Skip to main content

Research Repository

Advanced Search

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features (2019)
Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T.-H., & Buchanan, W. J. (2019). MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160

The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fas... Read More about MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features.

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels (2019)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2019, July). WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels. Presented at 15th IEEE International Conference on Control & Automation (ICCA), Edinburgh, Scotland

Industrial Control Systems (ICS) have faced a growing number of threats over the past few years. Reliance on isolated controls networks or air-gapped computers is no longer a feasible solution when it comes to protecting ICS. It is because the new ar... Read More about WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels.

RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture (2019)
Thesis
Ukwandu, E. A. RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2455031

Scaling big data infrastructure using multi-cloud environment has led to the demand for highly secure, resilient and reliable data sharing method. Several variants of secret sharing scheme have been proposed but there remains a gap in knowledge on th... Read More about RESCUE: Evaluation of a Fragmented Secret Share System in Distributed-Cloud Architecture.

Embedded document security using sticky policies and identity based encryption (2019)
Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2090564

Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perimeters down to a single identity and a piece of information. Since new EU GD... Read More about Embedded document security using sticky policies and identity based encryption.

A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers (2019)
Journal Article
Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (2020). A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience, 32(16), Article e5300. https://doi.org/10.1002/cpe.5300

Software De ned Network (SDN) and Network Virtualization (NV) are emerged paradigms that simpli ed the control and management of the next generation networks, most importantly, Internet of Things (IoT), Cloud Computing, and Cyber-Physical Systems. Th... Read More about A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers.

Identifying Vulnerabilities Using Internet-wide Scanning Data (2019)
Presentation / Conference Contribution
O'Hare, J., Macfarlane, R., & Lo, O. (2019, January). Identifying Vulnerabilities Using Internet-wide Scanning Data. Presented at 12th International Conference on Global Security, Safety and Sustainability - ICGS3-19, London, United Kingdom

Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect active reconnaissance results for online devices. Access to this information is provided through associated websites. The Internet-wide scanning data can be used... Read More about Identifying Vulnerabilities Using Internet-wide Scanning Data.

A Forensic Audit of the Tor Browser Bundle (2019)
Journal Article
Muir, M., Leimich, P., & Buchanan, W. J. (2019). A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009

The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its lo... Read More about A Forensic Audit of the Tor Browser Bundle.

Decrypting Live SSH Traffic in Virtual Environments (2019)
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDe-... Read More about Decrypting Live SSH Traffic in Virtual Environments.

Top 10 Blockchain Predictions for the (Near) Future of Healthcare (2019)
Journal Article
Halamka, J. D., Alterovitz, G., Buchanan, W. J., Cenaj, T., Clauson, K. A., Dhillon, V., Hudson, F. D., Mokhtari, M. (., Porto, D. A., Rutschman, A., & Ngo, A. L. (2019). Top 10 Blockchain Predictions for the (Near) Future of Healthcare. Blockchain in Healthcare Today, 2, https://doi.org/10.30953/bhty.v2.106

To review blockchain lessons learned in 2018 and near-future predictions for blockchain in healthcare, Blockchain in Healthcare Today (BHTY) asked the world's blockchain in healthcare experts to share their insights. Here, our internationally-renowne... Read More about Top 10 Blockchain Predictions for the (Near) Future of Healthcare.

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier (2019)
Presentation / Conference Contribution
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2018, December). Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. Presented at International Workshop on Big Data Analytics for Cyber Threat Hunting, Seattle, WA, USA

Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exists between the requirements of this community and the solutions that are cu... Read More about Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.