Skip to main content

Research Repository

Advanced Search

Freemove Innovation Voucher May 1, 2019 - Aug 31, 2020
A project to provide decentralised identity for meeting KYC & AML requirements in the property industry.

MemoryCrypt

MemoryCrypt Sep 1, 2019 - Feb 29, 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general move towards using virtualised infrastructures for... Read More about MemoryCrypt.

Cryptodoc Jun 1, 2019 - Sep 30, 2019
This project aims to investigate the integration of a cipher policy for the protection of data, and how these can be applied into a cloud-based infrastructure. A key focus for the implementation will be in the creation of a simple cipher policy for t... Read More about Cryptodoc.

MemCrypt Apr 1, 2020 - Jul 31, 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has developed new techniques related to timing attacks w... Read More about MemCrypt.

Artificial Intelligence (AI)-powered dashboard for COVID-19 related public sentiment and opinion mining in social media platforms May 1, 2020 - Nov 17, 2020
: The project will aid in understanding and mitigating the direct and indirect impacts of the COVID-19 pandemic, by creating an AI-driven dashboard for policymakers, public health and clinical practitioners. This will enable continuous monitoring, pr... Read More about Artificial Intelligence (AI)-powered dashboard for COVID-19 related public sentiment and opinion mining in social media platforms.

Memcrypt (HGSP)

Memcrypt (HGSP) Sep 15, 2020 - Mar 31, 2021
Memcrypt focuses on new ways of detecting the usage encryption keys, and has a focus on addressing ransomware.

MEMCRYPT CyberASAP Phase 2 Sep 23, 2020 - Feb 28, 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start recovering the data. MEMCRYPT has developed new t... Read More about MEMCRYPT CyberASAP Phase 2.