Skip to main content

Research Repository

Advanced Search

All Outputs (167)

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device (2022)
Presentation / Conference Contribution
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022, February). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. Presented at 8th International Conference on Information Systems Security and Privacy, Online

Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discret... Read More about Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2022)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022, January). Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. Presented at 2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022), Tianjin, China

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes... Read More about Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.

Internet of Things: Concept, Implementation and Challenges (2022)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2020, December). Internet of Things: Concept, Implementation and Challenges. Presented at International Conference on IoT and its Applications (ICIA) 2020, Jamshedpur, India

Through the technical advancements over five generations, today's digital communication has become much smarter, more intelligent and punctual. This causes a massive amount of continuous data collection in real-time whose analytics are later used to... Read More about Internet of Things: Concept, Implementation and Challenges.

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching (2022)
Presentation / Conference Contribution
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2021, December). PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. Presented at 14th International Conference on Security of Information and Networks, Edinburgh [Online]

The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructur... Read More about PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of Information and Networks, Edinburgh

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems (2022)
Presentation / Conference Contribution
Grierson, S., Thomson, C., Papadopoulos, P., & Buchanan, B. (2021, December). Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems. Presented at 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh, United Kingdom

Intrusion detection systems are integral to the security of networked systems for detecting malicious or anomalous network traffic. As traditional approaches are becoming less effective, machine learning and deep learning-based intrusion detection sy... Read More about Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems.

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2022)
Presentation / Conference Contribution
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2021, December). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. Presented at 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh

The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 m... Read More about Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Presentation / Conference Contribution
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., Domalis, G., Karacapilidis, N., Tsakalidis, D., & Tsolis, D. (2021, October). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. Presented at 7th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2021). In Conjunction With ESORICS 2021, Darmstadt, Germany

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports (2022)
Presentation / Conference Contribution
Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2021, December). A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports. Presented at 14th IEEE/ACM International Conference on Utility and Cloud Computing, Leicester

Digital vaccination passports are being proposed by various governments internationally. Trust, scalability and security are all key challenges in implementing an online vaccine passport. Initial approaches attempt to solve this problem by using cent... Read More about A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports.

Review of Current Ransomware Detection Techniques (2022)
Presentation / Conference Contribution
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021, October). Review of Current Ransomware Detection Techniques. Presented at 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey

A review of proposed ransomware detection tools and techniques. The tools are described, compared and contrasted and possible short comings in their approaches are discussed.

Exploring the Need For an Updated Mixed File Research Data Set (2022)
Presentation / Conference Contribution
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021, October). Exploring the Need For an Updated Mixed File Research Data Set. Presented at 2021 International Conference on Engineering and Emerging Technologies (ICEET), Istanbul, Turkey

Mixed file data sets are used in a variety of research areas, including Digital Forensics, Malware analysis and Ransomware detection. Researchers recently seem to either have to create their own custom data sets or well-known data sets are used, but... Read More about Exploring the Need For an Updated Mixed File Research Data Set.

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021, October). Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. Presented at 2021 5th Cyber Security in Networking Conference (CSNet), Abu Dhabi, United Arab Emirates

The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that i... Read More about Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure (2021)
Presentation / Conference Contribution
Young, E. H., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., & Buchanan, W. J. (2021, October). Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure. Paper presented at International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21), Online

Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from tw... Read More about Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure.

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021, August). A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. Presented at 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Barcelona, Spain

Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr... Read More about A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.

Launching Adversarial Label Contamination Attacks Against Malicious URL Detection (2021)
Presentation / Conference Contribution
Marchand, B., Pitropakis, N., Buchanan, W. J., & Lambrinoudakis, C. (2021, September). Launching Adversarial Label Contamination Attacks Against Malicious URL Detection. Presented at TrustBus 2021: Trust, Privacy and Security in Digital Business, Online

Web addresses, or Uniform Resource Locators (URLs), represent a vector by which attackers are able to deliver a multitude of unwanted and potentially harmful effects to users through malicious software. The ability to detect and block access to such... Read More about Launching Adversarial Label Contamination Attacks Against Malicious URL Detection.

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT (2021)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2021). Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. In 10th International Conference on Cryptography and Information Security (CRYPIS 2021) (185-205)

Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel appr... Read More about Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT.

PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M. A., Jaroucheh, Z., Al-Dubai, A., & Buchanan, B. (2020, November). PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism. Presented at 4th International Conference on Vision, Image and Signal Processing, Newcastle, UK

The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism.

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach (2020)
Presentation / Conference Contribution
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020, February). Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. Presented at ICISSP 2020, Valletta, Malta

Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be awa... Read More about Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach.

Privacy-preserving Surveillance Methods using Homomorphic Encryption (2020)
Presentation / Conference Contribution
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020, February). Privacy-preserving Surveillance Methods using Homomorphic Encryption. Presented at 6th International Conference on Information Security Systems and Privacy (ICISSP), Valletta, Malta

Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encryption to protect all states of the data: in-transit, at-rest, and in-memory.... Read More about Privacy-preserving Surveillance Methods using Homomorphic Encryption.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020, December). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. Presented at ICVISP 2020: The 2020 4th International Conference on Vision, Image and Signal Processing, Bangkok

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.