A simulation model of self-powered ankle prosthetics (completed)

Unlike conventional passive prosthetics, self-powered prosthetics provide positive net work to enhance strength and speed of limb movement. These are used not just in rehabilitation medicine but also as components of powered exoskeletons, a technology with numerous applications including military, manufacturing and construction industry, emergency and rescue. The extent of powered propulsion is typically determined … full description “A simulation model of self-powered ankle prosthetics (completed)”

Analyzing security of ECG biometrics (completed)

Biometric systems rely on physiological or behavioural characteristics that can be measured by sensors to verify identity. Electrocardiogram (ECG)-based biometrics is one of the new and most promising types. ECG signals measure the electrical activity of the heart and several studies have found them suitable for human identification. To match the signals with the registered … full description “Analyzing security of ECG biometrics (completed)”

Autonomous Cars – Evaluation of Security Countermeasures (available)

Project Description Autonomous and connected vehicles will be a part of reality in the near future. There are many development efforts currently underway to pave the way for the deployment of autonomous vehicles (self-driving cars) in public areas. These vehicles are a collection of complex and sophisticated computational architectures. Cybersecurity is among many challenges that … full description “Autonomous Cars – Evaluation of Security Countermeasures (available)”

Machine Learning for Cyber-Physical Systems Monitoring (available)

Hybrid automata (HA) are a formal model for cyber-physical systems, i.e., systems characterised by digital components (discrete) that control and interact with the physical environment (continuous). HAs have been applied to system designs in numerous domains including avionics, automotive, medical devices, and robotics. Formal verification of HAs can establish, with provable correctness guarantees, whether or … full description “Machine Learning for Cyber-Physical Systems Monitoring (available)”

Maritime Cybersecurity (available)

Project Description Connected objects in motion are developing as a significant domain. There are many traditional businesses, like logistics and maritime shipping that have legacy systems, but they are rolling out interconnectivity globally. Today’s shift towards increasing interconnectedness at sea is continuing to enable significant efficiency gains and new capabilities for maritime operations. Running in … full description “Maritime Cybersecurity (available)”

Micro-architectural Attacks on RISC-V Devices (available)

RISC-V is a royalty-free instruction set architecture (ISA) introduced in 2010 with substantial differences to ARM and X86-64 platforms. Its open-source nature threatens to disrupt the status quo of these widely deployed proprietary processor architectures. RISC-V devices have, very recently, started to reach the commercial marketplace. Future potential deployments of such RISC-V devices includes industrial … full description “Micro-architectural Attacks on RISC-V Devices (available)”

Open-Source Artificial Pancreas Testbed (completed)

The Artificial Pancreas (AP) is an automated system for delivering insulin therapy in Type 1 Diabetes (T1D) patients (whose pancreas cannot produce insulin on its own) [1]. The system comprises an infusion pump for insulin release, a so-called continuous glucose monitor (CGM) that senses glucose levels underneath the skin, and a control algorithm (running on … full description “Open-Source Artificial Pancreas Testbed (completed)”

Side Channel Attacks on GPUs (completed)

Side Channel Attacks on GPUs Project Description GPUs (Graphics Processing Units) are commonly integrated in any computing paradigm, enhancing the performance of systems from gaming to scientific research. Under specific circumstances, the GPU can be shared between applications allowing a spy application to monitor side channels and attempt to infer with potential victims. For example, … full description “Side Channel Attacks on GPUs (completed)”

WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications (completed)

WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications   Microarchitectural covert channels are a threat to data confidentiality in multi-tenant environments (cloud platform, mobile phone, etc.). This type of leakage channel aims at tunnelling information across isolation boundaries (sandboxing, censorship, etc.) by exploiting timing variations during program execution. Indeed, the state of microarchitectural components … full description “WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications (completed)”