Projects

SCCS members have been successful in attracting research funding for security related research from different sources including national and European research funding bodies like EPSRC and EU FP7, also public sectors like Home Office in the UK and the Victorian Electoral Commission in Australia.

Many research projects have involved industrial partners as co-funding bodies and/or research partners. The total funding amount of those projects exceeds 5M GBP. Below is a list of some selected projects of SCCS members.

Title Investigator Funding source
Academic Centre of Excellence in Cyber Security Research - University of Surrey Steve SchneiderMark ManulisShujun Li

GCHQRCUK PaCCS and BIS

ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks Shujun LiMichael McGuireRoger MaullHelen Treharne, EPSRC (EP/P011896/1)
A novel scheme for countering unauthorised usage of digital media content Shujun LiAnthony T.S. Ho Intellectual Property Office (IPO) through Technology Strategy Board (TSB) SBRI programme
Audio-visual cues based attention switching for machine listening Wenwu WangAnthony T.S. HoShujun Li

EPSRC MILES (EP/I000992/1)

COMMANDO-HUMANS: COMputational Modelling and Automatic Non-intrusive Detection Of HUMan behAviour based iNSecurity Shujun LiPatrice Rusconi

EPSRC EP/N020111/1

Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures  

EU FP7-SEC-2011-1

Digital forensics: scenarios and standards Anthony T.S. HoShujun Li

Home Office HOS/11/038

Error-Control Watermarking  

EPSRC (EP/E056407/1)

Eyes Can Tell: Applications of Eye-tracking Devices in Cyber Security Research Shujun LiPatrice Rusconi

NCSC, part of GCHQ

Formal Methods for Digital Watermarking Systems Anthony T.S. HoHelen Treharne

EPSRC CASE (Thales)

Improving customer experience while ensuring data privacy for intelligent mobility Helen Treharne, Norman Poh, Steve SchneiderLee Gillam EPSRC EP/N028295/1
Integrating data sources to enhance the experience for passengers with special needs and/or disabilities through privacy aware mobile applications Helen TreharneSteve SchneiderCaroline Scarles

Rail Research UK Association (RRUKA) / Association of Train Operating Companies (ATOC)‘Data to Improve Customer Experience’ competition

IP Protecting Cloud Services in Supply Chains (IPCRESS) Lee Gillam

Technology Strategy Board (TSB)

Mobile Magic Mirror (M3): Steganography and Cryptography on the move Shujun LiAnthony T.S. HoHaitham CruickshankZhili Sun

Defence Science and Technology Laboratory (Dstl) / Ministry of Defence (MOD) through Innovate UK - Technology Strategy Board (TSB) SBRI programme

Mobile Phone Security  

KTN, Consult Hyperion

Pass∞ (Pronouced PassInfinity) Shujun Li

Department for Culture, Media & Sport (DCMS) and Innovate UK through the SETsquared Partnership's Cyber Security ICURe Programme

POLARBEAR - Pattern Of Life ANPR Behaviour Extraction Analysis and Recognition Shujun LiAnthony T.S. Ho

Innovate UK - Technology Strategy Board (TSB) Collaborative R&D Competition 'Data exploration - creating new insight and value'

Private Multi-Party Authentication and Key Exchange (PRIMAKE) Mark Manulis

German Research Foundation (Deutsche Forschungsgemeinschaft, DFG)

TAPESTRY: Trust, Authentication and Privacy over a DeCentralised Social Registry John CollomosseMark ManulisKlaus Moessner

EPSRC EP/N02799X/1

Text and Image Forensics Anthony T.S. Ho

EPSRC CASE (Charteris plc)

Trustworthy Voting Systems Steve Schneider

EPSRC (EP/G025797/1)

Dates

Start date: 1 September 2009
End date: 30 June 2014

Summary

The objective of DTN-S3 is designing and specifying a new scalable and adaptable security key management system, that is lightweight and suitable for DTN environment. The key management functions should applied flexibly to DTN host, router and gateway nodes.  As such, the DTN-S3 lightweight key management concepts should be applicable to other types of satellite/terrestrial networks.

Funding

EADS-Astrium

Investigators

Dates

Start date: 1 February 2012
End date: 31 December 2014

Summary

This project provides the design and associated development of a verifiable voting system, based on the principles of the original Pret a Voter system, to enable secure electronic voting in the state of Victoria, Australia. The aim is to provide a system using electronic ballot markers so that voters can construct their votes electronically, and then upload them to the system in a verifiable way. The system provides 'end-to-end verifiability' voters obtain cryptographically signed receipts of their votes so they can later check that the votes have been included in the tally and not altered or discarded, and the processing and tallying of the votes is done in a publicly verifiable way so that independent auditors can check that it has been done correctly. The application of the original design idea to its use in a real election gives rise to new research challenges and the need to develop new security protocols and algorithms.

Electronic voting in Victoria is motivated by the need for accessibility, and to support long distance out-of-state voting and voters for whom English is not their first language. The particular engineering challenges and security concerns associated with electronic voting have motivated the use of a highly secure and voter-verifiable system to provide the necessary guarantees in the integrity of the resulting election and the privacy of the votes.

Funding

Victorian Electoral Commission, Australia

Investigator

Dates

Start date: 1 March 2013
End date: 20 December 2013

Summary

The organised nature of some crimes including drug trafficking and terrorism can be difficult to identify. One approach is to identify offenders travelling in 'convoy'. UK police forces have been using ANPR (automatic number plate recognition) data collected by traffic cameras to perform convoy analysis; however, this is typically done manually with prior information of one known vehicle. This project aims to develop an automated software system for ANPR convoy analysis. We will develop a computational behavioural model of criminals travelling in convoy and test it against real data. This project will be carried out jointly with Surrey Police.

Funding

EPSRC MILES (EP/I000992/1)

Investigators

Dates

Start date: 1 September 2009
End date: 30 June 2014

Summary

Performance Enhancing Proxies (PEPs) are used in satellite networks to provide better performance for TCP/IP applications. Multi-Layer IPsec (ML-IPsec) enhances the functionality of IPsec in order to solve the conflicts between IPsec and intermediate entities such as TCP and application layer PEPs. This project aimed at designing a new dynamic ML-IPSec protocol which works well with middle entities such as PEPs. The work also included analysis of the new protocol and network performance while running both IPsec and ML-IPsec.

Funding

EADS-Astrium

Investigators

Dates

Start date: 1 September 2009
End date: 30 June 2014

Summary

The objective of this proposal (SASH-NET) is specifying a scalable and adaptable security architecture and key management that is hierarchical and distributed, in order to protect unicast, multicast and broadcast data for a variety of cryptographically heterogeneous networks such as the broadband and satellite mobile networks.

Funding

EADS-Astrium

Investigators

Dates

Start date: 1 September 2005
End date: 31 March 2009

Summary

Most current research has considered only reliable multicast at the transport layer, and has disregarded the related topics of security, and scalability – considerations vital to successful use in a future internet. The absence of appropriate security mechanisms is acknowledged to be a key impediment to widespread deployment of multicast within the Internet, and is recognised as a particular issue for reliable multicast protocols. At the same time, standards are available for multicast congestion control, but have been shown to be particularly vulnerable to attack (mechanisms are often implemented in user space, the set of receivers is not necessarily known at the source, and the use of Packet FEC introduces exploitation paths that are not common in the unicast case). This topic has been explored, resulting in a range of publications and proposal of new techniques to improve scaling and reduce the opportunity for exploitation by unauthorised access to capacity.

The project's research programme successfully built on the complementary expertise of the collaborating teams from both two universities.  This approach allowed it to depart from a strict layered-design methodology to introduce new protocol mechanisms for reliability and congestion control, while at the same time designing security solutions, which together provide functions needed to realise a flexible, but efficient, reliable multicast protocol. Results include a novel adaptive Packet FEC mechanism that employs cross-layer methods offering significant (at least order of magnitude) improvement in performance, compatible security methods, a robust congestion control design, and new methods to enable hierarchical key distribution integrated with the reliability mechanisms. Together these enable encryption, authentication, and confirmation of delivery and provide measures to mitigate the impact of Denial of Service (DoS) attacks.

Funding

EPSRC

Investigators

Contact us

Find us

Address
Surrey Centre for Cyber Security
University of Surrey
Guildford
Surrey
GU2 7XH