Skip to main content

Research Repository

Advanced Search

Outputs (270)

LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts (2025)
Journal Article
Kumar, G., Saha, R., Conti, M., & Buchanan, W. J. (online). LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Transactions on Services Computing, https://doi.org/10.1109/tsc.2025.3562323

Smart contracts are integral to decentralized systems like blockchains and enable the automation of processes through programmable conditions. However, their immutability, once deployed, poses challenges when addressing errors or bugs. Existing solut... Read More about LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts.

Post-Quantum Migration of the Tor Application (2025)
Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025). Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013

The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decr... Read More about Post-Quantum Migration of the Tor Application.

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques (2025)
Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025). Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), Article 31. https://doi.org/10.3390/make7020031

This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Living off the Land (LotL) techniques. LotL methods allow threat actors to blend... Read More about Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques.

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode (2024)
Presentation / Conference Contribution
Buchanan, W., Grierson, S., & Uribe, D. (2024, February). Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. Presented at 10th International Conference on Information Systems Security and Privacy, Rome, Italy

Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could... Read More about Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.

A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA (2024)
Journal Article
Ahmed, H. O., Kim, D., & Buchanan, B. (in press). A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA. IEEE Access, 12, 182943-182955. https://doi.org/10.1109/ACCESS.2024.3512419

In the contemporary digital landscape, security has become a vital element of our existence. The growing volume of sensitive information being stored and transmitted over networks necessitates the implementation of robust security measures. Cryptogra... Read More about A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA.

DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof (2024)
Presentation / Conference Contribution
Kasimatis, D., Grierson, S., Buchanan, W. J., Eckl, C., Papadopoulos, P., Pitropakis, N., Chrysoulas, C., Thomson, C., & Ghaleb, B. (2024, September). DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. Presented at 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK

Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper de... Read More about DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July). VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia

In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named... Read More about VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.

Transforming EU Governance: The Digital Integration Through EBSI and GLASS (2024)
Presentation / Conference Contribution
Kasimatis, D., Buchanan, W. J., Abubakar, M., Lo, O., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., Sayeed, S., & Sel, M. (2024, June). Transforming EU Governance: The Digital Integration Through EBSI and GLASS. Presented at 39th IFIP International Conference, Edinburgh, UK

Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and requiring citizens to request identity verification documents. The digital... Read More about Transforming EU Governance: The Digital Integration Through EBSI and GLASS.

ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT (2024)
Presentation / Conference Contribution
Huma, Z. E., Ahmad, J., Hamadi, H. A., Ghaleb, B., Buchanan, W. J., & Jan, S. U. (2024, February). ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. Presented at 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates

The Internet of Things (IoT) has become an integral part of modern societies, with devices, networks, and applications offering industrial, economic, and social benefits. However, these devices and networks generate vast amounts of data, making them... Read More about ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT.

Detection of Ransomware (2024)
Patent
Buchanan, B., McLaren, P., Russell, G., & Tan, Z. (2024). Detection of Ransomware. US20240152616A1

The present invention relates to a computer program product, a computing device and a method of detecting a file encrypted by ransomware by identifying a file write operation for a file on the computing device and determining if a predetermined numbe... Read More about Detection of Ransomware.

Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks (2024)
Journal Article
Bhatti, D. S., Saleem, S., Ali, Z., Park, T.-J., Suh, B., Kamran, A., Buchanan, W. J., & Kim, K.-I. (2024). Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access, 12, 41499-41516. https://doi.org/10.1109/access.2024.3377144

Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from malicious energy drainage attacks, particularly those directed at the routing layer. The complexity increases during critical operations like cluster head select... Read More about Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks.

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT (2024)
Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (2024). SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, 12, https://doi.org/10.1109/access.2024.3371992

The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates effective Intrusion Detection Systems (IDS), that are accurate, lightweigh... Read More about SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks (2023)
Presentation / Conference Contribution
Ali, H., Abubakar, M., Ahmad, J., Buchanan, W. J., & Jaroucheh, Z. (2023, November). PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of se... Read More about PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks.

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations (2023)
Presentation / Conference Contribution
Grierson, S., Chalkias, K., Buchanan, W. J., & Maglaras, L. (2023, November). Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing... Read More about Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations.

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant (2023)
Journal Article
Elmiger, M., Lemoudden, M., Pitropakis, N., & Buchanan, W. J. (2024). Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. International Journal of Information Security, 23, 467-485. https://doi.org/10.1007/s10207-023-00751-6

The challenge of securing IT environments has reached a new complexity level as a growing number of organisations adopt cloud solutions. This trend increases the possibility of overseen attack paths in an organisation’s IT infrastructure. This paper... Read More about Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.

Majority Voting Ransomware Detection System (2023)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2023). Majority Voting Ransomware Detection System. Journal of Information Security, 14(4), 264-293. https://doi.org/10.4236/jis.2023.144016

Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic la... Read More about Majority Voting Ransomware Detection System.

Hamming Distributions of Popular Perceptual Hashing Techniques (2023)
Journal Article
McKeown, S., & Buchanan, W. J. (2023). Hamming Distributions of Popular Perceptual Hashing Techniques. Forensic Science International: Digital Investigation, 44(Supplement), Article 301509. https://doi.org/10.1016/j.fsidi.2023.301509

Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechan... Read More about Hamming Distributions of Popular Perceptual Hashing Techniques.

An omnidirectional approach to touch-based continuous authentication (2023)
Journal Article
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2023). An omnidirectional approach to touch-based continuous authentication. Computers and Security, 128, Article 103146. https://doi.org/10.1016/j.cose.2023.103146

This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often... Read More about An omnidirectional approach to touch-based continuous authentication.

Towards The Creation Of The Future Fish Farm (2023)
Journal Article
Papadopoulos, P., Buchanan, W. J., Sayeed, S., & Pitropakis, N. (2023). Towards The Creation Of The Future Fish Farm. Journal of Surveillance, Security and Safety, 4, 1-3. https://doi.org/10.20517/jsss.2022.16

Aim: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the past few decades, there has been a remarkable increase in the calorie intake o... Read More about Towards The Creation Of The Future Fish Farm.