Skip to main content

Research Repository

Advanced Search

Outputs (7)

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device (2022)
Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120

Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discret... Read More about Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture (2022)
Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022). GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291

E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the esta... Read More about GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching (2022)
Conference Proceeding
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2022). PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. In 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699138

The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructur... Read More about PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.

Smart Contract: Attacks and Protections (2020)
Journal Article
Sayeed, S., Marco-Gisbert, H., & Caira, T. (2020). Smart Contract: Attacks and Protections. IEEE Access, 8, 24416-24427. https://doi.org/10.1109/access.2020.2970495

Smart contracts are programs that reside within decentralized blockchains and are executed pursuant to triggered instructions. A smart contract acts in a similar way to a traditional agreement but negates the necessity for the involvement of a third... Read More about Smart Contract: Attacks and Protections.

Control-Flow Integrity: Attacks and Protections (2019)
Journal Article
Sayeed, S., Marco-Gisbert, H., Ripoll, I., & Birch, M. (2019). Control-Flow Integrity: Attacks and Protections. Applied Sciences, 9(20), Article 4229. https://doi.org/10.3390/app9204229

Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat. Consequently, control-flow integrity has received significant attention in the research comm... Read More about Control-Flow Integrity: Attacks and Protections.

DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network (2019)
Journal Article
Alsayed Kassem, J., Sayeed, S., Marco-Gisbert, H., Pervez, Z., & Dahal, K. (2019). DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network. Applied Sciences, 9(15), Article 2953. https://doi.org/10.3390/app9152953

Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The pro... Read More about DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network.

On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques (2019)
Conference Proceeding
Sayeed, S., & Marco-Gisbert, H. (2019). On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques. In ICT Systems Security and Privacy Protection. SEC 2019 (331-344). https://doi.org/10.1007/978-3-030-22312-0_23

Memory error vulnerabilities are still widely exploited by attackers despite the various protections developed. Attackers have adopted new strategies to successfully exploit well-known memory errors bypassing mature protection techniques such us the... Read More about On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques.