skip to content

Department of Computer Science and Technology

  • Professor of Computer Security
  • Deputy Head of Department

Publications

Journal articles

  • Weidner, M., Kleppmann, M., Hugenroth, D. and Beresford, AR., 2020. Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees. IACR Cryptol. ePrint Arch., v. 2020
  • Kleppmann, M., Beresford, AR. and Svingen, B., 2019. Online Event Processing. Queue, v. 17
    Doi: 10.1145/3317287.3321612
  • Beresford, A., Mascolo, C. and Gruteser, M., 2018. The specter of malicious computing: Securing the internet of things IEEE Pervasive Computing, v. 17
    Doi: http://doi.org/10.1109/MPRV.2018.03367730
  • Kleppmann, M., Gomes, VBF., Mulligan, DP. and Beresford, AR., 2018. OpSets: Sequential Specifications for Replicated Datatypes. Arch. Formal Proofs, v. 2018
  • Gomes, VBF., Kleppmann, M., Mulligan, DP. and Beresford, AR., 2017. A framework for establishing Strong Eventual Consistency for Conflict-free Replicated Datatypes. Arch. Formal Proofs, v. 2017
  • Kleppmann, M. and Beresford, AR., 2017. A Conflict-Free Replicated JSON Datatype IEEE Transactions on Parallel and Distributed Systems, v. PP
    Doi: http://doi.org/10.1109/TPDS.2017.2697382
  • Cummins, S., Beresford, AR. and Rice, A., 2016. Investigating Engagement with In-Video Quiz Questions in a Programming Course IEEE Transactions on Learning Technologies, v. 9
    Doi: 10.1109/TLT.2015.2444374
  • Kleppmann, M. and Beresford, AR., 2016. A Conflict-Free Replicated JSON Datatype. CoRR, v. abs/1608.03960
  • Wagner, DT., Rice, A. and Beresford, AR., 2014. Device analyzer: Largescale mobile data collection Performance Evaluation Review, v. 41
    Doi: 10.1145/2627534.2627553
  • Preibusch, S. and Beresford, AR., 2013. Establishing distributed hidden friendship relations Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 7028 LNCS
    Doi: http://doi.org/10.1007/978-3-642-36213-2_35
  • Preibusch, S., Kübler, D. and Beresford, AR., 2013. Price versus privacy: an experiment into the competitive advantage of collecting less personal information Electronic Commerce Research,
  • Preibusch, S., Kübler, D. and Beresford, AR., 2013. Price versus privacy: An experiment into the competitive advantage of collecting less personal information Electronic Commerce Research, v. 13
    Doi: http://doi.org/10.1007/s10660-013-9130-3
  • Beresford, AR., Kübler, D. and Preibusch, S., 2012. Unwillingness to pay for privacy: A field experiment Economics Letters, v. 117
    Doi: http://doi.org/10.1016/j.econlet.2012.04.077
  • Bacon, J., Bejan, AI., Beresford, AR., Evans, D., Gibbens, RJ. and Moody, K., 2011. Using Real-Time Road Traffic Data to Evaluate Congestion Dependable and Historic Computing, v. LNCS 6875
  • Bejan, AI., Gibbens, RJ., Evans, D., Beresford, AR., Bacon, J. and Friday, A., 2010. Statistical modelling and analysis of sparse bus probe data in urban areas IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC,
    Doi: http://doi.org/10.1109/ITSC.2010.5625144
  • Cohen, J., North, R., Wilkins, S., Darlington, J., Guo, Y., Hoose, N., Ma, Y., Polak, J., Suresh, V., Watson, P., Bell, M., Blythe, P., Neasham, J., Calleja, M., Hayes, M., Beresford, A., Jones, R. and Mead, I., 2009. Creating the message infrastructure Traffic Engineering and Control, v. 50
  • North, R., Cohen, J., Wilkins, S., Richards, M., Hoose, N., Polak, J., Bell, M., Blythe, P., Sharif, B., Neasham, J., Suresh, V., Galatioto, F., Hill, G., Mead, I., Jones, R., Beresford, A., Chen, H., Ropkins, K., Goodman, P., Oates, C., Tate, J. and Ballijepalli, N., 2009. Field deployments of the environmental monitoring Traffic Engineering and Control, v. 50
  • Cottingham, DN., Beresford, AR. and Harle, RK., 2007. Survey of technologies for the implementation of national-scale road user charging TRANSPORT REV, v. 27
    Doi: http://doi.org/10.1080/01441640701214304
  • Alastair, B., 2007. Editor's report 2006 Area, v. 39
    Doi: http://doi.org/10.1111/j.1475-4762.2007.00733.x
  • Davies, JJ., Beresford, AR. and Hopper, A., 2006. Scalable, distributed, real-time map generation IEEE PERVAS COMPUT, v. 5
  • Beresford, AR., 2006. Privacy issues in geographic information technologies
    Doi: http://doi.org/10.1007/3-540-31305-2_13
  • Mount, S., Gaura, E., Newman, RM., Beresford, AR., Dolan, SR. and Allen, M., 2005. Trove: A physical game running on an ad-hoc wireless sensor network ACM International Conference Proceeding Series, v. 121
    Doi: http://doi.org/10.1145/1107548.1107607
  • Harle, R. and Beresford, A., 2005. Keeping big brother off the road IEE REVIEW, v. 51
  • BERESFORD, AR., 2003. Location Privacy in Pervasive Computing IEEE Pervasive Computing, v. 2
  • Midkiff, SF., Beresford, A., Kalló, CK., Kretschmer, U., Mattern, F. and Muehlenbrock, M., 2003. The first summer school on ubiquitous and pervasive computing IEEE Pervasive Computing, v. 2
    Doi: http://doi.org/10.1109/MPRV.2003.1274024
  • Beresford, AR. and Stajano, F., 2003. Location privacy in pervasive computing IEEE PERVAS COMPUT, v. 2
  • Dennis, RM., Beresford, AR. and Brown, KM., 2001. Virtual University research initiative on mobility BT TECHNOL J, v. 19
  • Taylor, VF., Beresford, AR. and Martinovic, I., Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones arXiv.org,
  • Manousakas, D., Mascolo, C., Beresford, A., Chan, D. and Sharma, N., Quantifying Privacy Loss of Human Mobility Graph Topology Proceedings on the Privacy Enhancing Technologies Symposium (PoPETS),
  • Beresford, AR. and Gay, S., Proceedings Second International Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software EPTCS 17, 2010,
    Doi: http://doi.org/10.4204/EPTCS.17
  • Kleppmann, M., Gomes, VBF., Mulligan, DP. and Beresford, AR., OpSets: Sequential Specifications for Replicated Datatypes (Extended Version)
  • Kleppmann, M., Beresford, AR. and Svingen, B., Online Event Processing: Achieving Consistency Where Distributed Transactions Have Failed Communications of the ACM, v. 62
    Doi: http://doi.org/10.1145/3312527
  • Kollmann, SA. and Beresford, AR., The Cost of Push Notifications for Smartphones using Tor Hidden Services IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), v. 2017
    Doi: http://doi.org/10.1109/EuroSPW.2017.55
  • Kollmann, SA., Kleppmann, M. and Beresford, AR., Snapdoc: Authenticated snapshots with history privacy in peer-to-peer collaborative editing Proceedings on Privacy Enhancing Technologies (PoPETs),
  • Zhang, J., Beresford, A. and Sheret, I., Factory Calibration Fingerprinting of Sensors IEEE Transactions on Information Forensics and Security,
  • Conference proceedings

  • Powar, J. and Beresford, AR., 2019. A Data Sharing Platform for Earables Research Proceedings of the 1st International Workshop on Earable Computing, EarComp 2019,
    Doi: 10.1145/3345615.3361139
  • Kawsar, F. and Beresford, AR., 2019. EarComp 2019: First International Workshop on Earable Computing Proceedings of the 1st International Workshop on Earable Computing, EarComp 2019,
    Doi: 10.1145/3345615.3361140
  • Kleppmann, M., Gomes, VBF., Mulligan, DP. and Beresford, AR., 2019. Interleaving anomalies in collaborative text editors. PaPoC@EuroSys,
  • 2019. Proceedings of the 1st International Workshop on Earable Computing, EarComp@UbiComp 2019, London, UK, September 10, 2019 EarComp@UbiComp,
  • Kleppmann, M., Kollmann, SA., Vasile, DA. and Beresford, AR., 2018. From Secure Messaging to Secure Collaboration Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 11286 LNCS
    Doi: http://doi.org/10.1007/978-3-030-03251-7_21
  • Mulligan, DP., Beresford, AR., Gomes, VBF. and Kleppmann, M., 2017. Verifying Strong Eventual Consistency in Distributed Systems Proceedings of the ACM on Programming Languages, v. 1
  • Thomas, DR., Pastrana Portillo, S., Hutchings, A., Clayton, R. and Beresford, AR., 2017. Ethical issues in research using datasets of illicit origin Proceedings of IMC '17,
    Doi: 10.1145/3131365.3131389
  • Gomes, VBF., Kleppmann, M., Mulligan, DP. and Beresford, AR., 2017. Verifying Strong Eventual Consistency in Distributed Systems. CoRR, v. abs/1707.01747
  • Widdicks, K., Bates, O., Hazas, M., Friday, A. and Beresford, AR., 2017. Demand around the clock: Time use and data demand of mobile devices in everyday life Conference on Human Factors in Computing Systems - Proceedings, v. 2017-May
    Doi: 10.1145/3025453.3025730
  • Thomas, DR., Clayton, R. and Beresford, AR., 2017. 1000 days of UDP amplification DDoS attacks
  • Taylor, VF., Beresford, AR. and Martinovic, I., 2017. There are Many Apps for That: Quantifying the Availability of Privacy-Preserving Apps WiSec '17 Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (,
    Doi: http://doi.org/10.1145/3098243.3098266
  • Cummins, S., Stead, A., Jardine-Wright, L., Davies, I., Beresford, AR. and Rice, A., 2016. Investigating the use of hints in online problem solving L@S 2016 - Proceedings of the 3rd 2016 ACM Conference on Learning at Scale,
    Doi: 10.1145/2876034.2893379
  • Cummins, S., Beresford, AR., Davies, I. and Rice, A., 2016. Supporting Authentication and Scalable Data Sharing in Online Education L@S 2016 - Proceedings of the 3rd 2016 ACM Conference on Learning at Scale,
    Doi: 10.1145/2876034.2893376
  • Beresford, AR., 2016. Whack-a-mole security: Incentivising the production, delivery and installation of security updates CEUR Workshop Proceedings, v. 1575
  • Gechter, F., Beresford, AR. and Rice, A., 2016. Reconstruction of battery level curves based on user data collected from a smartphone Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9883 LNAI
    Doi: 10.1007/978-3-319-44748-3_28
  • Thomas, DR. and Beresford, AR., 2016. Incentivising software updates
  • Ferreira, D., Kostakos, V., Beresford, AR., Lindqvist, J. and Dey, AK., 2015. Securacy: An empirical investigation of android applications' network usage, privacy and security Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015,
    Doi: 10.1145/2766498.2766506
  • Cummins, S., Davies, I., Rice, A. and Beresford, AR., 2015. Equality: A tool for free-form equation editing Proceedings - IEEE 15th International Conference on Advanced Learning Technologies: Advanced Technologies for Supporting Open Access to Formal and Informal Learning, ICALT 2015,
    Doi: 10.1109/ICALT.2015.34
  • Thomas, DR., Beresford, AR. and Rice, A., 2015. Security metrics for the Android ecosystem SPSM 2015 - Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, co-located with: CCS 2015,
    Doi: 10.1145/2808117.2808118
  • Thomas, DR., Beresford, AR., Coudray, T., Sutcliffe, T. and Taylor, A., 2015. The lifetime of android API vulnerabilities: Case study on the JavaScript-to-Java interface Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 9379
    Doi: 10.1007/978-3-319-26096-9_13
  • Wagner, DT., Thomas, DR., Beresford, AR. and Rice, A., 2015. Device analyzer: A privacy-aware platform to support research on the android ecosystem Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015,
    Doi: 10.1145/2766498.2774992
  • Rice, A. and Beresford, AR., 2014. The device analyzer competition UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing,
    Doi: 10.1145/2638728.2641696
  • Wagner, DT., Rice, A. and Beresford, AR., 2014. Device analyzer: Understanding smartphone usage Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, v. 131
    Doi: 10.1007/978-3-319-11569-6_16
  • Thomas, DR. and Beresford, AR., 2014. Better authentication: Password revolution by evolution Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v. 8809
    Doi: 10.1007/978-3-319-12400-1_13
  • Preibusch, S., Krol, K. and Beresford, AR., 2012. The Privacy Economics of Voluntary Over-disclosure in Web Forms. WEIS,
  • Beresford, AR., Rice, A., Skehin, N. and Sohan, R., 2011. MockDroid: trading privacy for application functionality on smartphones In the Proceedings of the 11th Workshop on Mobile Computing Systems and Applications (HotMobile),
  • Hay, S., Rassia, ST. and Beresford, AR., 2010. Estimating Personal Energy expenditure with location data. PerCom Workshops,
    Doi: http://doi.org/10.1109/PERCOMW.2010.5470650
  • Beresford, AR., Davies, JJ. and Harle, RK., 2009. Privacy-Sensitive Congestion Charging SECURITY PROTOCOLS, v. 5087
  • Bacon, J., Beresford, AR., Evans, D., Ingram, D., Trigoni, N., Guitton, A. and Skordylis, A., 2008. TIME: An open platform for capturing, processing and delivering transport-related data 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3,
  • Davies, JJ., Beresford, AR. and Mycroft, A., 2008. Language-based optimisation of sensor-driven distributed computing applications FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, v. 4961
  • Kim, J., Beresford, AR. and Stajano, F., 2007. Towards a security policy for ubiquitous healthcare systems (Position paper) Ubiquitous Convergence Technology, v. 4412
  • Davies, JJ. and Beresford, AR., 2007. Scalable inter-vehicular applications ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 2, PROCEEDINGS, v. 4806
  • Evans, D., Beresford, AR., Burbridge, T. and Soppera, A., 2007. Context-derived pseudonyms for protection of privacy in transport middleware and applications Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Proceedings,
  • Rice, AC., Harle, RK. and Beresford, AR., 2006. Analysing fundamental properties of marker-based vision system designs. Pervasive Mob. Comput., v. 2
    Doi: 10.1016/j.pmcj.2006.07.006
  • Rice, AC., Beresford, AR. and Harle, RK., 2006. Cantag: An open source software toolkit for designing and deploying marker-based vision systems PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS,
  • Rice, AC. and Beresford, AR., 2006. Dependability and accountability for context-aware middleware systems FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
  • Beresford, AR., 2006. Privacy-Sensitive Congestion Charging. Security Protocols Workshop, v. 5087
  • Joseph, AD., Beresford, AR., Bacon, J., Cottingham, DN., Davies, JJ., Jones, BD., Guo, H., Guan, W., Lin, Y., Song, H., Iftode, L., Fuchs, S., Lamprecht, B., Kyamakya, K., Fernández, JG., García, JCY., García, YSM., Santos, JDG., Nimesh, M., Pan, G., Wu, Z., Wu, Q., Shan, Z., Sun, J., Lu, J., Yang, G., Khan, MK. and Zhang, J., 2006. Intelligent Transportation Systems. IEEE Pervasive Comput., v. 5
    Doi: http://doi.org/10.1109/MPRV.2006.77
  • Sharp, R., Scott, J. and Beresford, AR., 2006. Secure mobile computing via public terminals PERVASIVE COMPUTING, PROCEEDINGS, v. 3968
  • Mansley, K., Beresford, AR. and Scott, D., 2004. The carrot approach: Encouraging use of location systems UBICOMP 2004: UBIQUITOUS COMPUTING, PROCEEDINGS, v. 3205
  • Beresford, AR. and Stajano, F., 2004. Mix zones: User privacy in location-aware services SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
  • Scott, DJ., Beresford, AR. and Mycroft, A., 2003. Spatial Policies for Sentient Mobile Applications. POLICY,
    Doi: 10.1109/POLICY.2003.1206968
  • Scott, D., Beresford, A. and Mycroft, A., 2003. Spatial security policies for mobile agents in a sentient computing environment FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, v. 2621
  • Scott, D., Beresford, A. and Mycroft, A., 2003. Spatial policies for sentient mobile applications IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS,
  • Franceschini, A., Beresford, AR. and Sharkey, JP., Inequality: multi-modal equation entry on the web
  • Dodson, M., Thomas, D. and Beresford, A., When will my PLC support Mirai? The security economics of large-scale attacks against Internet-connected ICS devices
  • Zhang, J., Beresford, A. and Kollmann, S., LibID: Reliable Identification of Obfuscated Third-Party Android Libraries ISSTA 2019: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis,
    Doi: http://doi.org/10.1145/3293882.3330563
  • Vasile, DA., Kleppmann, M., Thomas, D. and Beresford, AR., Ghost trace on the wire? Using key evidence for informed decisions
  • Hugenroth, D., Kleppmann, M. and Beresford, A., Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks Proceedings of the 30th USENIX Security Symposium,
  • Weidner, M., Kleppmann, M., Hugenroth, D. and Beresford, AR., Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees
    Doi: http://doi.org/10.1145/3460120.3484542
  • Powar, J. and Beresford, AR., A data sharing platform for earables research EarComp'19: Proceedings of the 1st International Workshop on Earable Computing,
    Doi: http://doi.org/10.1145/3345615
  • Dodson, M., Beresford, AR. and Vingaard, M., Using Global Honeypot Networks to Detect Targeted ICS Attacks
  • Kleppmann, M., Borges Ferreira Gomes, V., Mulligan, DP. and Beresford, AR., Interleaving anomalies in collaborative text editors
  • Zhang, J., Beresford, A. and Sheret, I., SensorID: Sensor Calibration Fingerprinting for Smartphones
  • Dodson, M., Beresford, AR., Watson, R., Clarke, J. and Richardson, A., CHERI Macaroons: Efficient, host-based access control for cyber-physical systems
  • Book chapters

  • Preibusch, S., Krol, K. and Beresford, AR., 2013. The Privacy Economics of Voluntary Over-disclosure in Web Forms.
    Doi: 10.1007/978-3-642-39498-0_9
  • Beresford, AR. and Scott, DJ., 2008. Data Privacy.
    Doi: 10.1002/9780470050118.ecse493
  • Datasets

  • Thomas, DR., Wagner, DT., Beresford, AR. and Rice, A., Supporting data for: "Security metrics for the Android ecosystem"
  • Kollmann, SA. and Beresford, AR., Supporting data for "The cost of push notifications for smartphones using Tor hidden services"
  • Theses / dissertations

  • Zhang, J., Hardware and software fingerprinting of mobile devices
  • Internet publications

  • Beresford, AR., Home Page
  • Contact Details

    Room: 
    SN10
    Office phone: 
    (01223) 7-63597
    Email: 

    arb33@cam.ac.uk