Project List

A simulation model of self-powered ankle prosthetics (available)

Unlike conventional passive prosthetics, self-powered prosthetics provide positive net work to enhance strength and speed of limb movement. These are used not just in rehabilitation medicine but also as components of powered exoskeletons, a technology with numerous applications including military, manufacturing and construction industry, emergency and rescue. The extent of powered propulsion is typically determined … full description “A simulation model of self-powered ankle prosthetics (available)”

Author Attribution of Binaries (available)

Attributing binaries, whether malicious or benign, is a difficult and time consuming task however, there is an increase demand for this either for attributing cyber attacks or preventing plagiarism. The goal of this project is to use machine learning to predict authorship of binaries. You will use a corpus of open source software either for … full description “Author Attribution of Binaries (available)”

Autonomous Cars – Evaluation of Security Countermeasures (available)

Project Description Autonomous and connected vehicles will be a part of reality in the near future. There are many development efforts currently underway to pave the way for the deployment of autonomous vehicles (self-driving cars) in public areas. These vehicles are a collection of complex and sophisticated computational architectures. Cybersecurity is among many challenges that … full description “Autonomous Cars – Evaluation of Security Countermeasures (available)”

Building a dataset of IoT device firmwares (available)

Performing security analysis of IoT devices is often expensive as it requires purchasing the IoT device, which is not practical at scale. To avoid this some researchers perform security analysis over the apps used by those IoT devices. Although this analysis can be useful it has some limitations as only one element of the ecosystem … full description “Building a dataset of IoT device firmwares (available)”

Carbon Labelling – Blockchain based product carbon footprint system. (available)

Project Description Carbon footprint associated with a product is a combination of the emission-related in the manufacturing and logistics of the product. Logistics plays a vital role in moving products from factories to home and is one of the significant causes of carbon emission in Europe. Besides this, the last mile delivery network is also … full description “Carbon Labelling – Blockchain based product carbon footprint system. (available)”

Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)

Project Description Data, primarily related to consumers is a crucial part of the modern tech-companies like Google, Facebook, Instagram, and non-tech-companies (superstores, insurance companies, etc.) alike have now started to rely heavily on consumer data for various commercial activities. Although the General Data Protection Regulation (GDPR) enhances the rights of the consumers from a technical … full description “Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)”

Data Stewardship (available)

Starting Date: June 2019 Duration: 5 weeks (10 weeks part-time) Time commitment: Full time/Part time Prerequisites: understanding of databases and formats such as JSON; ability to interview and liaise non-experts; ability to write reports. Approximately 80% of the time that a Data Scientist spends on a day to day basis is on finding relevant data … full description “Data Stewardship (available)”

Decentralised Autonomous Economy of Things – Putting rational actors back into Economy (available)

Project Description Internet of Things (IoT) and distributed ledger technologies are part of the movement to develop the device-specific decentralised economy. Example of such a service is decentralised energy grids that couple together the smart contracts and smart-meter technology to provide traceability and verification of energy sources, efficient peer-to-peer trading of energy. One such proposal … full description “Decentralised Autonomous Economy of Things – Putting rational actors back into Economy (available)”

Decentralised Cloud – Building an All-Purpose Execution Platform on Blockchain (available)

Project Description Blockchain and distributed ledger technology have invigorated the decentralised architectures. The positives of a decentralised architecture are that it is distributed widely and challenging to launch a DDoS against such a network. Besides that, the immutability and strong traceability/trackability of blockchain technologies can be considered as a foundation for designing a secure, reliable, … full description “Decentralised Cloud – Building an All-Purpose Execution Platform on Blockchain (available)”

Detecting money laundering in cryptocurrency economy (available)

Project Description Cryptocurrency networks are unique in a way that all the transactions are public. All payers and receivers are known, and their respective pseudonyms are public. Whereas the inherent anonymity enabled by the pseudonyms and privacy-preserving protocols, cryptocurrency can be argued to be a suitable platform for money laundering activities. In this project, the … full description “Detecting money laundering in cryptocurrency economy (available)”

Federated Machine Learning – Security and Privacy Evaluation Framework (available)

Project Description User data is essential for many of the modern business operations, especially related to the building consumer segmentation and profiling – for marketing and services personalisation. Dealing with user data has its positive and negatives, especially after the General Data Protection Regulation (GDPR) collecting and storing user’s personal data. Centralised machine learning approaches … full description “Federated Machine Learning – Security and Privacy Evaluation Framework (available)”

Invisible Malware using Intel SGX Enclaves (available)

A fundamental security problem when hosting applications on cloud platforms is the increased risk of sensitive data loss (e.g. due to negligent or malicious employees of the cloud provider). An exciting approach to mitigating such attacks are new trusted execution environments (e.g. Intel SGX), recently available on commodity CPUs. Intel SGX allows users to create … full description “Invisible Malware using Intel SGX Enclaves (available)”

Jupyter notebooks (available)

Starting Date: June 2019 Duration: 10 weeks Time commitment: Full time Prerequisites: experience with Python (useful) and Javascript programming (essential). It may be useful to be willing to learn about functional programming (but this is not essential). Jupyter notebooks [1] are examples of literate programming [2] where code and outputs from the code as well … full description “Jupyter notebooks (available)”

Machine Learning for Cyber-Physical Systems Verification (available)

Hybrid automata (HA) [1] are a formal model for cyber-physical systems, i.e., systems characterised by digital components (discrete) that control and interact with the physical environment (continuous). HAs have been applied to system designs in numerous domains including avionics, automotive, medical devices, and robotics. Formal verification of HAs is crucial for such safety-critical applications, as … full description “Machine Learning for Cyber-Physical Systems Verification (available)”

Machine Learning vs Machine Learning in Malware Evasion (available)

Machine learning is a popular approach to signature-less malware detection because it can generalize to new (unseen) malware families. Some recent works have proposed the use of AI/ML-powered malware to bypass machine learning anti-malware systems. The goal of the project is to model the system of malware vs anti-malware systems as two opponents using various … full description “Machine Learning vs Machine Learning in Malware Evasion (available)”

Maritime Cybersecurity (available)

Project Description Connected objects in motion are developing as a significant domain. There are many traditional businesses, like logistics and maritime shipping that have legacy systems, but they are rolling out interconnectivity globally. Today’s shift towards increasing interconnectedness at sea is continuing to enable significant efficiency gains and new capabilities for maritime operations. Running in … full description “Maritime Cybersecurity (available)”

Mathematical Modelling of Cyber-Attackers vs Defenders using AI/ML (available)

Machine learning is a popular approach to signature-less malware detection because it can generalize to new (unseen) malware families. Some recent works have proposed the use of AI/ML-powered malware to bypass machine learning anti-malware systems (for instance, adversarial machine learning). The goal of the project is to model the system of malware vs anti-malware systems … full description “Mathematical Modelling of Cyber-Attackers vs Defenders using AI/ML (available)”

Metagenomics pipeline (available)

Starting Date: June 2019 Duration: 10 weeks Time commitment: Full time Prerequisites: experience with Python programming or workflow software (desirable), experience of querying web databases using RESTful interfaces. Metagenomics is the genomic sampling of environments (e.g. soil, sea water the human microbiome) which are composed of an unknown range of different species (usually bacteria and … full description “Metagenomics pipeline (available)”

Online risk behaviour amongst adolescents – an experiment on Cyberbullying and Cyberstalking (available)

Although social media provide a great opportunity to engage with a larger community, it can also encourage risky behaviours such as sharing inappropriate photos, engaging in risky stunts or pranks, engaging in sexual communications, cyberstalking and cyberbullying (Branley & Covey, 2018). It is not yet clear whether online risks are processed the same way as … full description “Online risk behaviour amongst adolescents – an experiment on Cyberbullying and Cyberstalking (available)”

Open-Source Artificial Pancreas Testbed (available)

The Artificial Pancreas (AP) is an automated system for delivering insulin therapy in Type 1 Diabetes (T1D) patients (whose pancreas cannot produce insulin on its own) [1]. The system comprises an infusion pump for insulin release, a so-called continuous glucose monitor (CGM) that senses glucose levels underneath the skin, and a control algorithm (running on … full description “Open-Source Artificial Pancreas Testbed (available)”

OSN Mining Platform – Building a public dataset for fake news research (available)

Project Description According to the Statista, in 2018 the UK had 44 million (66% of the population) active Online Social Networks (OSN) users. Whereas, globally, active OSN user population is 3,397 million. The most popular reason for using the OSN is to stay in touch with friends and family (42% of respondents) and stay up … full description “OSN Mining Platform – Building a public dataset for fake news research (available)”

Personality Identification Using Online Social Media Networks (available)

Project Description Personality is a combination of all the attributes—behavioural, temperamental, emotional, and mental—that characterise a unique individual. Ability to identify the personalities of people has always been of great interest to the researchers due to its importance. Owing to the increasing popularity of online social networks there is a possibility of predicting a user’s … full description “Personality Identification Using Online Social Media Networks (available)”

Python and Unreal Engine 4 integration (available)

This challenging project aims to integrate a Python-based agent framework that has been developed at RHUL with Unreal Engine 4 (UE4). With recent successes in reinforcement learning and other online learning approaches there has been much work on developing environments to test new and state of the art algorithms. UE4 provides the perfect development environment … full description “Python and Unreal Engine 4 integration (available)”

Security Behaviours and Risk Quantification (available)

Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Apart from improving the infrastructure and hardware through better technology, one of the most important security aspects is the risk assessment of potential breaches, in an ever increasingly complex threat landscape. Most current risk assessment methods do … full description “Security Behaviours and Risk Quantification (available)”

Security Evaluation of Broadcasting Network – Protecting the Entertainment Media (available)

Project Description With an increase in the use of internet technologies in various fields, the traditional broadcasting industry also started to adopt systems, software and services based on internet technologies to provide their contents to viewers. Most of the connected media devices deployed still tend to have a low-security threshold inherited from the era of … full description “Security Evaluation of Broadcasting Network – Protecting the Entertainment Media (available)”

Siri for Secure Programming – On-fly Secure Programming Assistant (available)

Project Description Secure coding is a set of best practices for making software (during development) as secure and stable as possible. It encompasses everything from recommendations for cryptographic usage, moving sensitive data, accessing a file system, and managing memory. As the security landscape is always changing, secure coding requires programmers to be up to date … full description “Siri for Secure Programming – On-fly Secure Programming Assistant (available)”

Smart Home Privacy Framework – Giving Right of Data Control to Individual Users (available)

Project Description The smart home is a collection of intelligent sensors and actuators that collect information of their vicinity with varying granularity. The collected data is of various formats audio, video, action (turn on and off buttons) and text, etc. Furthermore, these sensors will be collecting data from every person active in the vicinity. Separating … full description “Smart Home Privacy Framework – Giving Right of Data Control to Individual Users (available)”

Speak to Pay – Voice and Chip Payment Framework (available)

Project Description Payment architectures are in constant evolution, from Chip&Pin to contactless to facial-recognition based transactions. Also, with the advent of smart assistants like Siri, Amazon Alexa, and Google Assistant takes a cue from their respective users through voice commands. This project will explore the potential of using voice recognition/control as an authorisation of an … full description “Speak to Pay – Voice and Chip Payment Framework (available)”

Transparent Governance – Technology to hold Public/Private Sector to Account (available)

Project Description The costs to society of government corruption and low accountability are staggering. Countries on every continent struggle with entrenched corruption and opaque government processes, from graft and diversion of public funds to non-competitive procurement bidding processes. For several countries, public corruption is their single-largest challenge, costing the loss of funds, loss of opportunity, … full description “Transparent Governance – Technology to hold Public/Private Sector to Account (available)”

Transparent Machine Learning – Shining the light in a black box world (available)

Project Description Autonomy, based on Artificial Intelligence (AI), is at the very centre of many existing and future innovative and enabling technologies including autonomous vehicles, urban air mobility, smart cities and Industry 4.0. All decisions made by an AI system are based on the underlying algorithm design and its training/profiling set. An AI algorithm whether … full description “Transparent Machine Learning – Shining the light in a black box world (available)”