Secure Cyber Systems
- - Key Capabilities - -
- Trustworthy Digital Ecosystems
Researchers in the group develop new methods for measuring and communicating resilience and trustworthiness, establishing implementable trusted-by-design and resilient-by-design principles for humans, machines and organisations. Areas include, but are not limited to, perceived trustworthiness estimation and assessment and trustworthiness frameworks.
- Cyber Resilience and System Security Engineering
The group develops novel techniques, methods and approaches for systems engineered to be safe, secure and resilient in distributed and hostile environments. The group delivers various research activities in resilience engineering ranging from its mathematical ramifications to policy implementation and process assessment for different resilience steps.
- Cyberthreat and Effects Modelling
The group engages with research activities in systematic and in-depth quantification of the threat landscape and risk exposure with a full semantic representation of current and anticipated threats in different environments. We design and implement different threat source characterisation and mitigation techniques tailored to tackle research and technical problems.
- Privacy Enhancing Technologies (PET)
The group develops privacy-enhancing security solutions and algorithms to ensure minimum information disclosure and policy compliance. We derive novel ways to apply PET in various real-life problems where competing privacy,security and commercial requirements exist. These problems range from user identification to financial transactions at micro levels, design of institutional structures at meso levels and design of policy and interventions at the macro levels.
- Decentralised Data Servers
We design and develop infrastructure and tooling for data ecosystems that are distributed and decentralised, enabling the use of public and private funds to achieve large scale coordination more efficiently with data portability and interoperability.
- Physical Layer Security
We design and develop novel key establishment schemes. Throughout our research activities, we seek to increase key generations rates and entropy fully underpinned by novel algorithmic processes tested in the field.
- Adversarial Machine Learning
We develop novel benchmarks and metrics for the resilience of ML models against adversarial actions. The group investigates the ability of existing ML models to adapt to adversarial manipulations in critical mission operations with applications in different sectors such as nuclear and space.
- Distributed Technologies for Defensive Cyber Operations
We investigate the use of distributed ledger technologies for attack identification and mitigation and threat characterisation in modern cyberinfrastructures. We develop novel distributed applications and algorithms to ensure data integrity and immutability and assist in the detection of disruptive events with applications in different contexts.
- - Equipment/Facilities - -
- A dedicated Private Permissioned Blockchain network with 200 nodes and 3 organisations running bespoke smart contracts
- “HAT Microservers” for decentralised ownership and portability of data used globally for Data Passports