Mastodon Github Twitter Mastodon Keybase

Researcher looking at new defenses for computers: personal devices, printers and industrial. Neck deep in low level virtualization software, trusted computing hardware and trusted execution environments. Previously worked on platform security for microcontrollers, servers and network devices.


  1. Reto Achermann, Chris I. Dalton, Paolo Faraboschi, Moritz Hoffmann, Dejan S. Milojicic, Geoffrey Ndu, Alex Richardson, Timothy Roscoe, Adrian L. Shaw, Robert N. M. Watson, Separating Translation from Protection in Address Spaces with Dynamic Remapping, HotOS 2017: 118-124
  2. Adrian L. Shaw, Hamza Attak, Exploring Granular flow Integrity for Interconnected Trusted Platforms, TrustCom 2017: 594-601
  3. Antonio Lioy, Tao Su, Adrian L. Shaw, Hamza Attak, Diego R. Lopez, Antonio Pastor Trust in SDN/NFV Environments, Guide to Security in SDN and NFV 2017: 103-124
  4. Diego Montero, Marcelo Yannuzzi, Adrian L. Shaw, Ludovic Jacquin, Antonio Pastor, Rene Serral-Gracia, Antonio Lioy, Fulvio Risso, Cataldo Basile, Roberto Sassu, Mario Nemirovsky, Francesco Ciaccia, Michael Georgiades, Savvas Charalambides, Jarkko Kuusijarvi, Francesca Bosco, Virtualized security at the network edge: a user-centric approach, IEEE Commun. Mag. 53(4): 176-186 (2015)
  5. Ludovic Jacquin, Antonio Lioy, Diego R. Lopez, Adrian L. Shaw, Tao Su, The Trust Problem in Modern Network Infrastructures, CSP Forum 2015
  6. Ludovic Jacquin, Adrian L. Shaw, Chris I. Dalton, Towards trusted software-defined networks using a hardware-based Integrity Measurement Architecture, IEEE NetSoft 2015
  7. Adrian L. Shaw, Behzad Bordbar, John T. Saxon, Keith Harrison, Chris I. Dalton, Forensic Virtual Machines: Dynamic Defence in the Cloud via Introspection, IC2E 2014:

Public projects

Recent service (TPC)

IETF drafts


Artificial Intelligence and Machine Learning Applied to Cybersecurity


Full list available here