Project List

Predicting Debug Symbols for Closed Source Binaries (completed)

Reverse engineering binaries, whether malicious or benign, is made more difficult by the absence of debug information. Variables and functions have had their identifiers “stripped”, so reverse engineers have to manually name them during analysis based on human understanding of the code functionality. The goal of this project is to use machine learning to predict … full description “Predicting Debug Symbols for Closed Source Binaries (completed)”

Privacy issues related to Data Provenance of Database containing End-user Data (completed)

Privacy issues related to the data stored, regarding end-users are well understood and studies. However, a large set of data can also be collected that is not directly related to the user but related to the user data – known as data provenance. Data provenance is the field of recording the history of data, from … full description “Privacy issues related to Data Provenance of Database containing End-user Data (completed)”

Python and Unreal Engine 4 integration (completed)

This challenging project aims to integrate a Python-based agent framework that has been developed at RHUL with Unreal Engine 4 (UE4). With recent successes in reinforcement learning and other online learning approaches there has been much work on developing environments to test new and state of the art algorithms. UE4 provides the perfect development environment … full description “Python and Unreal Engine 4 integration (completed)”

Real-Time Consumer Centric Data Compliance Auditing (completed)

When a user signs an end user agreement with an organisation, in return of which (s)he will give his/her data to the organisation the users do not have; a) any mechanism to assess that post-agreement the organisation abides by their own agreement and b) to see the operations carried on his/her data (that the organisation … full description “Real-Time Consumer Centric Data Compliance Auditing (completed)”

Real-Time Enterprise System Compliance Auditing with GDPR (completed)

Data compliance audit is a comprehensive review of an organization’s adherence to regulatory guidelines. Traditionally, security or IT consultants evaluate the strength and thoroughness of compliance preparations – usually carried out once a year. With the enforcement of GDPR upon us, a real-time view of compliance could safe an organisation a substantial penalty (4% of … full description “Real-Time Enterprise System Compliance Auditing with GDPR (completed)”

REST API and web frontend for a JavaScript symbolic testing framework (completed)

ExpoSE.js is a symbolic testing framework being developed at Royal Holloway designed to assist developers in improving the security and reliability of JavaScript applications, a language for which traditional software testing solutions have failed to produce satisfactory results. Symbolic execution is a technique which allows for the systematic enumeration of feasible paths of a program. … full description “REST API and web frontend for a JavaScript symbolic testing framework (completed)”

Side Channel Attacks on GPUs (completed)

Side Channel Attacks on GPUs Project Description GPUs (Graphics Processing Units) are commonly integrated in any computing paradigm, enhancing the performance of systems from gaming to scientific research. Under specific circumstances, the GPU can be shared between applications allowing a spy application to monitor side channels and attempt to infer with potential victims. For example, … full description “Side Channel Attacks on GPUs (completed)”

Siri for Secure Programming – On-fly Secure Programming Assistant (completed)

Project Description Secure coding is a set of best practices for making software (during development) as secure and stable as possible. It encompasses everything from recommendations for cryptographic usage, moving sensitive data, accessing a file system, and managing memory. As the security landscape is always changing, secure coding requires programmers to be up to date … full description “Siri for Secure Programming – On-fly Secure Programming Assistant (completed)”

Smart IDE for Cascading Style Sheets in Web Development (completed)

You will construct an experimental IDE to aid programmers in writing Cascading Style Sheets (CSS) for web applications. Style sheets dictate how a web page appears, and consist of a series of rules which are applied to elements of the web page. Determining exactly which rule should be applied to which element is not entirely … full description “Smart IDE for Cascading Style Sheets in Web Development (completed)”

System Provenance Collection from a Client Workstation (completed)

A client workstation in an enterprise network is used by individual employees. They use this workstation to perform different activities, including accessing the data stored in the enterprise data repositories (i.e., Database). These activities, which relate to accessing the data and then using it on a workstation are the crucial missing element in data compliance … full description “System Provenance Collection from a Client Workstation (completed)”

System Provenance Collection from a Database Server (completed)

A database server is a collection of an Operating System (OS) at its core that hosts a database – accessible from various services and devices in an enterprise network. The activities observed on the database server are of immense importance to show compliance with data governance policies. A crucial element of such a compliance is … full description “System Provenance Collection from a Database Server (completed)”

The Security Theory Map (completed)

Description of the project: Real world security is a multi-dimensional problem and therefore needs multiple theoretical lenses and analyses to understand and positively impact the application of security. This digital tool presents to the user a large range of the underpinning theories about security (and their constituent parts). These theories condition the outputs of security … full description “The Security Theory Map (completed)”

Transparent Machine Learning – Shining the light in a black box world (completed)

Project Description Autonomy, based on Artificial Intelligence (AI), is at the very centre of many existing and future innovative and enabling technologies including autonomous vehicles, urban air mobility, smart cities and Industry 4.0. All decisions made by an AI system are based on the underlying algorithm design and its training/profiling set. An AI algorithm whether … full description “Transparent Machine Learning – Shining the light in a black box world (completed)”

WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications (completed)

WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications   Microarchitectural covert channels are a threat to data confidentiality in multi-tenant environments (cloud platform, mobile phone, etc.). This type of leakage channel aims at tunnelling information across isolation boundaries (sandboxing, censorship, etc.) by exploiting timing variations during program execution. Indeed, the state of microarchitectural components … full description “WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications (completed)”

Working on computer mediated artwork with the Tate Gallery (completed)

The Tate Gallery owns a set of major artworks which are computer mediated; that is they employ computers to manage interaction with gallery visitors in a variety of often technically challenging ways. We are working with the conservators at the Tate to document these systems and to think about managing their future in the long … full description “Working on computer mediated artwork with the Tate Gallery (completed)”