- Pitch-In: Promoting the Internet of Things via Collaborations between HEIs & Industry, HEFCE, 04/2018 - 09/2021, £4,917,863, as PI
- Cybersecurity and Al Skills Development, HEFCE, 02/2018 - 02/2019, £183,409, as PI
- DAASE: Dynamic Adaptive Automated Software Engineering, EPSRC, 06/2012 - 09/2019, £297,095, as PI
- The Birth, Life and Death of Semantic Mutants, EPSRC, 10/2009 - 09/2013, £136,252, as PI
- Using Learning to Support the Development of Embedded Systems, EPSRC, 10/2007 - 09/2011, £379,941, as Co-PI
- System-Smart Intrusion Detection, EPSRC, 09/2007 - 07/2010, £228,258, as PI
- Defending the Weakest Link: Intrusion via Social Engineering, EPSRC, 08/2006 - 01/2010, £189,277, as PI
- SEBASE: Software Engineering By Automated SEarch, EPSRC, 06/2006 - 12/2011, £784,417, as PI
- Formal Methods and Testing (FORTEST), EPSRC, 11/2001 - 04/2005, £63,158, as Co-PI
- SEMINAL: Software Engineering with Metaheuristic Innovative ALgorithms, EPSRC, 06/2000 - 05/2002, £45,763, as Co-PI
- SEMINAL: Software Engineering with Metaheuristic Innovative ALgorithms, EPSRC, 11/1999 - 06/2000, £51,112, as Co-PI
- CONVERSE: A Change-oriented process for Engine Controllers, EPSRC, 10/1997 - 10/2000, £201,963, as Co-PI
- Test Automation for Verification of non-functional properties, EPSRC, 01/1996 - 10/1997, £124,406, as Co-PI
- Anaylis and design synthesis for real-time safety critical systems, EPSRC, 12/1994 - 03/1998, £151,005, as Co-PI
- Professional activities and memberships
-
Professional activities and achievements
- Member of the Security of Advanced Systems research group
- Awarded Royal Society Wolfson Research Merit Award in 2013.
- ACM/IEEE Automated Software Engineering. Most influential 15 year (-/+1) paper: ASE 1998 - An Automated Framework for Structural Test-Data Generation - Nigel Tracey, John Clark, Keith Mander and John McDermid.
- Winner of Silver Medal and $1000 (Human-Competitive Quantum Fourier Transform Algorithm Using Genetic Programming. Paul Massey, John A Clark and Susan Stepney, 2005) and Bronze Medal and $2000 (Genetic algorithms and solid state NMR pulse sequences. Matthias Bechmann, John Clark, Angelika Sebald, 2013) in GEECO’s Human Competitive Awards open competitions.
- Awarded 9 best paper prizes since 2004.
- External Examiner for 4 undergraduate programmes: King's College London, Sheffield, Brunel, and Imperial College London.
- External Examiner for 4 postgraduate programmes: Newcastle, Open University, Dublin and University College London.
Administrative and Community Roles
- Joins Sheffield in April 2017 as the group leader for new Security of Advanced Systems Research Group
- Previously: Secretary and Chair of various Boards of Examiners, Head of Research, Sciences Rep on Senate, and Head of Department.
- Regular reviewer, panellist, and panel chair for the EPSRC.