Project List

A simulation model of self-powered ankle prosthetics (available)

Unlike conventional passive prosthetics, self-powered prosthetics provide positive net work to enhance strength and speed of limb movement. These are used not just in rehabilitation medicine but also as components of powered exoskeletons, a technology with numerous applications including military, manufacturing and construction industry, emergency and rescue. The extent of powered propulsion is typically determined … full description “A simulation model of self-powered ankle prosthetics (available)”

A Web interface to the ART software language engineering toolkit (available)

ART is a software tool developed with the Centre for Software Language Engineering which addresses a spectrum of modern programming language technologies, including generalised parsing, attribute grammar evaluation and executable formal semantics specifications. ART is used extensively in our course CS3480 Software Language Engineering and will shortly be released for general use. We would like to … full description “A Web interface to the ART software language engineering toolkit (available)”

Analyzing security of ECG biometrics (available)

Biometric systems rely on physiological or behavioural characteristics that can be measured by sensors to verify identity. Electrocardiogram (ECG)-based biometrics is one of the new and most promising types. ECG signals measure the electrical activity of the heart and several studies have found them suitable for human identification. To match the signals with the registered … full description “Analyzing security of ECG biometrics (available)”

Author Attribution of Binaries (available)

Attributing binaries, whether malicious or benign, is a difficult and time consuming task however, there is an increase demand for this either for attributing cyber attacks or preventing plagiarism. The goal of this project is to use machine learning to predict authorship of binaries. You will use a corpus of open source software either for … full description “Author Attribution of Binaries (available)”

Automatic Patch-based Exploit Generation (available)

When a vulnerability is found, it generally goes through a responsible disclosure process. This means that the vendor will be contacted to write a fix before the vulnerability is made public. The patch will be pushed to its users and the vulnerability details become public. In theory, this is a safe process for vulnerability exposure … full description “Automatic Patch-based Exploit Generation (available)”

Autonomous Cars – Evaluation of Security Countermeasures (available)

Project Description Autonomous and connected vehicles will be a part of reality in the near future. There are many development efforts currently underway to pave the way for the deployment of autonomous vehicles (self-driving cars) in public areas. These vehicles are a collection of complex and sophisticated computational architectures. Cybersecurity is among many challenges that … full description “Autonomous Cars – Evaluation of Security Countermeasures (available)”

Building a chatbot for student queries (available)

It is important that student queries are replied to quickly and accurately. Many of the requests for information are fully explained in resources such as the student handbook. These include questions such as where students request extensions on coursework or how shuold they inform College if they are absent from a lecture. Frequently these questions … full description “Building a chatbot for student queries (available)”

Building a dataset of IoT device firmwares (available)

Performing security analysis of IoT devices is often expensive as it requires purchasing the IoT device, which is not practical at scale. To avoid this some researchers perform security analysis over the apps used by those IoT devices. Although this analysis can be useful it has some limitations as only one element of the ecosystem … full description “Building a dataset of IoT device firmwares (available)”

Building an internal malware repository (available)

The goal of the project is to build a malware repository that can be queried internally by members of S3Lab using a consistent web interface or API, similarly to existing malware repository (e.g., VirusTotal, VirusShare), but for internal use only. In the first phases of the project, the student will need to interact with members … full description “Building an internal malware repository (available)”

Carbon Labelling – Blockchain based product carbon footprint system. (available)

Project Description Carbon footprint associated with a product is a combination of the emission-related in the manufacturing and logistics of the product. Logistics plays a vital role in moving products from factories to home and is one of the significant causes of carbon emission in Europe. Besides this, the last mile delivery network is also … full description “Carbon Labelling – Blockchain based product carbon footprint system. (available)”

Computation on the PID graph with graphQL queries (available)

Introduction Persistent Identifiers (PIDs) are a mechanism to provide persistent identification to entities which cannot be guarenteed by other identifiers such as a URL. The most well known of these are DOI’s (https://www.doi.org/) which typically identify published articles, but a wide variety of other identifiers exist, such as ORCiD’s to identify individuals. PIDs are not only … full description “Computation on the PID graph with graphQL queries (available)”

Computer Vision for Extreme Environments (available)

The use of data from extreme environments in computer vision have shown an increase of interest in recent years as drones and autonomous vehicles were introduced into new uses. Nuclear plants, deep underwater and space vehicles are some of the areas computer vision can be applied to develop a fully autonomous system. Furthermore, the development … full description “Computer Vision for Extreme Environments (available)”

Control-flow graphs for Automatic-Exploit Generation (available)

Research has shifted over the years when it comes to binary exploitation. With more accurate and practical implementations of Control-flow Integrity (CFI) [1][2], the question arises as to what attack surface is still available – and how to exploit it. In particular, what attacks can be performed when staying within the boundaries of a (perfect) … full description “Control-flow graphs for Automatic-Exploit Generation (available)”

Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)

Project Description Data, primarily related to consumers is a crucial part of the modern tech-companies like Google, Facebook, Instagram, and non-tech-companies (superstores, insurance companies, etc.) alike have now started to rely heavily on consumer data for various commercial activities. Although the General Data Protection Regulation (GDPR) enhances the rights of the consumers from a technical … full description “Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)”

Cyclist: Verifying Programs using Cyclic Proof (available)

Cyclic proofs are a technique for proving properties inductively, or proving properties about inductively defined objects or processes. They can be used to prove logical statements, or to verify recursive programs. The Cyclist tool [1] has been developed as an automatic verification tool based on cyclic proofs. It can prove termination and verify temporal properties … full description “Cyclist: Verifying Programs using Cyclic Proof (available)”

Decentralised Autonomous Economy of Things – Putting rational actors back into Economy (available)

Project Description Internet of Things (IoT) and distributed ledger technologies are part of the movement to develop the device-specific decentralised economy. Example of such a service is decentralised energy grids that couple together the smart contracts and smart-meter technology to provide traceability and verification of energy sources, efficient peer-to-peer trading of energy. One such proposal … full description “Decentralised Autonomous Economy of Things – Putting rational actors back into Economy (available)”

Decentralised Cloud – Building an All-Purpose Execution Platform on Blockchain (available)

Project Description Blockchain and distributed ledger technology have invigorated the decentralised architectures. The positives of a decentralised architecture are that it is distributed widely and challenging to launch a DDoS against such a network. Besides that, the immutability and strong traceability/trackability of blockchain technologies can be considered as a foundation for designing a secure, reliable, … full description “Decentralised Cloud – Building an All-Purpose Execution Platform on Blockchain (available)”

Detecting money laundering in cryptocurrency economy (available)

Project Description Cryptocurrency networks are unique in a way that all the transactions are public. All payers and receivers are known, and their respective pseudonyms are public. Whereas the inherent anonymity enabled by the pseudonyms and privacy-preserving protocols, cryptocurrency can be argued to be a suitable platform for money laundering activities. In this project, the … full description “Detecting money laundering in cryptocurrency economy (available)”

Digital Humans in a Virtual Reality Football Platform. (available)

Libero is a VR football platform; a ground-breaking experience in visitor focused, immersive content that allows fans to truly live the history of famous football clubs, whilst also giving them a glimpse of what the future holds. Using A.I., world-class animation and award-winning storytelling, we can engage fans, new and old, in a way that … full description “Digital Humans in a Virtual Reality Football Platform. (available)”

Engineering ROTOR: a Refactoring Tool for OCaml (available)

OCaml [1] is a mature functional programming language with an expressive type system. Recently, we have developed a prototype tool, called ROTOR, for automatically refactoring OCaml codebases [2]. Currently, ROTOR handles renaming of functions. This is surprisingly hard due to OCaml’s powerful module system: renaming a function in one module may actually require renaming functions … full description “Engineering ROTOR: a Refactoring Tool for OCaml (available)”

Federated Machine Learning – Security and Privacy Evaluation Framework (available)

Project Description User data is essential for many of the modern business operations, especially related to the building consumer segmentation and profiling – for marketing and services personalisation. Dealing with user data has its positive and negatives, especially after the General Data Protection Regulation (GDPR) collecting and storing user’s personal data. Centralised machine learning approaches … full description “Federated Machine Learning – Security and Privacy Evaluation Framework (available)”

Interactive Visualisation of Disentangled Representations (available)

This project aims to develop an interactive visualisation toolkit based on existing technologies (IPython & Plotly) that will assist researchers in debugging and understanding complex models in the area of representation learning. Representation learning is a sub-field of machine learning that focuses on developing techniques for representing objects that exist in high-dimensional space (e.g. faces … full description “Interactive Visualisation of Disentangled Representations (available)”

Jupyter notebooks (available)

Starting Date: June 2020 Duration: 10 weeks Time commitment: Full time Prerequisites: experience with Python (useful) and Javascript programming (essential). It may be useful to be willing to learn about functional programming (but this is not essential). Jupyter notebooks [1] are examples of literate programming [2] where code and outputs from the code as well … full description “Jupyter notebooks (available)”

Machine Learning for Crystal Structure Prediction (available)

Crystal Structure Prediction (CSP) is one of the major problems in computational chemistry with numerous applications in real life. This is essentially the (global) minimisation of a continuous, high-dimensional, complicated function. Many heuristic methods have been proposed for CSP and recently new methods based on Machine Learning were introduced. The goal of this project is … full description “Machine Learning for Crystal Structure Prediction (available)”

Machine Learning for Cyber-Physical Systems Monitoring (available)

Hybrid automata (HA) are a formal model for cyber-physical systems, i.e., systems characterised by digital components (discrete) that control and interact with the physical environment (continuous). HAs have been applied to system designs in numerous domains including avionics, automotive, medical devices, and robotics. Formal verification of HAs can establish, with provable correctness guarantees, whether or … full description “Machine Learning for Cyber-Physical Systems Monitoring (available)”

Machine Learning Library for OCaml (available)

Frameworks for machine learning include Python’s TensorFlow [1]. These frameworks provide standard ways of specifying models that can be optimised by machine learning algorithms. OCaml [2] is a mature functional programming language with an expressive type system. DecML [3] is a prototype OCaml extension that facilitates implementing machine learning tasks, based on specifying models as … full description “Machine Learning Library for OCaml (available)”

Machine Learning vs Machine Learning in Malware Evasion (available)

Machine learning is a popular approach to signature-less malware detection because it can generalize to new (unseen) malware families. Some recent works have proposed the use of AI/ML-powered malware to bypass machine learning anti-malware systems. The goal of the project is to model the system of malware vs anti-malware systems as two opponents using various … full description “Machine Learning vs Machine Learning in Malware Evasion (available)”

Maritime Cybersecurity (available)

Project Description Connected objects in motion are developing as a significant domain. There are many traditional businesses, like logistics and maritime shipping that have legacy systems, but they are rolling out interconnectivity globally. Today’s shift towards increasing interconnectedness at sea is continuing to enable significant efficiency gains and new capabilities for maritime operations. Running in … full description “Maritime Cybersecurity (available)”