Project List

A front-end for querying the ontology terms4FAIRskills (available)

term4FAIRskills is an ontology to describe the necessary skills to make data FAIR and keep FAIR. FAIR itself is a set of principles for ensuring that data is shared in as efficient and effective a manner as possible. In the field of Data Science there are colloquial estimates that perhaps 80% of the time spent … full description “A front-end for querying the ontology terms4FAIRskills (available)”

A Toolkit for Micro-architectural Attacks on Mobile Devices (available)

Micro-architectural attacks leverage side-effects from modern processor features during the execution of secret-dependent code. These attacks have emerged in recent years as a potent vector for recovering cryptographic keys and other secret data. Despite this, very few implementations of published attacks have been released publicly on mobile devices, which has raised questions about their reproduciblity. … full description “A Toolkit for Micro-architectural Attacks on Mobile Devices (available)”

A Web interface to the ART software language engineering toolkit (available)

ART is a software tool developed with the Centre for Software Language Engineering which addresses a spectrum of modern programming language technologies, including generalised parsing, attribute grammar evaluation and executable formal semantics specifications. ART is used extensively in our course CS3480 Software Language Engineering and will shortly be released for general use. We would like to … full description “A Web interface to the ART software language engineering toolkit (available)”

Automated verification of CPU branch-predictors (available)

Branch predictors are components of CPUs that try to guess the outcome of a branching statement (e.g., an if-then-else) before it is known. They speed up the flow of instructions in the instruction pipeline by “pre-executing” what comes after a branching statement, and they play a key role in achieving high performance in modern CPUs. … full description “Automated verification of CPU branch-predictors (available)”

Automatic Patch-based Exploit Generation (available)

When a vulnerability is found, it generally goes through a responsible disclosure process. This means that the vendor will be contacted to write a fix before the vulnerability is made public. The patch will be pushed to its users and the vulnerability details become public. In theory, this is a safe process for vulnerability exposure … full description “Automatic Patch-based Exploit Generation (available)”

Autonomous Cars – Evaluation of Security Countermeasures (available)

Project Description Autonomous and connected vehicles will be a part of reality in the near future. There are many development efforts currently underway to pave the way for the deployment of autonomous vehicles (self-driving cars) in public areas. These vehicles are a collection of complex and sophisticated computational architectures. Cybersecurity is among many challenges that … full description “Autonomous Cars – Evaluation of Security Countermeasures (available)”

Building a chatbot for student queries (available)

It is important that student queries are replied to quickly and accurately. Many of the requests for information are fully explained in resources such as the student handbook. These include questions such as where students request extensions on coursework or how shuold they inform College if they are absent from a lecture. Frequently these questions … full description “Building a chatbot for student queries (available)”

Carbon Labelling – Blockchain based product carbon footprint system. (available)

Project Description Carbon footprint associated with a product is a combination of the emission-related in the manufacturing and logistics of the product. Logistics plays a vital role in moving products from factories to home and is one of the significant causes of carbon emission in Europe. Besides this, the last mile delivery network is also … full description “Carbon Labelling – Blockchain based product carbon footprint system. (available)”

Combatting Fake News Using Mobile Trusted Execution Environments (available)

The distribution of fake news – hoaxes, propaganda, and outright false articles – by pseudo-news outlets is a major issue. Fake news can undermine trust in legitimate sources of news and the integrity of the democratic process. Existing methods to combat this issue have significant shortcomings. Manual take-downs are slow and lack scalability, particularly if … full description “Combatting Fake News Using Mobile Trusted Execution Environments (available)”

Computer Vision for Extreme Environments (available)

The use of data from extreme environments in computer vision have shown an increase of interest in recent years as drones and autonomous vehicles were introduced into new uses. Nuclear plants, deep underwater and space vehicles are some of the areas computer vision can be applied to develop a fully autonomous system. Furthermore, the development … full description “Computer Vision for Extreme Environments (available)”

Control-flow graphs for Automatic-Exploit Generation (available)

Research has shifted over the years when it comes to binary exploitation. With more accurate and practical implementations of Control-flow Integrity (CFI) [1][2], the question arises as to what attack surface is still available – and how to exploit it. In particular, what attacks can be performed when staying within the boundaries of a (perfect) … full description “Control-flow graphs for Automatic-Exploit Generation (available)”

Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)

Project Description Data, primarily related to consumers is a crucial part of the modern tech-companies like Google, Facebook, Instagram, and non-tech-companies (superstores, insurance companies, etc.) alike have now started to rely heavily on consumer data for various commercial activities. Although the General Data Protection Regulation (GDPR) enhances the rights of the consumers from a technical … full description “Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)”

COVID-19 – Mobile phone based passport applications (available)

Project Description We have all been affected by COVID19. Amongst the main driving forces for reopening international borders and enabling traveling is the existence of COVID19 immunity passports. However, there are serious considerations around the overall trust, security, privacy but also ethical dimensions of such proposals. This project aims to take into account the views … full description “COVID-19 – Mobile phone based passport applications (available)”

Cyclist: Verifying Programs using Cyclic Proof (available)

Cyclic proofs are a technique for proving properties inductively, or proving properties about inductively defined objects or processes. They can be used to prove logical statements, or to verify recursive programs. The Cyclist tool [1] has been developed as an automatic verification tool based on cyclic proofs. It can prove termination and verify temporal properties … full description “Cyclist: Verifying Programs using Cyclic Proof (available)”

Detecting money laundering in cryptocurrency economy (available)

Project Description Cryptocurrency networks are unique in a way that all the transactions are public. All payers and receivers are known, and their respective pseudonyms are public. Whereas the inherent anonymity enabled by the pseudonyms and privacy-preserving protocols, cryptocurrency can be argued to be a suitable platform for money laundering activities. In this project, the … full description “Detecting money laundering in cryptocurrency economy (available)”

Developing a Steganographic Wallet for Cryptocurrencies (available)

Steganography is a well-known mechanism that has been used for centuries (with different levels of sophistication) to avoid censorship and enable secret communications. Cryptocurrency wallets are normally protected by different levels of encryption and can even be stored into hardware wallets with different levels of security. Carrying one of this wallets can be problematic in … full description “Developing a Steganographic Wallet for Cryptocurrencies (available)”

Digital Humans in a Virtual Reality Football Platform. (available)

Libero is a VR football platform; a ground-breaking experience in visitor focused, immersive content that allows fans to truly live the history of famous football clubs, whilst also giving them a glimpse of what the future holds. Using A.I., world-class animation and award-winning storytelling, we can engage fans, new and old, in a way that … full description “Digital Humans in a Virtual Reality Football Platform. (available)”

Engineering ROTOR: a Refactoring Tool for OCaml (available)

OCaml [1] is a mature functional programming language with an expressive type system. Recently, we have developed a prototype tool, called ROTOR, for automatically refactoring OCaml codebases [2]. Currently, ROTOR handles renaming of functions. This is surprisingly hard due to OCaml’s powerful module system: renaming a function in one module may actually require renaming functions … full description “Engineering ROTOR: a Refactoring Tool for OCaml (available)”

Federated Machine Learning – Security and Privacy Evaluation Framework (available)

Project Description User data is essential for many of the modern business operations, especially related to the building consumer segmentation and profiling – for marketing and services personalisation. Dealing with user data has its positive and negatives, especially after the General Data Protection Regulation (GDPR) collecting and storing user’s personal data. Centralised machine learning approaches … full description “Federated Machine Learning – Security and Privacy Evaluation Framework (available)”

Increasing the Efficiency of Low-land Natural Disaster Search and Rescue through ‘Supervised Hybrid Animal-UAV Interactions’ (available)

Search and Rescue (SAR) is a time-critical event: after a finite period of time the chances of recovering individuals who have become lost, or trapped in the wake of a disaster, trend towards zero. As a result, management of search and rescue resources is paramount. Travel time, planning and executing search grids, are pivotal tasks … full description “Increasing the Efficiency of Low-land Natural Disaster Search and Rescue through ‘Supervised Hybrid Animal-UAV Interactions’ (available)”

Jupyter notebooks (available)

  Prerequisites: experience with Python (useful) and Javascriptprogramming (essential). It may be useful to be willing to learn aboutfunctional programming (but this is not essential). Jupyter notebooks [1] are examples of literate programming [2] wherecode and outputs from the code as well as documentation are in the sameapplication. Jupyter allows the user to run code … full description “Jupyter notebooks (available)”

Local Search Heuristics for Schelling Games on Graphs (available)

Schelling games were recently introduced and studied as a novel class of strategic games inspired by the Schelling’s model of residential segregation. These games are played on an undirected graph that represent the topology of a residential area. In addition, we are given a set of agents partitioned into multiple types. Each agent occupies a … full description “Local Search Heuristics for Schelling Games on Graphs (available)”

Machine Learning for Crystal Structure Prediction (available)

Crystal Structure Prediction (CSP) is one of the major problems in computational chemistry with numerous applications in real life. This is essentially the (global) minimisation of a continuous, high-dimensional, complicated function. Many heuristic methods have been proposed for CSP and recently new methods based on Machine Learning were introduced. The goal of this project is … full description “Machine Learning for Crystal Structure Prediction (available)”

Machine Learning for Cyber-Physical Systems Monitoring (available)

Hybrid automata (HA) are a formal model for cyber-physical systems, i.e., systems characterised by digital components (discrete) that control and interact with the physical environment (continuous). HAs have been applied to system designs in numerous domains including avionics, automotive, medical devices, and robotics. Formal verification of HAs can establish, with provable correctness guarantees, whether or … full description “Machine Learning for Cyber-Physical Systems Monitoring (available)”

Machine Learning Library for OCaml (available)

Frameworks for machine learning include Python’s TensorFlow [1]. These frameworks provide standard ways of specifying models that can be optimised by machine learning algorithms. OCaml [2] is a mature functional programming language with an expressive type system. DecML [3] is a prototype OCaml extension that facilitates implementing machine learning tasks, based on specifying models as … full description “Machine Learning Library for OCaml (available)”

Maritime Cybersecurity (available)

Project Description Connected objects in motion are developing as a significant domain. There are many traditional businesses, like logistics and maritime shipping that have legacy systems, but they are rolling out interconnectivity globally. Today’s shift towards increasing interconnectedness at sea is continuing to enable significant efficiency gains and new capabilities for maritime operations. Running in … full description “Maritime Cybersecurity (available)”

Micro-architectural Attacks on RISC-V Devices (available)

RISC-V is a royalty-free instruction set architecture (ISA) introduced in 2010 with substantial differences to ARM and X86-64 platforms. Its open-source nature threatens to disrupt the status quo of these widely deployed proprietary processor architectures. RISC-V devices have, very recently, started to reach the commercial marketplace. Future potential deployments of such RISC-V devices includes industrial … full description “Micro-architectural Attacks on RISC-V Devices (available)”

Mixed Nash Equilibria in Net Coordination Games (available)

Net Coordination Games form a special class of many-player games with several applications in Theoretical Computer Sciene, Multi Agent Systems, and Semi Supervised Learning.  Nash equilibria correspond to the stable outcomes and they are the prominent solution concept in games. It is known that Net Coordination Games possess a pure Nash equilibrium, but unfortunately, it … full description “Mixed Nash Equilibria in Net Coordination Games (available)”

OSN Mining Platform – Building a public dataset for fake news research (available)

Project Description According to the Statista, in 2018 the UK had 44 million (66% of the population) active Online Social Networks (OSN) users. Whereas, globally, active OSN user population is 3,397 million. The most popular reason for using the OSN is to stay in touch with friends and family (42% of respondents) and stay up … full description “OSN Mining Platform – Building a public dataset for fake news research (available)”