Sarah Meiklejohn

About me

Bio

Photo of Sarah I joined UCL in September 2014 as a Lecturer (Assistant Professor) in the departments of Computer Science and Security and Crime Science. I am affiliated with the Information Security Group and have broad research interests in security and cryptography.
 
Before joining UCL, I received a PhD in Computer Science at the University of California, San Diego under the joint supervision of Mihir Bellare and Stefan Savage. During my PhD, I spent the summers of 2011 and 2013 at MSR Redmond, working in the cryptography group with Melissa Chase. In 2009, I obtained an Sc.M. in Computer Science from Brown University under the guidance of Anna Lysyanskaya. I also obtained an Sc.B. in Mathematics from Brown in 2008.  

Contact Info

s.meiklejohn [at] ucl [dot] ac [dot] uk
 
MPEB 6.06
Department of Computer Science
University College London
Gower Street
London WC1E 6BT

Research

Supervision

I am currently hiring for THREE postdoc positions! Please look here for more details.

Applications are invited for three postdoctoral researcher positions in the Information Security Group at the UCL Department of Computer Science, to be supervised by Dr Sarah Meiklejohn (PI) and Prof. Tomaso Aste and Dr George Danezis (co-investigators). The positions are in support of an EPSRC project on the Digital Economy, and in particular will be examining the applications of distributed ledgers and the challenges in designing and deploying these technologies.

Each position will have a slightly different focus: position 1 on the cryptographic and privacy-related design challenges of distributed ledgers, position 2 on the challenges in creating scalable distributed systems, and position 3 on the human-facing and behavioural challenges in deploying these technologies. As such, we expect successful candidates to explore research topics such as:
They will also support the supervision of research students, coordinate and advise our industrial user partners, and ensure the timely delivery of various research outputs. We expect candidates to be able to develop their own research agenda within the broad theme of the project. We expect candidates to have a PhD in Computer Science, Economics, or a related field, and a strong track record in or similar topics.

For any enquiries or to apply for the positions, please submit a full curriculum vitae and a research statement to me (s.meiklejohn at ucl.ac.uk), as well as an indication of which position(s) you consider yourself most well suited to, or apply online directly for position 1, position 2, or position 3. Positions 1 and 2 are available starting September 2016 and position 3 is available starting December 2016 (with all start dates negotiable) and all positions will last for two years, with the possibility to extend by another 6-12 months.

I am fortunate enough to supervise the following lovely PhD students:

Publications

(Click year to show/hide)
[C = Conference] [J = Journal] [W = Workshop] [M = Miscellaneous]

2016

[J : CACM]
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
Communications of the Association for Computing Machinery
[C : NDSS]
Centrally Banked Cryptocurrencies (slides)
George Danezis and Sarah Meiklejohn
Network and Distributed System Security Symposium
(This work has been featured in MIT Technology Review.)

2015

[C : PKC]
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
Allison Lewko and Sarah Meiklejohn
IACR International Conference on Practice and Theory of Public-Key Cryptography
[W : Bitcoin]
Privacy-Enhancing Overlays in Bitcoin (slides)
Sarah Meiklejohn and Claudio Orlandi
The Second Workshop on Bitcoin Research

2014

[C : CCS]
Algebraic MACs and Keyed-Verification Anonymous Credentials
Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha
ACM Conference on Computer and Communications Security.
[J : TCAD]
Leveraging Gate-Level Properties to Identify Hardware Timing Channels
Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and Ryan Kastner
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, September 2014.
[C : CSF]
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
Computer Science Foundations Symposium.
[C : Eurocrypt]
Key-Versatile Signatures and Applications: RKA, KDM, and Joint Enc/Sig
Mihir Bellare, Sarah Meiklejohn, and Susan Thomson
Eurocrypt.
[C : Eurocrypt]
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions (slides)
Melissa Chase and Sarah Meiklejohn
Eurocrypt.
[M : Thesis]
Flexible Models for Secure Systems (slides)
UCSD Dissertation, April 2014.
(This won UCSD's 2015 Chancellor's Dissertation Medal (see here and here). Thanks!)
[C : NDSS]
Botcoin: Monetizing Stolen Cycles
Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, and Kirill Levchenko
Network and Distributed System Security Symposium.
[C : CT-RSA]
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions (slides)
Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, and Brent Waters
Cryptographer's Track at the RSA Conference.

2013

[J : login]
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
USENIX ;login:, December 2013.
[C : IMC]
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names (slides)
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
Internet Measurement Conference.
(This work has been featured in The New York Times, Wired, The Economist, Forbes, The Washington Post, and more.)
(One of two IMC papers fast-tracked for Transactions on Networking.)
[C : DATE]
A Practical Testing Framework for Isolating Hardware Timing Channels
Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and Ryan Kastner
Design, Automation, and Test in Europe.
[C : TCC]
Succinct Malleable NIZKs and an Application to Compact Shuffles (slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
Theory of Cryptography Conference.
[C : PKC]
Verifiable Elections That Scale for Free (slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
International Conference on Practice and Theory of Public-Key Cryptography.

2012

[C : Eurocrypt]
Malleable Proof Systems and Applications (slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
Eurocrypt.

2011

[C : Usenix Sec]
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion (slides)
Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, and Hovav Shacham
USENIX Security Symposium.
[W : WOOT]
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks (slides)
Keaton Mowery, Sarah Meiklejohn, and Stefan Savage
USENIX Workshop on Offensive Technologies.

2010

[C : Asiacrypt]
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures (slides)
Sarah Meiklejohn, Hovav Shacham, and David Mandell Freeman
Asiacrypt 2010.
[C : Usenix Sec]
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash (slides)
Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, and Anna Lysyanskaya
USENIX Security 2010.
(The source code for this project can be found here, and the project homepage here.)

2009

[M : Thesis]
An Extension of the Groth-Sahai Proof System
Brown University Masters thesis, May 2009.

Teaching

Activities

Events and schools

Conference (co-)chair

Programme committee member

Photo credit: Rosa Koolhoven