JAC

Background


I did Mathematics and then an MSc in Applied Statistics at Oxford. I then joined the security division of the software and systems house Logica in 1987, working as a security and high integrity software evaluation consultant to HMG and then on a security ‘R & D’ thinktank for HMG. I joined York in 1992. I have been research active since around 1997 (with a few outputs before then). My personal and supervised research work concentrates on aspects of security and software engineering (with a particular interest in applying heuristic computing and other AI to these areas), though I am more eclectic on what I supervise as taught course projects. I was awarded my PhD in 2002 and promoted to a Personal Chair in January 2005. I have been cited (GS) around 4260 times, as far as I can tell.

I believe that “teaching is part of the job". From 2005-2007 I was Chair of Examinations within the Department of Computer Science at York. I was secretary to various Boards of Examiners for around 7 years too. I aim to play as best a part I can in the wider academic community. I have been (taught course) external examiner at several UK Universities in the past ten years: UG programmes - Open University, King's College London, Imperial College London, and Sheffield; MSc - Newcastle. I am currently external at University College London and Brunel (final year of 4 in 2014). I will maintain some EE presence, but my other current community commitments mean this will be at a reduced level.

In the past nine years I have also been co-author of eleven prize-winning research papers: particular thanks to my PhD students, many of whom I taught as undergraduates. I have published or collaborated on proposals with members of every one of our nine research groups.

I do some outreach activities, e.g. talk to Computing At Schools, judging York and District schools technology day, and am likely to be working directly with individual schools in the York area in future.

Since April 2009 I have been Deputy Head of Department (Responsible for Research).

I am delighted to have received a Royal Society Wolfson Research Merit Award to pursue my work in optimisation based design and analysis of systems.(August 2013-July 2018, announced publicly 30 August 2013).

Grants

Current or Very Recent Grants

I hold or have recently held the following grants:

    • EPSRC:
      • EPSRC PROGRAMME GRANT: Dynamic Adaptive Automated Software Engineering (DAASE) (2012-2018): £6.5M (Around 1M at York. PI Mark Harman at UCL)
      • The Birth Life and Death of Semantic Mutants (2009-2013): £136,252
      • SEBASE: Software Engineering By Automated SEarch (2006-2011): £786,241
      • Using Learning to Support the Development of Embedded Systems [CI,Iain Bate is PI] (2007-1010): £438,928 (FEC)
      • System-Smart Intrusion Detection (2007-2010): £ 271,572 (FEC)
      • Defending the Weakest Link: Intrusion via Social Engineering (2007-2010): £189,277
    • Other:
      • International Technology Alliance (ITA): rolling grant over 5 years: (approx. $200000 per year)

Publications of John A Clark


Best Paper Awards, Prizes and Other Distinctions


  1. Royal Society Wolfson Merit Award (2013-2018).
  2. ACM/IEEE Automated Software Engineering. Most influential 15 year (-/+1) paper (award decision made 23 July 2013) :
    ASE 1998 - An Automated Framework for Structural Test-Data Generation - Nigel Tracey, John Clark, Keith Mander and John McDermid. (download)
    and if you want to see the other joint winner.... it's the one below
    ASE 1999 - Evolving object-oriented architectures with refactorings - Lance Tokuda, Don Batory. (download)
  3. Genetic algorithms and solid state NMR pulse sequences. Matthias Bechmann, John Clark, Angelika Sebald. Journal of Magnetic Resonance 228 (2013) 6675. Winner of the Bronze Medal and $2000. 10th Human Competitive Awards 2013 ("The Humies")
  4. Simon Poulding, John A. Clark, Robert Alexander, and Mark J. Hadley, The Optimisation of Stochastic Grammars to Enable Cost-Effective Probabilistic Structural Testing, Proc. Genetic and Evolutionary Computation Conference (GECCO), 2013. Best Search Based Software Engineering (from 33 entries) SBSE at GECCO.
  5. Searching for Pareto-optimal Randomised Algorithms Alan G. Millard and David Robert White and John A. Clark. Proceedings of Symposium on Search Based Software Engineering - 4th International Symposium, SSBSE 2012. (download)
  6. Searching for Invariants using Genetic Programming and Mutation Testing. Sam Ratcliff, David R White, and John A Clark. WINNER OF THE BEST PAPER PRIZE (Search Based Software Engineering. 26 submissions) GECCO 2011. 12-16 July 2011. (Sam picked up his first class MEng on 14 July 2011 and flew to Dublin to deliver the paper 15 July! David is now Research Fellow at Glasgow.)
  7. A Principled Evaluation of the Effect of Directed Mutation on Search-Based Statistical Testing. Simon Poulding, John A. Clark, and H´el`ene Waeselynck. Search Based Software Testing 2011. WINNER OF THE BEST PAPER PRIZE.
  8. Searching for Safety Violations using Estimation of Distribution Algorithms. Jan Staunton and John Clark. WINNER OF THE BEST STUDENT PAPER PRIZE.SBST 2010. (download)
  9. A Deployment Value Model for Intrusion Detection Sensors. Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A. and Chen, H. In Proceedings 3rd International Conference on Information Security and Assurance. 2009 LNCS 5576. WINNER OF THE BEST PAPER PRIZE. (download)
  10. Automatic Test Data Generation for Multiple Condition and MCDC Coverage. Kamran Ghani and John A Clark. ICSEA 2009. WINNER OF A TOP PAPER PRIZE.
  11. Evolution of a Human-Competitive Quantum Fourier Transform Algorithm Using Genetic Programming. Paul Massey, John A Clark and Susan Stepney. Genetic and Evolutionary Computation Conference (GECCO) 2005. Silver Medal and $1000 in Human Competitive Awards 2005 – the Humies. See
    http://www.genetic-programming.org/hc2005/cfe2005.html (download) I think the Humies are a great idea by the way!
  12. Breaking the Model: finalisation and a taxonomy of security attacks. John A. Clark, Susan Stepney, Howard Chivers. REFINE 2005, Surrey, UK. ENTCS 137(2):225-242, 2005. (download) WINNER OF THE BEST PAPER PRIZE.
  13. Evolving Quantum Circuits and Programs through Genetic Programming. Paul Massey, John A. Clark, Susan Stepney. AAAI Genetic and Evolutionary Computation Conference (GECCO) 2004 Genetic Programming strand. 26-30 June 2004. (WINNER OF THE BEST PAPER PRIZE. GP strand). (download)


In preparation | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 1999 | 1998 | Tech Reports and Theses| Grants|PhDs

In preparation

  1. The Grammatical Evolution of Boolean Functions with Cryptographic Significance. Mark Read and John A Clark.
  2. Searching for Venn Diagrams. John A Clark., Rana Sherif, John Atkinson and Simon Poulding.
  3. A Genetic Programming Approach to Evolving Quantum Programs and Circuits. Paul Massey, John A Clark and Susan Stepney. Applied Soft Computing Journal. To appear 2010.
  4. Mission Specific Security. Yow Tzu Lim, John A Clark, Pau-Chen Cheng and Juan Estevez Tapiador. COMPLETE - TO BE SUBMITTED.

    Delivered or Accepted 2011

  5. Masquerade mimicry attack detection: A randomised approach. Juan E. Tapiador and John A. Clark. Computers & Security",V(3) No. 5, pp 297 – 310, 2011. http://www.sciencedirect.com/science/article/pii/S0167404811000654
  6. Applications of Model Reuse when using Estimation of Distribution Algorithms to Test Concurrent Software. Jan Staunton and John A Clark. Accepted to SBSE 2011
  7. Evolutionary compuitation techniques for intrusion detection in Mobile ad hoc networks. Sevil Sen and John A Clark. In oress. Computer Networks (Elsevier) 2011. .doi:10.1016/j.comnet.2011.07.001
  8. Segmentation and Normalisation in Grapheme Codebooks. Tara Gilliam, Richard C Wilson and John A Clark. ICDAR 2011. <
  9. Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing. Juan E Tapiador, Mudhakar Srivatsa, John A Clark and John A McDermid. WNCS 2011.
  10. Information-Theoretic Detection of Mimicry Masquerade Attacks. J.E. Tapiador, J.A. Clark. Original paper accepted to Network and System Security 2010. One of ten papers invited for extension and further reviewing to Computers and Security). Original conference acceptance rate was 15%. 10 from 30 accepted papers invited.
  11. Semantic Mutation Testing. John A. Clark, Haitao Dan, Robert M. Hierons. Accepted to Science of Computer Programming. To appear.
  12. Multi-Objective Improvement of Software using Co-evolution and Smart Seeding. Andrea Arcuri, David Robert White, John Clark. Journal version. IEEE Transactions on Evolutionary Computation.
  13. Finding Short Counterexamples in Promela Models Using Estimation of Distribution Algorithms. Jan Staunton and John A Clark. Nominated for Best paper prize for SBSE at GECCO 2011, July 2011.
  14. Searching for Invariants using Genetic Programming and Mutation Testing Sam Ratcliff, David R White, and John A Clark. WINNER OF THE BEST PAPER PRIZE (Search Based Software Engineering. 26 submissions) GECCO 2011. 12-16 July 2011
  15. A Principled Evaluation of the Effect of Directed Mutation on Search-Based Statistical Testing. Simon Poulding, John A. Clark, and H´el`ene Waeselynck. Search Based Software Testing 2011. WINNER OF THE BEST PAPER PRIZE.
  16. Risk Based Access Control with Uncertain and Time-dependent Sensitivity.
    J.A. Clark, J.E. Tapiador, J. McDermid, P.-C. Cheng, D. Agrawal, N. Ivanic, D. Sloggett
    (download). To appear as a book chapter, selected from those papers accepted to SECRYPT 2010
  17. A shoal of phish: four studies of individual differences in detecting phishing emails. Mark Blyth, Helen Petrie, and John A Clark. Delivered at CHI 2011.
  18. Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Julio C Hernandez-Castro, Juan M E Tapiador, Pedro Peris Lopez, John A Clark and El Ghazali Tabli. International Journal of Foundations of Computer Science (IJFCS) Special Issue (link)
  19. Learning Autonomic Security Reconfiguration Policies. J.E. Tapiador, J.A. Clark
    Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10) (download)
  20. Risk Based Access Control with Uncertain and Time-dependent Sensitivity.
    J.A. Clark, J.E. Tapiador, J. McDermid, P.-C. Cheng, D. Agrawal, N. Ivanic, D. Sloggett
    SECRYPT 2010 (download)
  21. Information-Theoretic Detection of Mimicry Masquerade Attacks
    J.E. Tapiador, J.A. Clark. Network and System Security 2010. (download)
  22. A Perspective on Trust, Security and Autonomous Systems. Will Harwood, Jeremy L Jacob, and John A Clark. LIS 2010. (download)
  23. Networks of Trust and Distrust: Towards Logical Reputation Systems. Will Harwood, Jeremy L Jacob, and John A Clark. (download)
  24. The Phish in the Pond: Scam emails as literature . Mark Blythe and John A Clark. Critical Dialogue: Interaction, Experience and Cultural Theory Workshop on April 10 2010, in association with ACM CHI 2010 in Atlanta, Georgia (download)
  25. Fine-Grained Timing using Genetic Programming.
    D.R. White, J.E. Tapiador, J.C. Hernandez-Castro, J.A. Clark
    EuroGP 2010, LNCS 6021:325-336. Springer-Verlag. (download)
  26. Boolean Coherence: Does it make sense‌ Will Harwood, Jeremy L Jacob, and John A Clark. Logics in Systems Analysis, Edinburgh, July 2010 (download)
  27. Searching for Safety Violations using Estimation of Distribution Algorithms. Jan Staunton and John Clark. WINNER OF THE BEST STUDENT PAPER PRIZE.SBST 2010. (download)
  28. Scribe Identification in Medieval English Manuscripts. Tara Gilliam, Richard Wilson and John A Clark. ICPR 2010
  29. Semantic Mutation. John A Clark, Rob Hierons, and Haitao Dan. Mutation 2010- in conjunction with ICST 2010.
  30. Practical and Effective Statistical Testing by Means of Automated Search. Simon
  31. Optimising IDS Sensor Placement. Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, Philip Nobles (download)
  32. Defending the Weakest Link: Detection of Phishing Websites by User Behaviours. Xun Dong, Jeremy Jacob and John A Clark. Telecommun Syst (2010) 45: 215–226. DOI 10.1007/s11235-009-9247-9 (download)
  33. TAIC PART 2007 and Mutation 2007 Special Issue Editorial. The Journal of Systems & Software. Mark Harman, Phil McMinn, Jeff Offut and John A Clark. (download) <
  34. Dynamic Security Policy Learning. Yow Tzu Lim, Pau Chen Cheng, Pankaj Rohatgi, John A Clark. IBM Research Report RC24865. (Published by IBM) (download)
  35. Continuous Security Policy Learning. Yow Tzu Lim , Pau-Chen Cheng, Pankhaj Rohatgi, and John A Clark. 1st ACM Workshop on Information Security Governance.
  36. Towards scalable intrusion Detection. Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A. and Chen, H. Network Security. Elsevier.
  37. Security Threats in Mobile Ad Hoc Networks. Sevil ‌en, John A.Clark, Juan E. Tapiador (Book Chapter) (download)
  38. Risk Profiles and Distributed Risk Assessment. Howard Chivers, John A Clark and Pau-Chen Cheng (IBM). JOURNAL ACCEPTED TO: Computers and Security. (download)
  39. Knowing Who to Watch: Accumulating Evidence of Subtle Attacks. Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh and Hao Chen. Information Systems Frontiers. DOI: 10.1007/s10796-010-9268-7 (download)
  40. Highly entangled multi-qubit states with simple algebraic structure. J E Tapiador, J C Hernandez-Castro, J A Clark and S Stepney. J Phys A: Math & Theoret. (download)
  41. Power-Aware Intrusion Detection on Mobile Ad Hoc Networks. Sevil Sen, John A. Clark, and Juan E. Tapiador. AdHocNets 2009. (download)
  42. A Multi-Objective Optimisation Approach to IDS Sensor Placement. Hao Chen, John A. Clark, Juan E. Tapiador, Siraj A. Shaikh, Howard Chivers, and Philip Nobles. CICIS 2009. (download)
  43. Automatic Test Data Generation for Multiple Condition and MCDC Coverage. Kamran Ghani and John A Clark. ICSEA 2009. WINNER OF A TOP PAPER PRIZE
  44. Accumulating Evidence of Insider Attacks. Howard Chivers, Philip Nobles, Siraj A. Shaikh, John A. Clark, Hao Chen. 1st International workshop on Managing Insider Threats (MIST). Held in Conjunction with IFIPTM.
  45. A Deployment Value Model for Intrusion Detection Sensors. Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A. and Chen, H. In Proceedings 3rd International Conference on Information Security and Assurance. LNCS 5576. WINNER OF THE BEST PAPER PRIZE. (download)
  46. Using automated search to generate test data for MATLAB. Sion Ll Rhys, Simon M. Poulding, John A. Clark. GECCO 2009: 1697-1704 (download)
  47. Widening the Goal Posts: Program Stretching to Aid Search Based Software Testing. Kamran Ghani and John A Clark. International Symposium on Search Based Software Engineering 2009 (SSBSE 2009) (download)
  48. Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocols. Julio C Hernandez-Castro, Juan M E Tapiador, Pedro Peris Lopez, John A Clark and El Ghazali Tabli. Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium 2009. May 2009. (download)
  49. Comparing Algorithms for Search-Based Test Data Generation of Matlab Simulink Models. Kamran Ghani, John A. Clark and Yuan Zhan. IEEE Conference on Evolutionary Computation 2009. (download)
  50. A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad Hoc Networks. Sevil Sen and John A Clark. WiSec 2009. (download)
  51. Highly Entangled Multi-qubit States with Simple Algebraic Structure
    J.E. Tapiador, J.C. Hernandez-Castro, J.A. Clark, S. Stepney
    J. Phys. A: Math. Theor. 42 (2009) 415301 (Preprint quant-ph/0904.3874) [doi]
  52. Network Reconnaissance. Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A. and Chen, H. (2008) Network Security, Vol 2008. Elsevier. (Expected publication date November 2008) (download) <
  53. Characterising intrusion detection sensors. Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A. and Chen, H. (2008) Network Security, Elsevier. Volume 2008, Issue 9, September 2008, Pages 10-12 (download)
  54. Characterising intrusion detection sensors, part 2. Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A. and Chen, H. (2008) Network Security, Elsevier. Volume 2008, Issue 10, October 2008, Pages 9-11 (download)
  55. Searching for Quantum Programs and Quantum Protocols: a review. Susan Stepney, John A. Clark. Journal of Computational and Theoretical Nanoscience 5(5) 2008 (in press). (LOOK AT THIS)
  56. Intrusion Detection in Mobile Ad Hoc Networks. (Book Chapter) Sevil Sen and John A Clark. Guide to Wireless Ad Hoc Networks", Chapter 17. The publisher is Springer (editors: Sudip Misra, Subhas C Misra, Isaac Woungang). January 2009. (download)
  57. User Behaviour Based Phishing Websites Detection. Xun Dong, Jeremy Jacob and John A Clark. International Multi-conference on Computer Science and Information Technology. LNCS 5379:56-68. Wisla Poland, October 2008. (download)
  58. Modelling User-Phishing Interaction, Xun Dong, John A Clark and Jeremy L Jacob. Human System Interaction , May 25-27, 2008, Kraków, Poland (download)
  59. Threat Modelling in User Performed Authentication. Xun Dong, John A Clark and Jeremy Jacob 10th International Conference on Information and Computer Security (ICICS) 2008. Birmingham, UK. October 2008. (download)
  60. Searching for Resource-Efficient Programs: Low-Power Pseudorandom Number Generators. David R White, John Clark, Jeremy Jacob, Simon M Poulding. ACM GECCO July 2008. Atlanta. (download)
  61. Multi-Objective Improvement of Software using Co-evolution and Smart Seeding. Andrea Arcuri, David Robert White, John Clark, and Xin Yao. The Seventh International Conference on Simulated Evolution And Learning (SEAL'08). December 2008, Melbourne, Australia (download)
  62. Policy Evolution with Grammatical Evolution. Yow Tzu Lim, Pau Chen Cheng , John A Clark and Pankaj Rohatgi. The Seventh International Conference on Simulated Evolution And Learning (SEAL'08). December 2008, Melbourne, Australia. (download) <
  63. Policy Evolution with Grammatical Evolution.. Yow Tzu Lim, Pau Chen Cheng , John A Clark and Pankaj Rohatgi. ACITA 2008 (An extended version of the above paper.) (download)
  64. MLS security policy evolution with genetic programming Yow Tzu Lim and Pau Chen Cheng and Pankaj Rohatgi and John Andrew Clark. ACM GECCO 2008. (download) 18017923443259326565
  65. Policy Evolution with Genetic Programming: a Comparison of Three Approaches. Yow Tzu Lim, Pau Chen-Cheng, John A Clark and Pankaj Rohatgi. IEEE Congress on Evolutionary Computation 2008. (download)
  66. Strengthening Inferred Specification using Search Based Testing. Kamran Ghani and John A Clark.. International Conference on Search Based Software Testing ICSBST 2008. Lillehammer 2008. (download)
  67. Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks. Sevil Sen and John A Clark. Pacific Rim Conference on Artificial Intelligence (PRICAI) December 2008. (download)
  68. The certification of the Mondex electronic purse to ITSEC Level E6. Jim Woodcock, Susan Stepney, David Cooper, John A. Clark, Jeremy L. Jacob. Formal Aspects of Computing 20(1):5-19, 2008 (External Link)
  69. A Search-Based Framework for Automatic Testing of MATLAB/Simulink Models. Yuan Zhan and John A Clark. Journal of Systems and Software Special Issue on Model Based Testing. Volume 81, Issue 2 (February 2008) Pages 262-285. ISSN:0164-1212. DOI 10.1016/j.jss.2007.05.039 (download)
  70. Searching for Quantum Programs and Quantum Protocols: a review. Susan Stepney and John A Clark. Journal of Computational and Theoretical Nanoscience, Vol 5, No 4, pp 942-969, May 2008. (download)
  71. Non-Linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-boxes J.M.E. Tapiador, J.A. Clark, J.C. Hernandez-Castro IMA Conf. Crypto and Coding 2007. LNCS 4887:99-117. Springer-Verlag. [doi] Heuristic Search for Non-Linear Cryptanalytic Approximations. Juan Estevez Tapiador, Julio Cesar Hernandez and John A Clark. Proceedings of IEEE Conference on Evolutionary Computation 2007. (download)
  72. Non-Linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-boxes. Non-Linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-boxes J.M.E. Tapiador, J.A. Clark, J.C. Hernandez-Castro IMA Conf. Crypto and Coding 2007. NOTE ERRATUM: Expression (12), and therefore (13), in page 103 are wrong. (12) should be: P_R(A) = Px(0)Py(0) + Px(1)Py(1) and (13) ought to be modified accordingly. BROKEN (download)
  73. An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms (Simon Poulding, Paul Emberson, Iain Bate, and John Clark) HASE November 2007. (download)
  74. ] Unentangling nuclear magnetic resonance computing. Matthias Bechman, John A. Clark, Angelika Sebald and Susan Stepney. Proceedings of Unconventional Computing 2007. (download) <
  75. Threat Modelling for MANETs and Sensor Networks. John A. Clark, John Murdoch, John A. McDermid, Sevil Sen, Howard R. Chivers, Olwen Worthington and Pankaj Rohatgi ACITA 2007. (download)
  76. Aggregation of Information Leaked by a MANET John Murdoch, John A Clark, John McDermid, Howard Chivers, Olwen Worthington and Pankaj Rohatgi. ACITA 2007. (download)
  77. Deviational analyses for validating regulations on real systems,, F. Polack and T. Srivatanakul and T. Kelly and J. Clark, REMO2V workshop, Proceedings of the CAiSE'06, workshops and doctoral consortium, Presses Universitaires de Namur, 2006 (download)
  78. John A. Clark, Richard F. Paige, Fiona Polack, Phillip J. Brooke: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006. (link)
  79. Hao Chen, John A. Clark, Jeremy Jacob: Human competitive security protocols synthesis. GECCO 2006: 1855-1856. (download) 5981571450860966596
  80. Yuan Zhan, John A. Clark: The state problem for test generation in Simulink. GECCO 2006: 1941-1948 (download) 3025413119286756732
  81. Deviational analyses for validating regulations on real systems,, F. Polack and T. Srivatanakul and T. Kelly and J. Clark, REMO2V workshop, Proceedings of the CAiSE'06, workshops and doctoral consortium, Presses Universitaires de Namur, 2006 (download)
  82. Devices are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: a ubiquitous healthcare example. Yang Liu, John A Clark and Susan Stepney. 2nd International Conference on Security in Pervasive Computing 2005. (download)
  83. Stressing Security Requirements: Exploiting the Flaw Hypothesis Method with Deviational Techniques. Jill Srivatanakul, John A Clark and Fiona Polack, SREIS 2005, Symposium on Requirements Engineering for Information Security, in conjunction with RE 05 - 13th IEEE International Requirements Engineering Conference, Paris, 29 August 2005. (download) <
  84. Breaking the Model: finalisation and a taxonomy of security attacks., John A. Clark, Susan Stepney, Howard Chivers. REFINE 2005, Surrey, UK. ENTCS 137(2):225-242, 2005 (download) WINNER OF THE BEST PAPER PRIZE.
  85. Evolution of a Human-Competitive Quantum Fourier Transform Algorithm Using Genetic Programming, Paul Massey, John A Clark and Susan Stepney. Genetic and Evolutionary Computation Conference (GECCO) 2005. [Silver Medal and $1000 in Human Competitive Awards – the Hummies.] (download) <
  86. Search-Based Mutation Testing for Simulink Models, Yuan Zhan and John A Clark. Genetic and Evolutionary Computation Conference (GECCO) 2005. (Search Based Software Engineering Strand). (download)
  87. The Design of S-Boxes by Simulated Annealing. John A Clark, Jeremy L Jacob and Susan Stepney. Next Generation Computing Journal in 2005. (download)
  88. Journeys in Non-Classical Computation I: A Grand Challenge for Computing Research. Int. J. Parallel, Emergent and Distributed Systems. Susan Stepney, Samuel L. Braunstein, John A. Clark, Andy Tyrrell, Andrew Adamatzky, Robert E. Smith, Tom Addis, Colin Johnson, Jonathan Timmis, Peter Welch, Robin Milner, Derek Partridge (download)
  89. Journeys in Non-Classical Computation II: Initial Journeys and Waypoints. Int. J. Parallel, Emergent and Distributed Systems. Susan Stepney, Samuel L. Braunstein, John A. Clark, Andy Tyrrell, Andrew Adamatzky, Robert E. Smith, Tom Addis, Colin Johnson, Jonathan Timmis, Peter Welch, Robin Milner, Derek Partridge (download) 7466811159570852693
  90. Evolving Quantum Programs and Protocols. Susan Stepney, John A. Clark. In Michael Rieth, Wolfram Schommers, eds. Handbook of Theoretical and Computational Nanotechnology, American Scientific Publishers, 2005
  91. Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. Pante Stanica, Subhamoy Maitra and John A Clark. Fast Software Encryption 2004. 11th International Workshop, Fast Software Encryption (FSE) 2004, Delhi, India, February 5-7, 2004, Revised Papers. Series : Lecture Notes in Computer Science , Vol. 3017 Roy, Bimal; Meier, Willi (Eds.) 2004, XI, 485. ISBN: 3-540-22171-9 (download)
  92. Acquiring a Debt Worth Repaying. Leo Caves, John Clark and Susan Stepney. BIOGEC 2004 as part of AAAI Genetic and Evolutionary Computation Conference (GECCO) 2004. June 2004. (download)
  93. Search Based Automatic Test Data Generation at an Architectural Level. Yuan Zhan and John A Clark. AAAI Genetic and Evolutionary Computation Conference (GECCO) 2004 SBSE Strand. June 2004. (download)
  94. Evolving Quantum Circuits and Programs through Genetic Programming. Paul Massey, John A. Clark, Susan Stepney. AAAI Genetic and Evolutionary Computation Conference (GECCO) 2004 Genetic Programming strand. 26-30 June 2004. (WINNER OF THE BEST PAPER PRIZE. GP strand). (download)
  95. Searching for Cost Functions. John A Clark, Jeremy L Jacob and Susan Stepney. IEEE Congress on Evolutionary Computation 2004, Special Session on Security and Cryptology. Portland Oregon. June 2004. (download)
  96. The Design of S-Boxes by Simulated Annealing. John A Clark, Jeremy L Jacob and Susan Stepney. IEEE Congress on Evolutionary Computation 2004. Special Session on Security and Cryptology. Portland Oregon. June 2004. (Also to appear, mutatis mutandis, in New Generation Computing Journal in 2005). (download)
  97. Metrics are Fitness Functions too. Mark Harman and John A Clark. 10th IEEE International Metrics Symposium. Chicago. September 2004. (download)
  98. Synthesising efficient and effective security protocols. Hao Chen, John A Clark and Jeremy L Jacob. Second International Joint Conference on Automated Reasoning. ARSPA Cork, Ireland. July 2004. Chen Hao, John A. Clark and Jeremy L. Jacob. Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004), pp 25-41 ENTCS Volume 125, Issue 1, March 2005. (download)
  99. Effective Security Requirements Analysis: HAZOPs and Use Cases. Jill Srivatanakul, John A Clark and Fiona Polack. Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, Lecture Notes in Computer Science , Vol. 3225, pp 416-427. (download)
  100. Test Data Genberation for Product Lines: A Mutation Testing Approach. Yuan Zhan, Zoe Stephenson, John A Clark and John A. McDermid. To be presented at the 3rd Software Product Line Conference SPLC 2004 “Product Line Testing” workshop, August 31, 2004 Boston, Massachusetts, USA (download)
  101. Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion. John A Clark, Jeremy L Jacob., Subhamoy Maitra and Pantelimon Stanica Computational Intelligence Volume 20, Number 3, pp 450—462. Special Issue on Evolutionary Computing in Cryptography and Security. August 2004 (download)
  102. Automated Design of Security Protocols. Hao Chen, John Clark and Jeremy Jacob. Computational Intelligence Volume 20, Number 3, pp 503--516. Special Issue on Evolutionary Computing in Cryptography and Security. August 2004 (download)
  103. Smart Dust – Friend or Foe‌ Replacing Identity with Configuration Trust. Howard Chivers and John A Clark. Computer Networks 46 (2004). COMNET Special Issue on Future Advances in Military Communications Systems and Technologies. pp.723-740 (download)
  104. Smart Devices and Software Agents: the Basics of Good Behaviour. Howard Chivers, John Clark and Susan Stepney. First International Conference on Security in Pervasive Computing. Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann (Eds.): Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Lecture Notes in Computer Science 2802 Springer 2004, ISBN 3-540-20887-9 (download)
  105. Playing the game: Cheating, Loopholes and Virtual Identity. Phil Brooke, Richard Paige, John A Clark and Susan Stepney. ACM Computers and Society. (download)
  106. Artificial Immune Systems and the Grand Challenge for Non-Classical Computation. Susan Stepney, John A Clark, Colin G Johnson, Derek Partridge and Robert E Smith . pp 204-216 in Jon Timmis, Peter J. Bentley, Emma Hart (Eds.): Artificial Immune Systems, Second International Conference, ICARIS 2003, Edinburgh, UK, September 1-3, 2003, Proceedings. Lecture Notes in Computer Science 2787 Springer 2003, ISBN 3-540-40766 (download)
  107. Secret Agents Leave Big Footprints: How to plant a trapdoor in a cryptographic function and why you might not get away with it. Clark|, Jacob, Stepney. Real World Applications strand. AAAI Genetic and Evolutionary Computation Conference (GECCO) 2003, Chicago, IL, USA, July 12-16, .pp 2022-2033, Lecture Notes in Computer Science Vol .2724. (download)
  108. Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion. John A Clark, Jeremy L Jacob., Subhamoy Maitra and Pantelimon Stanica. Congree on Evolutionary Computation, 2003. CEC '03. doi=10.1109/CEC.2003.1299941 (download)
  109. Using Ants to Attack a Classical Cipher. Matthew Russell, John A. Clark, Susan Stepney. Genetic and Evolutionary Computation Conference: AAAI Genetic and Evolutionary Computation Conference (GECCO) 2003, Chicago, USA, July 2003. Poster Paper. pp.146-147. Lecture Notes in Computer Science Vol .2723. (download)
  110. Invited paper. Nature-inspired Cryptography: Past, Present and Future. John Clark. IEEE Congress on Evolutionary Computation 2003. Special Session on Evolutionary Computation and Computer Security. December 2003, Canberra. (download)
  111. Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion. John A Clark, Jeremy L Jacob., Subhamoy Maitra and Pantelimon Stanica. IEEE Congress on Evolutionary Computation 2003. Special Session on Evolutionary Computation and Computer Security. December 2003, Canberra. (download)
  112. Automated Design of Security Protocols. Hao Chen, John Clark and Jeremy Jacob. IEEE Congress on Evolutionary Computation 2003. Special Session on Evolutionary Computation and Computer Security. December 2003, Canberra. (TBD)
  113. Making the most of Two Heuristics: Breaking Transposition Ciphers with Ants. Matthew Russell, John A Clark and Susan Stepney. IEEE Congress on Evolutionary Computation. (Ants strand) Canberra, 8-12 December 2003.
  114. Challenging Formal Specifications by Mutation: A CSP Security Example (IEEE website). Jill Srivatanakul, John Clark, Fiona Polack and Susan Stepney. 12th IEEE Asia Pacific Software Engineering Conference (APSEC) 2003 (download) <
  115. Software Testing Verification and Reliability (STVR) Volume 14, Number 3 (September 2004). Special Issue. Editorial: Software Testing in the United Kingdom. John Clark, Mark Harman and Rob Hierons (Guest Editors). Selected papers from SoftTest II: The Second UK Workshop on Software Testing Research, York, 4-5 September 2003. ) (External Link)
  116. Reformulating Software Engineering as a Search Problem. John Clark, Jose Javier Dolado, Mark Harman, Rob Hierons, Bryan Jones, Mary Lumkin, Brian Mitchell, Spiros Mancoridis, Kearton Rees, Marc Roper and Martin Shepperd. IEE Proceedings – Software 150(3): 161-175, 2003. (download)
  117. "Evolving Boolean Functions with Multiple Criteria". John A Clark, Jeremy L Jacob, Susan Stepney, Subhamoy Maitra and William Millan. Alfred Menezes, Palash Sarkar (Eds.): Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002. Lecture Notes in Computer Science 2551 Springer 2002, ISBN 3-540-00263-4. pp 246-259. (download)
  118. Fault Injection and a Timing Channel on an Analysis Technique. John A Clark and Jeremy L Jacob. pp. 181-196 in Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002. Proceedings. Editors: L. Knudsen (Ed.). Lecture Notes in Computer Science 2332. ISSN: 0302-9743 (download)
  119. FORTEST: Formal Methods and Testing. pp. 91-104 in Proceedings of COMPSAC 2002. Jonathan Bowen, Kirill Bogdanov, John Clark, Rob Hierons, Mark Harman, Paul Krause (download)
  120. Automated generation of tests from statechart specifications, Simon Burton, John Clark and John McDermid. Proceedings of formal approaches to testing software (FATES), August 2001. (download)
  121. Investigating the effectiveness of Object Oriented Testing Strategies with the Mutation Method Sun-Woo Kim, John Clark, and John McDermid.. Software Testing, Verification & Reliability 11(3): 207-225 December. 2001. (One of three papers selected from Mutation 2000 workshop for journal). (download) <
  122. Protocols are Programs Too: the Meta-heuristic Search for Security Protocols. John A Clark and Jeremy L Jacob. IS&T Special Issue on Metheuristics for Software Engineering. Information & Software Technology 43(14): 891-904 December (2001). (download)
  123. Automated test-data generation for exception conditions Nigel Tracey, John Clark, Keith Mander and John McDermid. Software Practice and Experience, January 2000. (download)
  124. Class Mutation: Mutation Testing For Object Oriented Programs. Sun-Woo Kim, John Clark, and John McDermid. In the OOSS: Object-Oriented Software Systems. Proceedings of Net ObjectDays 2000. October 2000. (download)
  125. Automated V&V for High Integrity Systems, a Targeted Formal Methods Approach Simon Burton, John Clark, Andy Galloway and John McDermid In Proceedings of the NASA Langley Formal Methods Workshop, 13-15 June 2000. (download)
  126. Testing, Proof and Automation. An Integrated Approach. Simon Burton, John Clark and John McDermid. Short paper. Proceedings of the Workshop on Program Analysis and Automated Testing, 22nd International Conference in Software Engineering (ICSE) 2000. (download)
  127. Investigating the Applicability of Traditional Test Adequacy Criteria For Object Oriented Programs. Sun-Woo Kim, John Clark, and John McDermid. In the Proceedings of the ObjectDays 2000. October 2000. (download) <
  128. Investigating the effectiveness of Object Oriented Testing Strategies with the Mutation Method Sun-Woo Kim, John Clark, and John McDermid. In the Proceedings of the Mutation 2000. San Jose 6-7 October 2000. One of three papers also selected to appear in a special issue of STVR. (download)
  129. Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. John A Clark and Jeremy L Jacob. In proceedings of IEEE Symposium on Security and Privacy, Oakland, 14-17 May, 2000. (download)
  130. Two Stage Optimisation in the Design of Boolean Functions. John A Clark and Jeremy L Jacob. In Ed Dawson, Andrew Clark, Colin Boyd (Eds.): Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings. Lecture Notes in Computer Science 1841 Springer 2000, ISBN 3-540-67742-9 (download)
  131. Search Based Automated Test Data Generation for High Integrity Systems. Nigel Tracey, John Clark, Keith Mander and John McDermid. Chapter 12 of Systems Engineering for Business Process Change (New Directions). Peter Henderson (Ed). Springer. ISBN 1852333995. (Book Chapter) (download)
  132. Integrating Safety Analysis with Automatic Test-Data Generation for Software Safety Verification Nigel Tracey, John Clark, John McDermid and Keith Mander. In the Proceedings of 17th International System Safety Conference. August 1999. Pages 128-137. (download)
  133. Integrating Automated Testing with Exception Freeness Proofs for Safety Critical Systems. Nigel Tracey, John Clark, Keith Mander and John McDermid. In the Proceedings of 4th Australian Workshop on Safety Critical Systems and Software. Australian Computer Society. November 1999. (download) <
  134. Assessing Test Set Adequacy for Object-Oriented Programs Using Class Mutation. Sun-Woo Kim, John Clark, and John McDermid. In the Proceedings of Symposium on Software Technology (SoST'99). Pages 72-83, September 1999. (download)
  135. The Rigorous Generation of Java Mutation Operators Using HAZOP. Sun-Woo Kim, John Clark, and John McDermid. Technical Report. December 1999. (TBD)
  136. The Rigorous Generation of Java Mutation Operators Using HAZOP. Sun-Woo Kim, John Clark, and John McDermid. In the Proceedings of the 12th International Conference on SOFTWARE & SYSTEMS ENGINEERING and their APPLICATIONS (ICSSEA'99). December 1999. (download) <
  137. A Safe Change Oriented Process for Safety-Critical Systems Nigel Tracey, Alan Stephenson, John Clark and John McDermid. In the Proceedings of Software Change and Evolution Workshop. IEEE International Conference on Software Engineering. May 1999 (download)
  138. CONVERSE: A Change-Oriented Process for Engine Controllers. Darren Buttle, John Clark, John McDermid, Alan Stephenson and Nigel Tracey IEE Software. Vol. 146(3)130-136, June 1999. (download)
  139. Automated Program Flaw Finding using Simulated Annealing Nigel Tracey, John Clark and Keith Mander. In Software Engineering Notes Issue 23 Number 2, the Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). USA, March 1998. Pages 73-81. (download)
  140. The Way Forward for Unifying Dynamic Test-Case Generation: The Optimisation-Based Approach. Nigel Tracey, John Clark and Keith Mander. In the Proceedings of the IFIP International Workshop on Dependable Computing and Its Applications (DCIA). South Africa, January 1998. Pages 169-180. (download)
  141. An Automated Framework for Structural Test Data Generation Nigel Tracey, John Clark, Keith Mander and John McDermid. In the Proceedings of the ACM/IEEE Automated Software Engineering 1998, Honolulu. (download)
  142. Towards Industrially Applicable Formal Methods: Three Small Steps, and One Giant Leap. John McDermid, Andy Galloway, Simon Burton, John Clark, Ian Toyn, Nigel Tracey and Sam Valentine. In the Proceedings of IEEE ICFEM (International Conference on Formal Engineering Methods). December 1998. (download)
  143. Four Methods for Maintenance Scheduling. Edmund Burke, John Clark and Alistair Smith. Proceedings of the International Conference on Neural Networks and Genetic Algorithms 1997 (ICANNGA 97). (download)
  144. A Survey of Authentication Lietarture Version 1.0. 1997. John A Clark and Jeremy Jacob. (download)
  145. Attacking authentication protocols. J Clark and Jeremy Jacob. High Integrity Systems. 1996
  146. On the Security of Recent Protocols. John Clark and Jeremy Jacob.
    Information Processing Letters. 1995
  147. Holistic schedulability analysis for distributed hard real-time systems. K Tindell and J Clark. Volume 40, Issues 2-3, April 1994, Pages 117-134 Parallel Processing in Embedded Real-time Systems. 1994 (download)
  148. Formalizing Anonymity: a review. Joss Wright, Susan Stepney, John A. Clark, Jeremy Jacob. York Computer Science Technical Report YCS-2005-389, University of York. 2005 (download)
  149. A Search-based Approach to the Automated Design of Security Protocols. Hao Chen, John A Clark and Jeremy L Jacob. York Computer Science Technical Report YCS-2004-376. (Technical Report). 102 pages. (download)
  150. Breaking the model: finalisation and a taxonomy of security attacks. John A Clark, Susan Stepney and Howard Chivers. York Computer Science Technical Report YCS-2004-371. 20 pages. (download)
    146. Security Zonal Analysis. Jill Srivatanakul, John A Clark and Fiona Polack. York Computer Science Technical Report YCS-2004-374. 14 May 2004. 47 pages. (download)
  151. Writing Effective Security Abuse Cases. Jill Srivatanakul, John A Clark and Fiona Polack. York Computer Science Technical ReportYCS-2004-375. 14 May 2004. 57 pages. (download)
  152. Automatic Test-Data Generation for Testing Simulink Models, Yuan Zhan and John A Clark. York Computer Science Technical Report YCS-2004-382. (download)
  153. DPhil Thesis. Metaheuristic Search as a Cryptological Tool (YCST-2002-07.ps.gz). John A Clark. (download)

Some Programme Chairings and Panelling


· Programme Chair: Search Based Software Testing at ICST 2012.

· Programme Chair: Search Based Software engineering special session at GECCO 2012.

· Programme Co-chair: Search Based Software Engineering 2010. Benevento, Italy.

· Programme Co-Chair: Mutation 2007.

· Programme Chair: Search Based Software engineering special session at GECCO 2007.

· Programme Chair: Security of Pervasive Computing 2006.

· EPSRC ICT Panel Chair March 2011

· EPSRC Leadership (etc) Fellowships Sift Panel 2010

· Toshiba Research Fellowship 2010

· EPSRC Post Doctoral Research Fellow Panel 2009

PhD Students and PhD Theses Examined

PhD Students:

    • Graduated (or passed awaiting ceremony)
      • Nigel Tracey (graduated 2001, automated testing): co-supervised with Prof John A McDermid
      • Sun Woo Kim (graduated 2001, mutation testing).
      • Simon Burton (graduated 2002, automated testing from specifications): co-supervised with Prof John A McDermid
      • Paul Massey (quantum software): co-supervised with Susan Stepney; (part-time).
      • Thitima (Jill) Srivatanakul (graduated 2005, safety techniques for security analysis, application to airport security): co-supervised with Fiona Polack.
      • Yuan (Jenny) Zhan (graduated 2006, automated testing);
      • Howard Chivers (graduated 2006, security of large-scale computing systems): co-supervised with Susan Stepney.
      • Chen Hao (graduated 2008, automated secure protocol synthesis): co-supervised with Jeremy Jacob;
      • Kamran Ghani (graduated 2010, automated software testing and model building)
      • David White: (graduated 2010,Automated programming for low resources platforms)
      • Sevil Sen: (Graduated Jan 2011, evolving intrusion detection systems for MANETs)
      • Yow Tzu Lim: Automated MANET Security Policy Inference (ITA-funded PhD) [Awarded Jan 2012.]
      • Tara Gilliam (Medieval Scribal Identification). With Prof. Richard C Wilson (from the vision group)- [Awarded July 2012.]
      • Jan Staunton (Search Based Verification with Estimation of Distribution Algorithms) [Passed July 2012]
      • Xun Dong: Phishing. With Jeremy Jacob (from PLASMA) [Awarded July 2012.]
      • Will Harwood (ITA, Logics of Trust) with Jeremy Jacob (from PLASMA) Passed with MCs, November 2012
      • James McLoughlin (Cryptography) Passed with MCs, November 2012
    • Current:
      • Simon Poulding. Search Based Testing.
      • Mark Hadley (Testing Testing Criteria with Search)
      • Matthew Patrick. (Mutation Testing).
      • Rasha Saleh El-Din (SMS Phishing).
    • Theses Examined:
      • Jane Fuller (Boolean Functions in Cryptography) QIT, Brisbane.
      • Kanti Das (Analysis and Design of Watermarking Schemes). Kolkata, India.
      • Francois Siewe (A Compositional Framework for the Development of Secure Access Control Systems). De Montfort.
      • Kostas (King's College London, Mutation testing)
      • Rob Alexander (Using Simulation for Systems of Systems Hazard Analysis). York 2007.
      • Martin Hall-May (Safety modelling and analysis). York 2007.
      • Leo Feitas (Model Checking Circus). 2009
      • Andrew McMasters (Biometrics and authentication). Southampton 2008.
      • Andrew Weeks (Coarse graining and cellular autonoma). York 2010.
      • AbdulSalam Kalaji (Automated testing of EFSMs). Brunel 2010.
      • XXXX (Automated testing). Brunel 2010.
      • Sachin Kumar (Visual Secret Sharing). IIT Delhi 2012.
      • Mark Vella (Security). Stratclyde 2012.


Copyright notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.