Project List

Micro-architectural Attacks on RISC-V Devices (available)

RISC-V is a royalty-free instruction set architecture (ISA) introduced in 2010 with substantial differences to ARM and X86-64 platforms. Its open-source nature threatens to disrupt the status quo of these widely deployed proprietary processor architectures. RISC-V devices have, very recently, started to reach the commercial marketplace. Future potential deployments of such RISC-V devices includes industrial … full description “Micro-architectural Attacks on RISC-V Devices (available)”

National cultures and security behaviours (available)

National culture, namely, the culture in a given country, can be broken down into specific variables. These variables define and influence social norms and behaviours of a society and its individuals. However, they also influence cyber security related perceptions and behaviours. Ans indicative and well-known approach on national cultures is the one by Hofstede, where … full description “National cultures and security behaviours (available)”

OSN Mining Platform – Building a public dataset for fake news research (available)

Project Description According to the Statista, in 2018 the UK had 44 million (66% of the population) active Online Social Networks (OSN) users. Whereas, globally, active OSN user population is 3,397 million. The most popular reason for using the OSN is to stay in touch with friends and family (42% of respondents) and stay up … full description “OSN Mining Platform – Building a public dataset for fake news research (available)”

Penetration Testing of Autonomous Vehicle Sensor Arrays (available)

Project Description The adoption of autonomous vehicles is a matter of when and how, rather than if it will happen. Domestic (private) and commercial (freight) autonomous vehicles are a proven concept, with most remaining questions regarding adoption hanging on the reliability and security of said vehicles. It is well-known that side-channel attacks exploiting peripheral systems, … full description “Penetration Testing of Autonomous Vehicle Sensor Arrays (available)”

Presenting Agent Simulation Experiments in COGNISIM (available)

When we simulate a system or a process, we normally want to imitate its operation over time. This need arises in a variety of contexts, from engineering to testing, training, education and video games. We are interested in simulation models that involve modeling human systems to gain an understanding of how they behave over time. … full description “Presenting Agent Simulation Experiments in COGNISIM (available)”

Prototyping access to FAIR digital objects (available)

Open data drives much of research. The FAIR principles are a set of general principles on how to enable sharing of open data. The workflow for programmatic access of such data requires developing an understanding of the API (usually with RESTful interface) of the relevant data set even if one has the relevant Persistent Identifier … full description “Prototyping access to FAIR digital objects (available)”

Security Behaviours and Cybercrime (available)

Project background Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks, in an ever increasingly complex threat landscape. These attacks constitute a variety of computer-enabled and computer-dependent crimes, broadly categorised as ‘cybercrime’. In order to be in a position to defend against these attacks and minimise … full description “Security Behaviours and Cybercrime (available)”

Security Evaluation of Broadcasting Network – Protecting the Entertainment Media (available)

Project Description With an increase in the use of internet technologies in various fields, the traditional broadcasting industry also started to adopt systems, software and services based on internet technologies to provide their contents to viewers. Most of the connected media devices deployed still tend to have a low-security threshold inherited from the era of … full description “Security Evaluation of Broadcasting Network – Protecting the Entertainment Media (available)”

Smart cars – Accident scene reconstruction (available)

Smart cars have a number of sensors monitoring the status of the vehicle and  at the same time assisting the driver. These sensors traditionally monitor temperature, battery levels, etc. They are relatively simple circuits that may also alert the driver for possible vehicle damage. Some of these are also working towards collision mitigation by monitoring … full description “Smart cars – Accident scene reconstruction (available)”

Smart Home Privacy Framework – Giving Right of Data Control to Individual Users (available)

Project Description The smart home is a collection of intelligent sensors and actuators that collect information of their vicinity with varying granularity. The collected data is of various formats audio, video, action (turn on and off buttons) and text, etc. Furthermore, these sensors will be collecting data from every person active in the vicinity. Separating … full description “Smart Home Privacy Framework – Giving Right of Data Control to Individual Users (available)”

Software framework implementation for air quality monitoring system (available)

The project requires the installation and use of commercially developed Python based software packages on a Raspberry Pi 3 board which access commercial sensors to measure air quality. The software has calibration, data acquisition and data storage functions. The hardware platform is based around 4 air contaminants Alphasense sensors mounted on an Alphasense AFE (analogue … full description “Software framework implementation for air quality monitoring system (available)”

Speak to Pay – Voice and Chip Payment Framework (available)

Project Description Payment architectures are in constant evolution, from Chip&Pin to contactless to facial-recognition based transactions. Also, with the advent of smart assistants like Siri, Amazon Alexa, and Google Assistant takes a cue from their respective users through voice commands. This project will explore the potential of using voice recognition/control as an authorisation of an … full description “Speak to Pay – Voice and Chip Payment Framework (available)”

Stable Marriage of Students (available)

Constraint Satisfaction and the final year projects system Prof Cohen is a world leading researcher in the theory and practice of constraints and has written some tools for the department that need to be improved. At Royal Holloway, we allocate students to projects and staff as supervisors of those projects using a semi-automated process, using … full description “Stable Marriage of Students (available)”

Transparent Governance – Technology to hold Public/Private Sector to Account (available)

Project Description The costs to society of government corruption and low accountability are staggering. Countries on every continent struggle with entrenched corruption and opaque government processes, from graft and diversion of public funds to non-competitive procurement bidding processes. For several countries, public corruption is their single-largest challenge, costing the loss of funds, loss of opportunity, … full description “Transparent Governance – Technology to hold Public/Private Sector to Account (available)”

Transparent Supply Chain – Know the provenance of products in superstores (available)

Project Description Blockchain platform provides an immutable temporal record which can be utilised to collect transactional data throughout the supply chain. This can potentially offer an immutable provenance of individual goods/products with full traceability from source to store. A transparent supply chain creates an opportunity to optimise supply-and-demand management, build resilience and ultimately enable more … full description “Transparent Supply Chain – Know the provenance of products in superstores (available)”

Visitors for Generalized Algebraic Data Types in OCaml (available)

Algebraic datatypes (ADTs) [1] are the basic method for defining how to build complex data values in functional programming languages: they specify both the basic, or atomic, values, as well as the constructors for building larger values out of smaller ones. For example, the following ADT defines generic lists that contain values of type ‘a … full description “Visitors for Generalized Algebraic Data Types in OCaml (available)”