Cybersecurity Research Group

Overview

The Cybersecurity Research Group’s research is concerned with all aspects of security and privacy. The aim is to enable and support a resilient and secure society, by constructing safe and secure computer systems and by helping prevent cybercrime.

Our current areas of work include network resilience, formal specification and verification, program analysis and testing, interactive theorem proving, and cyber-physical systems. Current projects include the construction of certified password quality checking software and quantitative analysis of secure information flow.

In close collaboration with the Centre of Crime, Harm Prevention and Security (SSSHL), we are also interested in the following topic areas: analysis of human behaviours in relation to security, network security, data analytics for security and privacy, analysis, prevention and intervention of Cyber Crime (including non-financial and financial crime), policing in cyber-crime. Our research can also be relevant to other research groups in the university, Smart Energy Systems Research Group (SSED).

Research activities and current projects

Recent research within the group includes:

  • Development of mathematical models and certified software for password quality
  • Security applications of parameterized model counting for quantitative program analysis
  • Theories and implementation of prototype software tools for measuring the leakage of secrets in distributed systems

Previous projects

  • "Review: an Innovative Intelligent Evidence Exploration System" (2015--2017). Knowledge Transfer Partnership. Co-funded by Innovate UK (£147,354) (J. F. Ferreira)
  • "Safe hybrid critical systems via automated testing from formal user requirements" (2015-2017). Knowledge Transfer Partnership. Co-funded by Innovate UK (£108,324) (J. F. Ferreira)

Staff members

  • Professor of Cybersecurity and Cyber Crime (to be appointed)
  • Reader of Cybersecurity (to be appointed)
  • Senior Lecturer of Cybersecurity (to be appointed)
  • João F. Ferreira
  • Quang Loc Le
  • Chunyan Mu
  • Mohammad Abdur Razzaque
  • Bo Wei

PhD students

  • Saul Johnson (Graduate Tutor with João F. Ferreira and Alexandra Mendes): Verification Techniques for Software Security, 2017 - 2020
  • Chris Curry (Graduate Tutor with Quang Loc Le and Shengchao Qin): Software Verification for Cybersecurity, 2018 - 2021
  • Chidimma Opara (with Bo Wei, Biju Issac and Shengchao Qin): Secure Cyber Physical Systems, 2018 - 2021

Selected publications

Post-Ref 2014

  • Mohammad Abdur Razzaque, Muta Tah Hira, Mukta Dira, QoS in Body Area Networks: A Survey. ACM Transactions on Sensor Networks, 13(3): 25:1-25:46 (2017)
  • J. F. Ferreira, S. A. Johnson, A. Mendes, P. J. Brooke. Certified Password Quality: A Case Study using Coq and Linux Pluggable Authentication Modules. In Proceedings of the 13th International Conference on integrated Formal Methods (iFM), 2017
  • J. F. Ferreira, S. A. Johnson, A. Mendes, P. J. Brooke. Certified Password Quality: A Case Study using Coq and Linux Pluggable Authentication Modules. In Proceedings of the 13th International Conference on integrated Formal Methods (iFM), 2017
  • A. Almohammad, J. F. Ferreira, A. Mendes, and P. White. Hierarchical Requirements Modeling and Test Generation for Industrial Control Systems. In 4th International Workshop on Requirements Engineering and Testing (RET), 2017
  • J. Li, J. Sun, L. Li, Q. L. Le and S.-W. Lin. Automatic Loop-invariant Generation and Refinement through Selective Sampling. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017
  • Q. L. Le, M. Tatsuta, J. Sun and W.-N. Chin. A Decidable Fragment in Separation Logic with Inductive Predicates and Arithmetic, In proceedings of 29th International Conference on Computer Aided Verification (CAV), 2017
  • M. He, V. Vafeiadis, S. Qin and J. F. Ferreira, GPS+: Reasoning about Fences and Relaxed Atomics, International Journal of Parallel Programming, 2017
  • Yiran Shen, Wen Hu, Mingrui Yang, Bo Wei, Simon Lucey, Chun Tung Chou, Learn to Recognise: Exploring Priors of Sparse Face Recognition on Smartphones, IEEE Transaction on Mobile Computing, 16(6), 2017
  • Mohammad Abdur Razzaque, Marija Milojevic-Jevric, Andrei Palade, Siobhán Clarke, Middleware for Internet of Things: A Survey. IEEE Internet of Things Journal 3(1): 70-95 2016
  • M. He, V. Vafeiadis, S. Qin, J. F. Ferreira. Reasoning about Fences and Relaxed Atomics. 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), 520-527, 2016
  • Q. L. Le, J. Sun and W.-N. Chin, Satisfiability Modulo Heap-Based Programs, In proceedings of 28th International Conference on Computer Aided Verification (CAV), 2016
  • M. Tatsuta, Q. L. Le and W.-N. Chin, Decision Procedure for Separation Logic with Inductive Predicates and Presburger Arithmetic. In Proceedings of  14th Asian Symposium on Programming Languages and Systems (APLAS), 2016.
  • Yiran Shen, Wen Hu, Mingrui Yang, Junbin Liu, Bo Wei, Simon Lucey, Chun Tung Chou, Efficient and Robust Compressive Background Subtraction, IEEE Transaction on Mobile Computing, 15(2), 2016
  • Mohammad Abdur Razzaque, Saeideh S. Javadi, Yahaya Coulibaly, Muta Tah Hira, QoS-Aware Error Recovery in Wireless Body Sensor Networks Using Adaptive Network Coding. Sensors 15(1): 440-464, 2015
  • J. F. Ferreira and A. Mendes. A calculational approach to path-based properties of the Eisenstein–Stern and Stern–Brocot trees via matrix algebra. Journal of Logical and Algebraic Methods in Programming, In Press, December 2015.
  • Bo Wei, Ambuj Varshney, Neal Patwari, Wen Hu, Thiemo Voigt, Chun Tung Chou, dRTI: Directional Radio Tomographic Imaging, In proceedings of the 14th ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN), 2015
  • Bo Wei, Wen Hu, Mingrui Yang, Chun Tung Chou, Radio-based Device-free Activity Recognition with Radio Frequency Interference, In proceedings of the 14th ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN), 2015
  • Md. Akhtaruzzaman Adnan, Mohammad Abdur Razzaque, Ishtiaque Ahmed, Ismail Fauzi Isnin, Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey. Sensors 14(1): 299-345, 2014
  • Mohammad Abdur Razzaque, Simon Dobson, Energy-Efficient Sensing in Wireless Sensor Networks Using Compressed Sensing. Sensors 14(2): 2822-2859, 2014
  • Farzan Doroodgar, Mohammad Abdur Razzaque, Ismail Fauzi Isnin, Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks. Sensors 14(3): 5004-5040, 2014
  • Q. L. Le, C. Gherghina, S. Qin and W.-N. Chin. Shape Analysis via Second-Order Bi-Abduction. 26th International Conference on Computer Aided Verification (CAV 2014). LNCS 8559. Pages:52-68. July 18-22, 2014. Vienna, Austria.
  • J. F. Ferreira, C. Gherghina, G. He, S. Qin and W.-N. Chin. Automated verification of the FreeRTOS scheduler in Hip/Sleek. International Journal on Software Tools for Technology Transfer, 16(4):381-397. Springer. 2014.
  • A. Mendes, R. C. Backhouse, J. F. Ferreira. Structure Editing of Handwritten Mathematics: Improving the Computer Support for the Calculational Method. ITS 2014: 139-148.
  • Yiran Shen, Wen Hu, Mingrui Yang, Bo Wei, Simon Lucey, Chun Tung Chou, Face Recognition on Smartphones Via Optimised Sparse Representation Classification, In proceedings of the 13th ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN), 2014