Project List

A front-end for querying the ontology terms4FAIRskills (available)

term4FAIRskills is an ontology to describe the necessary skills to make data FAIR and keep FAIR. FAIR itself is a set of principles for ensuring that data is shared in as efficient and effective a manner as possible. In the field of Data Science there are colloquial estimates that perhaps 80% of the time spent … full description “A front-end for querying the ontology terms4FAIRskills (available)”

A Web interface to the ART software language engineering toolkit (available)

ART is a software tool developed with the Centre for Software Language Engineering which addresses a spectrum of modern programming language technologies, including generalised parsing, attribute grammar evaluation and executable formal semantics specifications. ART is used extensively in our course CS3480 Software Language Engineering and will shortly be released for general use. We would like to … full description “A Web interface to the ART software language engineering toolkit (available)”

Automated verification of CPU branch-predictors (available)

Branch predictors are components of CPUs that try to guess the outcome of a branching statement (e.g., an if-then-else) before it is known. They speed up the flow of instructions in the instruction pipeline by “pre-executing” what comes after a branching statement, and they play a key role in achieving high performance in modern CPUs. … full description “Automated verification of CPU branch-predictors (available)”

Automatic Patch-based Exploit Generation (available)

When a vulnerability is found, it generally goes through a responsible disclosure process. This means that the vendor will be contacted to write a fix before the vulnerability is made public. The patch will be pushed to its users and the vulnerability details become public. In theory, this is a safe process for vulnerability exposure … full description “Automatic Patch-based Exploit Generation (available)”

Autonomous Cars – Evaluation of Security Countermeasures (available)

Project Description Autonomous and connected vehicles will be a part of reality in the near future. There are many development efforts currently underway to pave the way for the deployment of autonomous vehicles (self-driving cars) in public areas. These vehicles are a collection of complex and sophisticated computational architectures. Cybersecurity is among many challenges that … full description “Autonomous Cars – Evaluation of Security Countermeasures (available)”

Building a chatbot for student queries (available)

It is important that student queries are replied to quickly and accurately. Many of the requests for information are fully explained in resources such as the student handbook. These include questions such as where students request extensions on coursework or how shuold they inform College if they are absent from a lecture. Frequently these questions … full description “Building a chatbot for student queries (available)”

Carbon Labelling – Blockchain based product carbon footprint system. (available)

Project Description Carbon footprint associated with a product is a combination of the emission-related in the manufacturing and logistics of the product. Logistics plays a vital role in moving products from factories to home and is one of the significant causes of carbon emission in Europe. Besides this, the last mile delivery network is also … full description “Carbon Labelling – Blockchain based product carbon footprint system. (available)”

Computer Vision for Extreme Environments (available)

The use of data from extreme environments in computer vision have shown an increase of interest in recent years as drones and autonomous vehicles were introduced into new uses. Nuclear plants, deep underwater and space vehicles are some of the areas computer vision can be applied to develop a fully autonomous system. Furthermore, the development … full description “Computer Vision for Extreme Environments (available)”

Control-flow graphs for Automatic-Exploit Generation (available)

Research has shifted over the years when it comes to binary exploitation. With more accurate and practical implementations of Control-flow Integrity (CFI) [1][2], the question arises as to what attack surface is still available – and how to exploit it. In particular, what attacks can be performed when staying within the boundaries of a (perfect) … full description “Control-flow graphs for Automatic-Exploit Generation (available)”

Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)

Project Description Data, primarily related to consumers is a crucial part of the modern tech-companies like Google, Facebook, Instagram, and non-tech-companies (superstores, insurance companies, etc.) alike have now started to rely heavily on consumer data for various commercial activities. Although the General Data Protection Regulation (GDPR) enhances the rights of the consumers from a technical … full description “Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)”

Cyclist: Verifying Programs using Cyclic Proof (available)

Cyclic proofs are a technique for proving properties inductively, or proving properties about inductively defined objects or processes. They can be used to prove logical statements, or to verify recursive programs. The Cyclist tool [1] has been developed as an automatic verification tool based on cyclic proofs. It can prove termination and verify temporal properties … full description “Cyclist: Verifying Programs using Cyclic Proof (available)”

Decentralised Autonomous Economy of Things – Putting rational actors back into Economy (available)

Project Description Internet of Things (IoT) and distributed ledger technologies are part of the movement to develop the device-specific decentralised economy. Example of such a service is decentralised energy grids that couple together the smart contracts and smart-meter technology to provide traceability and verification of energy sources, efficient peer-to-peer trading of energy. One such proposal … full description “Decentralised Autonomous Economy of Things – Putting rational actors back into Economy (available)”

Decentralised Cloud – Building an All-Purpose Execution Platform on Blockchain (available)

Project Description Blockchain and distributed ledger technology have invigorated the decentralised architectures. The positives of a decentralised architecture are that it is distributed widely and challenging to launch a DDoS against such a network. Besides that, the immutability and strong traceability/trackability of blockchain technologies can be considered as a foundation for designing a secure, reliable, … full description “Decentralised Cloud – Building an All-Purpose Execution Platform on Blockchain (available)”

Detecting money laundering in cryptocurrency economy (available)

Project Description Cryptocurrency networks are unique in a way that all the transactions are public. All payers and receivers are known, and their respective pseudonyms are public. Whereas the inherent anonymity enabled by the pseudonyms and privacy-preserving protocols, cryptocurrency can be argued to be a suitable platform for money laundering activities. In this project, the … full description “Detecting money laundering in cryptocurrency economy (available)”

Developing a Steganographic Wallet for Cryptocurrencies (available)

Steganography is a well-known mechanism that has been used for centuries (with different levels of sophistication) to avoid censorship and enable secret communications. Cryptocurrency wallets are normally protected by different levels of encryption and can even be stored into hardware wallets with different levels of security. Carrying one of this wallets can be problematic in … full description “Developing a Steganographic Wallet for Cryptocurrencies (available)”

Digital Humans in a Virtual Reality Football Platform. (available)

Libero is a VR football platform; a ground-breaking experience in visitor focused, immersive content that allows fans to truly live the history of famous football clubs, whilst also giving them a glimpse of what the future holds. Using A.I., world-class animation and award-winning storytelling, we can engage fans, new and old, in a way that … full description “Digital Humans in a Virtual Reality Football Platform. (available)”

Engineering ROTOR: a Refactoring Tool for OCaml (available)

OCaml [1] is a mature functional programming language with an expressive type system. Recently, we have developed a prototype tool, called ROTOR, for automatically refactoring OCaml codebases [2]. Currently, ROTOR handles renaming of functions. This is surprisingly hard due to OCaml’s powerful module system: renaming a function in one module may actually require renaming functions … full description “Engineering ROTOR: a Refactoring Tool for OCaml (available)”

Federated Machine Learning – Security and Privacy Evaluation Framework (available)

Project Description User data is essential for many of the modern business operations, especially related to the building consumer segmentation and profiling – for marketing and services personalisation. Dealing with user data has its positive and negatives, especially after the General Data Protection Regulation (GDPR) collecting and storing user’s personal data. Centralised machine learning approaches … full description “Federated Machine Learning – Security and Privacy Evaluation Framework (available)”

Jupyter notebooks (available)

  Prerequisites: experience with Python (useful) and Javascriptprogramming (essential). It may be useful to be willing to learn aboutfunctional programming (but this is not essential). Jupyter notebooks [1] are examples of literate programming [2] wherecode and outputs from the code as well as documentation are in the sameapplication. Jupyter allows the user to run code … full description “Jupyter notebooks (available)”

Machine Learning for Cyber-Physical Systems Monitoring (available)

Hybrid automata (HA) are a formal model for cyber-physical systems, i.e., systems characterised by digital components (discrete) that control and interact with the physical environment (continuous). HAs have been applied to system designs in numerous domains including avionics, automotive, medical devices, and robotics. Formal verification of HAs can establish, with provable correctness guarantees, whether or … full description “Machine Learning for Cyber-Physical Systems Monitoring (available)”

Machine Learning Library for OCaml (available)

Frameworks for machine learning include Python’s TensorFlow [1]. These frameworks provide standard ways of specifying models that can be optimised by machine learning algorithms. OCaml [2] is a mature functional programming language with an expressive type system. DecML [3] is a prototype OCaml extension that facilitates implementing machine learning tasks, based on specifying models as … full description “Machine Learning Library for OCaml (available)”

Maritime Cybersecurity (available)

Project Description Connected objects in motion are developing as a significant domain. There are many traditional businesses, like logistics and maritime shipping that have legacy systems, but they are rolling out interconnectivity globally. Today’s shift towards increasing interconnectedness at sea is continuing to enable significant efficiency gains and new capabilities for maritime operations. Running in … full description “Maritime Cybersecurity (available)”

Mixed Nash Equilibria in Net Coordination Games (available)

Net Coordination Games form a special class of many-player games with several applications in Theoretical Computer Sciene, Multi Agent Systems, and Semi Supervised Learning.  Nash equilibria correspond to the stable outcomes and they are the prominent solution concept in games. It is known that Net Coordination Games possess a pure Nash equilibrium, but unfortunately, it … full description “Mixed Nash Equilibria in Net Coordination Games (available)”

OSN Mining Platform – Building a public dataset for fake news research (available)

Project Description According to the Statista, in 2018 the UK had 44 million (66% of the population) active Online Social Networks (OSN) users. Whereas, globally, active OSN user population is 3,397 million. The most popular reason for using the OSN is to stay in touch with friends and family (42% of respondents) and stay up … full description “OSN Mining Platform – Building a public dataset for fake news research (available)”

Personality Identification Using Online Social Media Networks (available)

Project Description Personality is a combination of all the attributes—behavioural, temperamental, emotional, and mental—that characterise a unique individual. Ability to identify the personalities of people has always been of great interest to the researchers due to its importance. Owing to the increasing popularity of online social networks there is a possibility of predicting a user’s … full description “Personality Identification Using Online Social Media Networks (available)”

Security Behaviours and Risk Quantification (available)

Project background Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Apart from improving the infrastructure and hardware through better technology, one of the most important security aspects is the risk assessment of potential breaches, in an ever increasingly complex threat landscape. Most current risk assessment … full description “Security Behaviours and Risk Quantification (available)”

Security Evaluation of Broadcasting Network – Protecting the Entertainment Media (available)

Project Description With an increase in the use of internet technologies in various fields, the traditional broadcasting industry also started to adopt systems, software and services based on internet technologies to provide their contents to viewers. Most of the connected media devices deployed still tend to have a low-security threshold inherited from the era of … full description “Security Evaluation of Broadcasting Network – Protecting the Entertainment Media (available)”

Side Channel Attacks on GPUs (available)

Side Channel Attacks on GPUs Project Description GPUs (Graphics Processing Units) are commonly integrated in any computing paradigm, enhancing the performance of systems from gaming to scientific research. Under specific circumstances, the GPU can be shared between applications allowing a spy application to monitor side channels and attempt to infer with potential victims. For example, … full description “Side Channel Attacks on GPUs (available)”

Siri for Secure Programming – On-fly Secure Programming Assistant (available)

Project Description Secure coding is a set of best practices for making software (during development) as secure and stable as possible. It encompasses everything from recommendations for cryptographic usage, moving sensitive data, accessing a file system, and managing memory. As the security landscape is always changing, secure coding requires programmers to be up to date … full description “Siri for Secure Programming – On-fly Secure Programming Assistant (available)”