Personal profile

Biography

I earned my PhD in Computer Science from Carleton University (Ottawa, Canada) in 1998 under the direction of Paul Van Oorschot and Evangelos Kranakis. From 1998 till 2002 I was a Research Scientist at Entrust, a security software company, where I performed code security reviews, contributed to new product developments and created new IETF and W3C standards, primarily related to authentication and key management. From 2002 till 2008 I worked for the Government of Canada. In 2003, I designed the "account recovery" interface for the Government Online portal, used by more than six million citizens. I also contributed to design of the portal's "epass" authentication service. In 2008 I made the leap to full-time academic work, where I continue to build on my usable security research, as well as applying machine learning to security. I started as a Research Fellow at the University of Edinburgh in 2008, then in 2010 I became a Lecturer and then Senior Lecturer at Glasgow Caledonian University, and in 2015 I moved to Heriot-Watt University as an Associate Professor.

Research interests

I am primarily interested in computer security, and in applying human-computer interaction (HCI) and machine learning (ML) techniques to solve computer security problems. I also apply fundamental security techniques to design, and attack modelling and analysis. For example, I have enumerated the attack space for partial passwords and the answers to challenge questions, and I have modelled attacks to implicit smartphone authentication. The results of my research include critical evaluations of current security solutions, the establishment of new security and usability methodologies, and the design of new security techniques. I currently apply these methods and techniques to authentication protocols, and mobile devices and networks, though I am very interested in broader applications of my research.

Fingerprint Fingerprint is based on mining the text of the persons scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Authentication Engineering & Materials Science
Usability Mathematics
Privacy Mathematics
Sensors Engineering & Materials Science
Mobile devices Engineering & Materials Science
communication Earth & Environmental Sciences
Embedded systems Engineering & Materials Science
Smartphones Engineering & Materials Science

Co Author Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2003 2017

  • 20 Conference contribution
  • 6 Article
  • 3 Other chapter contribution
  • 2 Book

Everything's Cool: Extending Security Warnings with Thermal Feedback

Wilson, G., Maxwell, H. & Just, M. 11 Feb 2017 Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Temperature
visual cue
temperature
Websites

Factors Influencing the Purchase of Security Software for Mobile Devices - Case Study

Stavova, V., Matyas, V., Just, M. & Ukrop, M. 7 Apr 2017 In : Infocommunications Journal.

Research output: Contribution to journalArticle

Software security
Purchasing
Mobile devices
Mobile security
software

Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism

Just, M. & Berg, T. 30 Mar 2017 Human-Computer Interaction: INTERACT 2017. Springer, (Lecture Notes in Computer Science)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

child
Disorder
autism
group discussion
workshop

Codes v. People: A comparative usability study of two password recovery mechanisms

Stavova, V., Matyas, V. & Just, M. 4 Jul 2016 Proceedings of the 10th WISTP International Conference on Information Security Theory and Practice. Springer, (Lecture Notes in Computer Science)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery
Password
Usability
recovery method
banking

Investigating time series visualisations to improve the user experience

Adnan, M., Just, M. & Baillie, L. 7 May 2016 CHI'16: 2016 CHI Conference on Human Factors in Computing Systems Proceedings. ACM, p. 5444-5455 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Time series
visualization
time series
Encoding

Activities 2014 2017

  • 11 Participation in conference
  • 3 Invited talk
  • 1 Other

2nd IEEE European Symposium on Security and Privacy

Just, M. (Member of programme committee)
26 Apr 201728 Apr 2017

Activity: Participation in conference

Passwords 2016

Just, M. (Member of programme committee)
5 Dec 20167 Dec 2016

Activity: Participation in conference

New Security Paradigms Workshop 2016

Just, M. (Member of programme committee)
26 Sep 201629 Sep 2016

Activity: Participation in conference

Invited talk at Dalhousie University

Just, M. (Speaker)
12 Jul 2016

Activity: Invited talk

Symposium on Usable Privacy and Security

Just, M. (Member of programme committee)
22 Jul 201624 Jul 2016

Activity: Participation in conference

Press / Media

Internet Security - What you need to know

Mike Just

21/07/15

1 media contribution

Press / Media: Research

Phone thwarts thieves by learning its owner’s habits

Mike Just

4/11/14

1 media contribution

Press / Media: Research

“Sensors help keep smartphone data secure”

Mike Just

26/06/14

1 media contribution

Press / Media: Research