Events and seminars
We run a programme of regular seminar afternoons (each themed on a specific area of cyber security), regular cyber security meetings aimed at local businesses, and conferences.
These events are an excellent opportunity for academics, industry, public sector, government and other partners to come together, hear about our latest research, discuss cyber security issues and challenges, and consider opportunities for future collaboration.
Upcoming events
We don’t currently have any upcoming events. Check back soon for further announcements.
Future of Cyber Security Webinar Series
This is a webinar series hosted by the Surrey Centre for Cyber Security in conjunction with the Security Awareness Special Interest Group (SASIG) where leading experts from industry and academia discuss topics that will shape cyber security in years to come.
Past seminars
Transitioning the TLS protocol to post-quantum cryptography
23 September 2021
Dr. Douglas Stebila (University of Waterloo)
Abstract: The simplest approach to transition the Transport Layer Security (TLS) protocol to resist attacks by a quantum computer is to replace Diffie-Hellman key exchange with a post-quantum key encapsulation mechanism (KEM) and a traditional signature with a post-quantum signature. The various trade-offs present in post-quantum algorithms -- either larger keys, slower computation, or less confidence in newer security assumptions -- mean that the situation is more complicated. In this talk Stebila will discuss various issues around and options for transitioning the TLS protocol to use post-quantum cryptography.
First Stebila will discuss "hybrid" or "composite" options, in which two algorithms -- a traditional algorithm and a post-quantum one -- are used simultaneously, with an update on the progress towards standardization of these options.
Next he'll discuss the KEMTLS alternative protocol design which uses long-term KEM keys for TLS handshake authentication instead of digital signatures. Among existing post-quantum candidates, signature schemes generally have larger public key/signature sizes compared to the public key/ciphertext sizes of KEMs: by using an IND-CCA-secure KEM for server authentication in post-quantum TLS, we can reduce communication size. Stebila will discuss the original KEMTLS option as well as a variant involving pre-distributed keys, which can help in Internet-of-Things settings. He'll also talk about issues involving certification of KEM public keys, such as proof of possession during registration.
Can AI beat cryptographers?
24 June 2021
David Gerault (University of Surrey)
Abstract: It has been known for years that AI can beat the best humans at chess, go, poker, and in multiple other domains. But what about cryptography? In this talk, we will discuss recent progress in applications of AI to cryptanalysis.
This is based on a paper accepted at EuroCrypt 2021; there is an eprint version available.
Artificial intelligence: An information theoretic perspective
13 May 2021
Professor Josef Kittler (University of Surrey)
Abstract: The core of any Artificial Intelligence (AI) application is machine learning. During the last decade the huge potential of AI has been accentuated by a revolutionary progress in deep learning, whereby a task is solved by training a deep neural network (DNN) using training data and an appropriate objective function. The quest for an effective DNN architecture, as well as the learning objective, is the subject of hundreds, if not thousands, of papers published annually.
The talk will focus on the problem of measuring the loss of DNN that drives the learning process. Noting that most researchers use heuristic methods to define the loss function, we resort to information theory to provide a better basis for selecting an objective function that is cognizant of the fact that in machine learning we are dealing with a multitude of probability distributions.
The first question to consider is whether the classical information measures such as Shannon entropy and Kullback-Leibler divergence that have been developed for communication applications are equally relevant for decision making tasks. We will show that there are arguments for adopting or developing variants that are better suited for machine learning. We will also address the problem of modelling the various distributions that play an important part in deep learning. The advocated comprehensive information theoretic approach to machine learning will be illustrated on a number of AI tasks, including classification, retrieval, regression and classifier incongruence detection.
State-separating proofs as sketches for machine-checked cryptographic proofs
29 April 2021
François Dupressoir (University of Bristol)
Abstract: The last decade has seen significant progress in the development of techniques and tools for machine-checking cryptographic proofs. Out of the challenges such formalisation efforts pose at even medium scale, new pen-and-paper techniques that mimic the techniques without the formality imposed by the tools have arisen, and are now seeing use in some cryptographic communities. In this talk, I will discuss how one such proof technique—state-separating proofs—can in fact be used to guide the formal development of proofs in existing tools (here, EasyCrypt) _without_ giving them formal semantics. In particular, although state-separating proofs are designed to compose well, we do not explicitly formalise generic composition results, instead relying on the composition properties of EasyCrypt modules and proofs. This enables us to mix-and-match state-separation and more traditional security definitions, depending on the component under study.
This is work-in-progress with Konrad Kohbrok (then Aalto University, now at Wire) and Sabine Oechsner (Aarhus University). Preliminary results [0] and proofs [1] are available, although the talk will go beyond them.
[0]: https://eprint.iacr.org/2021/326
[1]: https://gitlab.com/fdupress/ec-cryptobox
Vulnerability detection in Ethereum smart contracts using deep neural networks and transfer learning
25 March 2021
Professor Dr.-Ing. Alexandra Dmitrienko (University of Würzburg)
Abstract: In this talk, we focus on the problem of vulnerability detection in Ethereum smart contracts. Smart contracts are programs that execute on top of blockchains and are often in charge of significant financial assets. At the same time, they were shown to suffer from various vulnerability classes (e.g., reentrancy or multiple send bugs), which were exploited multiple times in the real world – for instance, losses from cryptocurrency theft account for $1.9 billion in 2020.
In our work, we present the first Deep Neural Network (DNN)-based vulnerability detection framework. It employs a multi-output architecture where the feature extractor learns the program semantics and each branch of the DNN captures the semantics of a specific vulnerability class. This architecture enables the detection of new vulnerability classes by simply concatenating a new classification branch to the feature extractor and training the new branch using transfer learning. Our framework can detect vulnerabilities in under 2 seconds per smart contract and yields an average F1 score of 95% across all evaluated vulnerability classes. It supports lightweight transfer learning to enable the detection of bugs from previously unseen vulnerability classes and outperforms existing vulnerability detection methods in terms of performance, coverage, and generalizability.
Systematic security analysis of TLS and other stateful (cryptographic) protocols
24 February 2021
Prof. Dr.- Ing. Juraj Somorovsky (Paderborn University)
Abstract: Transport Layer Security (TLS) is arguably the most important cryptographic protocol. We use it to secure the connection to websites, Web services or to create Virtual Private Networks (VPNs). However, the complexity of TLS resulted in various design and implementation failures, leading to many TLS attacks with fancy names like Heartbleed, FREAK, DROWN, or Raccoon.
In this presentation, we first give an overview of several well-known TLS attacks. We then highlight systematic methods to analyze TLS implementations, including fuzzing, testing, scanning, and state learning. We show how these methods can be used to find vulnerabilities in TLS as well as in other stateful protocols.
Post-quantum cryptography based on supersingular isogeny problems?
26 November 2020
Christophe Petit (University of Birmingham, and Université libre de Bruxelles)
Abstract: The security of many cryptographic protocols in use today relies on the computational hardness of mathematical problems such as integer factorization. These problems can be solved using quantum computers, and therefore most of our security infrastructures will become completely insecure once quantum computers are built. Post-quantum cryptography aims at developing security protocols that will remain secure even after quantum computers are built.
The biggest security agencies in the world including GCHQ and the NSA have recommended a move towards post-quantum protocols, and the new generation of cryptographic standards will aim at post-quantum security. In this talk I will discuss isogeny-based cryptography, a particular family of protocols that are considered for post-quantum security. Isogeny-based protocols have appealing properties including the shortest key sizes among post-quantum cryptography candidates, practical constructions for key exchange and signature, and a clear mathematical elegance.
Quantum collision attacks on AES-like hashing with low quantum random access memories
22 October 2020
Siwei Sun (Chinese Academy of Sciences)
Abstract: At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum attack on hash functions, a quantum version of the rebound attack exploiting differentials whose probabilities are too low to be useful in the classical setting. This work opens up a new perspective toward the security of hash functions against quantum attacks. In particular, it tells us that the search for differentials should not stop at the classical birthday bound.
Despite these interesting and promising implications, the concrete attacks described by Hosoyamada and Sasaki make use of large quantum random access memories (qRAMs), a resource whose availability in the foreseeable future is controversial even in the quantum computation community. Without large qRAMs, these attacks incur significant increases in time complexities.
In this talk, we show how to reduce or even avoid the use of qRAMs by performing a quantum rebound attack based on differentials with non-full-active super S-boxes. Along the way, an MILP-based method is proposed to systematically explore the search space of useful truncated differentials with respect to rebound attacks. As a result, we obtain improved attacks on AES-MMO, AES-MP, and the first classical collision attacks on 4- and 5-round Grostl-512.
To the best of our knowledge, these are the first dedicated quantum attacks on hash functions that slightly outperform Chailloux, Naya-Plasencia, and Schrottenloher's generic quantum collision attack (ASIACRYPT 2017) in a model where large qRAMs are not available. This demonstrates again how a clever combination of classical cryptanalytic technique and quantum computation leads to improved attacks, and shows that the direction pointed out by Hosoyamada and Sasaki deserves further investigation.
Revisiting security vulnerabilities in commercial password manager
20 August 2020
Dr Siamak F. Shahandashti (University of York, UK)
Abstract: In this work we analyse five popular commercial password managers for security vulnerabilities.
Our analysis is twofold. First, we compile a list of previously disclosed vulnerabilities through a comprehensive review of the academic and non-academic sources and test each password manager against all the previously disclosed vulnerabilities. We find a mixed picture of fixed and persisting vulnerabilities. Then we carry out systematic functionality tests on the considered password managers and find four new vulnerabilities.
Notably, one of the new vulnerabilities we identified allows a malicious app to impersonate a legitimate app to two out of five widely-used password managers we tested and as a result steal the user's password for the targeted service. We implement a proof-of-concept attack to show the feasibility of this vulnerability in a real-life scenario.
Finally, we report and reflect on our experience of responsible disclosure of the newly discovered vulnerabilities to the corresponding password manager vendors.
SEAL: Sealed-bid auction without auctioneers
25 June 2020
Professor Feng Hao (University of Warwick, UK).
Abstract: Vickrey auction is a second-price sealed-bid auction scheme, named after William Vickrey who among many other contributions first developed the theory for this scheme and won a Nobel prize in 1996. However, despite the extreme importance in the auction theory, Vickrey auction has rarely been used in practice.
One key obstacle concerns the trustworthiness of the auctioneer. The auctioneer can trivially learn all bid inputs which may contain trade secrets. Furthermore, a dishonest auctioneer might secretly modify the second-highest price in order to increase the auction revenue without bidders noticing it.
In this talk, we resolve this fundamental trust problem by designing a publicly verifiable e-auction scheme that completely removes the need for auctioneers. This represents a paradigm change from previous schemes. Our solution is called Self-Enforcing Auction Lot (SEAL). It does not require any secret channels between bidders; all communication is public and everyone including the third party observers can verify the integrity of the auction outcome.
The system allows bidders to jointly compute the winning bid while preserving the privacy of losing bids, as well as effectively resolving any tie in the contest if it exists. It supports both first-price and second-price sealed-bid auctions and most importantly, it occurs only a linear computation and communication complexity with respect to the bit length of the bid price, which is probably the best one may hope for. All these make SEAL a practical solution to deploy in a real-world application, e.g. as a smart contract on a blockchain platform.
A security and privacy analysis of the UK contact tracing app
29 May 2020
Dr Chris Culnane (UK).
Abstract: In this presentation we will present our analysis of the UK's Contact Tracing App. We will provide a critique of some of the design decision taken, as well as examining in more detail some of the technical implementation issues we found during our recent analysis.
Where applicable we will compare the approach to the one taken by Australia in their COVIDSafe app, highlighting similarities and differences, as well as signs of recent convergence on some technical aspects. Additionally, we will discuss some of the future challenges and risks that usage of these apps may create, and suggest steps that could be taken to mitigate such risks.
Secure auditing of internet services
6 March 2020
Dr Daniel O’Keeffe (Royal Holloway University of London, UK).
Abstract: Users of online services such as messaging, code hosting and collaborative document editing expect the services to uphold the integrity of their data. Despite providers’ best efforts, data corruption still occurs, but at present service integrity violations are excluded from SLAs. For providers to include such violations as part of SLAs, the competing requirements of clients and providers must be satisfied.
In this talk I will describe LibSEAL, a SEcure Audit Library for Internet services that creates a non-repudiable audit log of service operations and checks invariants to discover violations of service integrity. LibSEAL is a drop-in replacement for TLS libraries used by services, and runs inside a trusted execution environment, such as Intel SGX, to protect the integrity of the audit log. We evaluate LibSEAL with three popular online services (Git, ownCloud and Dropbox) and demonstrate that it is effective in discovering integrity violations with low overhead.
I will conclude the talk with a brief overview of some ongoing work in trustworthy cloud computing at Royal Holloway.
Learning quadratic games on networks
22 January 2020
Dr Xiaowen Dong (University of Oxford, UK).
Abstract: Individuals, or organisations, cooperate with or compete against one another in a wide range of practical situations. In the economics literature, such strategic interactions are often modelled as games played on networks, where an individual's payoff depends not only on her action but also that of her neighbours.
The current literature has largely focused on analysing the characteristics of network games in the scenario where the structure of the network, which is represented by a graph, is known beforehand. It is often the case, however, that the actions of the players are readily observable while the underlying interaction network remains hidden.
In this talk, I will introduce two novel frameworks for learning, from the observations on individual actions, network games with linear-quadratic payoffs, and in particular the structure of the interaction network. Both frameworks are based on the Nash equilibrium of such games and involve solving a joint optimisation problem for the graph structure and the individual marginal benefits.
We test the proposed frameworks on both synthetic and real world examples, and show that they can effectively and more accurately learn the games than the baselines. The proposed approach has both theoretical and practical implications for understanding strategic interactions in a network environment.
Logical dynamics in large games
20 November 2019
Professor Jam Ramanujam (The Institute of Mathematical Sciences, India).
Abstract: In two-player games, each player reasons about how the opponent would act at a position and expect herself (the player) to respond, and so on. Such intersubjectivity can be generalised to n-player games, and the logical basis of equilibrium notions is given thus.
However, what if n is large, say 10000? In such games payoffs are associated with strategy distributions rather than profiles. We discuss dynamics in such games and the use of logic to specify player types in these contexts.
Secure data outsourcing
15 November 2019
Associate Professor Alptekin Küpçü (Koc University, Turkey).
Abstract: As many services are moving to the cloud, we are losing control of our own data. This constitutes one of the biggest problems that we face in this decade. In this talk, I will first describe various cloud scenarios and services, including cloud storage and databases, and searching within them. I will briefly present the problems and current solutions to them, highlighting techniques to know to understand and improve current solutions, as well as open problems.
Establishing unlinkability relying on existing verification tools
30 October 2019
Dr Stéphanie Delaune (IRISA, France).
Abstract: Cryptographic protocols aim at securing communications over insecure networks such as the Internet, where dishonest users may listen to communications and interfere with them. For example, passports are no more pure paper documents. Instead, they contain a chip that stores additional information such as pictures and fingerprints of their holder. In order to ensure privacy, these chips include a mechanism, i.e. a cryptographic protocol, that does not let the passport disclose private information to external users. This is just a single example but of course privacy appears in many other contexts such as RFIDs technologies or electronic voting.
Formal methods have been successfully applied to automatically analyze traditional protocols and discover flaws. Privacy-type security properties (e.g. anonymity, unlinkability, ...) are expressed relying on a notion of behavioral equivalence, and are actually more difficult to analyse. We will discuss some recent advances that have been done to analyse automatically equivalence-based security properties, and we will review some issues that remain to be solved in this field. In particular, we will see that existing verification tools, such as ProVerif and Tamarin, are not suitable to analyse unlinkability. Therefore, we have developed a different approach: we design sufficient conditions that can then be effectively checked automatically using existing tools, and allows one to conclude on a number of case studies. This result, first published at S&P in 2016, has been recently extended to deal with stateful protocols. This is a joint work with D. Baelde, L. Hirschi, and S. Moreau.
Supersingular isogeny graphs
9 October 2019
Professor Omran Ahm (Institute for Research in Fundamental Sciences, Iran).
Abstract: The supersingular isogeny graphs are a class of expander graphs which have recently found applications in cryptography. In this talk, first, we explain what they are and then we explain how they have been used to construct cryptographic hash functions and key exchange protocols.
Ring signatures in blockchain
13 August 2019
Dr Tsz Hon Yuen (University of Hong Kong).
Abstract: Ring signature is a signature scheme which provides anonymity to the signer, without using trusted authority. It can be used in privacy-preserving applications such as e-voting and e-cash. Recently, it is used in cryptocurrency Monero to provide anonymity to spenders: the real spender's identity is hidden with respect to N public keys in the system. However, the ring signature used in Monero has signature size O(N), and N=10/20 in practice. Hence the level of anonymity is limited.
A number of researches has been done to reduce the signature size to O(log N). As a result, the ring size of N=2048 or more can be used in practice. It greatly increases the level of anonymity. In our recent work, we show how to construct such efficient ring signature using Bulletproof. We construct the most efficient O(log N)-size ring signature.
Tractable verification of multi-agent systems
29 May 2019
Dr Francesco Belardinelli (Imperial College London, UK).
Abstract: The formal verification of multi-agent systems is a key research area, as MAS are applied to the modelling and design of systems in domains as diverse as transportation, avionics, robotics, and security. Unfortunately, in many set ups of interest the model checking problem is either undecidable or untractable, thus hindering the development of any (efficient) model checking tool.
In this talk I will present two recent contributions on tractable model checking for multi-agent systems. In the first one we show how communication by broadcast can lead to a decidable model checking problem, also in the presence of imperfect information (and perfect memory). In the second contribution, we show that reasoning about a single resource in the temporal logic CTL comes at no extra computational cost. So, under specific assumptions, expressive logics for temporal and strategic reasoning can be applied effectively in the specification and verification of multi-agent systems.
Domain squatting
15 May 2019
Dr Nikolaos Pitropakis (Edinburgh Napier University, UK).
Abstract: Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. During this presentation we will begin a journey, where we will explore DNS and all of the forms of domain squatting.
Then we will we focus on a specific type of domain squatting called “combosquatting,” in which attackers register domains that combine a popular trademark with one or more phrases (e.g., betterfacebook[.]com, youtube-live[.]com). We will discuss the results of the first large scale, empirical study of combosquatting where more than 468 billion DNS records, collected from passive and active DNS data sources over almost six years were used for the analysis.
Machine learning and cyber security: Friends or foes?
27 February 2019
Matilda Rhode (Cardiff University, UK).
Abstract: Cyber security challenges are constantly evolving. In the short-term malicious actors may tweak individual attacks or malicious software to bypass particular defences. In the longer term the trends in types of attack change whenever a new solution has been widely adopted. Cyber defences are the sticks shaping the malicious landscape but there are also carrots, new opportunities which give good returns relative to the effort of malicious actors. For example the wide adoption of internet of things devices typically introduces a weak point into a network; the increasing reliance on data and digital systems has made ransomware attacks highly lucrative.
Machine learning has been met with scepticism from the security community, as in a number of other domains, but in the last few years has begun to demonstrate its worth in real-world scenarios when compare to traditional rule-based systems. Neural networks in particular have helped to mitigate the problems caused by short term changes to attack techniques.
The wide adoption of machine learning into other domains has introduced new security challenges. Adversarial attacks on computer vision systems as used by self-driving cars and automatic CCTV analysis have created cyber security challenges that did not exists several years ago. Adversarial attacks can also impact machine learning solutions for extant security problems such as malware and intrusion detection. This talk will explore the prominent threats to the security of machine learning cyber defences and how to mitigate them.
Bridging the security gap of NFV/SDN with trusted computing
6 February 2019
Dr Ludovic Jacquin (HP Labs, Bristol).
Biography: Dr Ludovic Jacquin is a Senior Researcher at Hewlett Packard Labs – the research organisation of Hewlett Packard Enterprise – in Bristol, UK. He holds an Applied Mathematics and Computer Science MSc from ENSIMAG (Grenoble, France) and received his PhD in Computer Science from Grenoble University (France) in 2013.
His broader research interest is to develop security mechanisms for computer and network infrastructure, both at the hardware and operating system level. He joined the Security Lab of Hewlett Packard Enterprise in 2014 with a focus on trust and attestation of the network infrastructure in the new paradigm of SDN and their application to related environments such as NFV. During his Ph.D., he mainly worked on the impact of network signalling protocols on security protocols such as IPsec.
Abstract: This talk will present the role of trusted computing and TPMs in SHIELD.
SHIELD is a H2020 Innovation Action project that aims to deliver an open solution for dynamically establishing and deploying virtual Security infrastructures in ISPs and corporate networks. It leverages Trusted Computing technologies to bridge the gap between orchestration tools and the virtual security functions introduced by Network Function Virtualisation; SHIELD also addresses the equivalent gap in networking introduced by Software-Defined Networks between controllers and network elements.
The second part of the talk will focus on some of the future looking research done in the Security Lab of Hewlett Packard Labs.
A treasury system for cryptocurrencies: Enabling better collaborative
23 January 2019
Dr Bingsheng Zhang (University, UK).
Abstract: A treasury system is a community-controlled and decentralized collaborative decision-making mechanism for sustainable funding of blockchain development and maintenance. During each treasury period, project proposals are submitted, discussed, and voted for; top-ranked projects are funded from the treasury.
The Dash governance system is a real-world example of such kind of systems. In this work, we, for the first time, provide a rigorous study of the treasury system. We modelled, designed, and implemented a provably secure treasury system that is compatible with most existing blockchain infrastructures, such as Bitcoin, Ethereum, etc. More specifically, the proposed treasury system supports liquid democracy/delegative voting for better collaborative intelligence. Namely, the stakeholders can either vote directly on the proposed projects or delegate their votes to experts.
Its core component is a distributed universally composable secure end-to-end verifiable voting protocol. The integrity of the treasury voting decisions is guaranteed even when all the voting committee members are corrupted. To further improve efficiency, we proposed the world’s first honest verifier zero-knowledge proof for unit vector encryption with logarithmic size communication.
This partial result may be of independent interest to other cryptographic protocols. A pilot system is implemented in Scala over the Scorex 2.0 framework, and its benchmark results indicate that the proposed system can support tens of thousands of treasury participants with high efficiency. This work is to be published at NDSS 2019.
Rule control of teleo-reactive, multi-tasking, communicating robotic agents
9 January 2019
Professor Keith Clark (Emeritus Professor Imperial College, UK).
Abstract: The robotic agents are programmed in two rule based languages: QuLog and TeleoR. They communicate using a logic based pub/sub and addressed message routing server, Pedro.
QuLog is a flexibly typed multi-threaded relation+function+imperative rule language. Its declarative subset of relation and function defining rules is used for encoding an agent’s dynamic beliefs and static knowledge. Its imperative rules are used for programming an agent’s behaviour. Imperative rules can invoke the relation and function rules, but not vice versa.
TeleoR is an application specific extension of QuLog for programming agents controlling robotic devices. It is a major extension of the T-R language proposed by Nils Nilsson. T-R’s ancestry goes back to the conditional triangular table action plans of the first cognitive robot, Shakey, built and programmed by a team lead by Nilsson at SRI in the late 1960s. Both TeleoR and T-R have sequences of guarded robotic action rules clustered into parameterised procedures:
- Two agents each controlling one mobile robot in co-operative bottle collecting. The agents have a joint goal of together collecting a given number of bottles. They communicate so each agent knows how many bottles both robots have collected, and to avoid the robots colliding with minimal divergence from each robot’s current path. They each stop their robot when the joint total is reached.
- A multi-tasking agent controlling a robotic arm and fairly sharing its use between multiple concurrent construction tasks. Colleagues at UNSW Sydney have ported a slightly more complex two arm controlling version of the agent program to a Baxter robot building towers of letter labeled blocks.
Past events
Co-organised by Surrey University's Centre for Cyber Security and the EPSRC Decarbonising Transport through Electrification Network+ (EPSRC DTE Network+), this interdisciplinary workshop, held on 24 September 2021, brought together researchers and industry colleagues to start to create a community and develop a shared understanding of the common challenges in adoption EVs and electrified transport.
Emerging technologies for electric vehicles (EVs) offer a plethora of advances including battery management, adaptive control, in-car payment and charging infrastructure but how do users feel about adopting electric vehicles? These are some of the questions that were discussed.
Behavioural science enables us to obtain a better understanding of users’ decisions and behaviour, but more is needed for the insights from behavioural science to affect the design of emerging EV technology and infrastructure. The workshop explored how EV technology needs to be designed to work with real users in mind in order to facilitate and promote the adoption of EVs.
Speakers
The workshop featured keynotes from international experts in electrical vehicles, usability and behavioural science, followed by an interdisciplinary research incubator looking to solve concrete challenges. Speakers included:
- George Beard, TRL: An overview of driving and accelerating the adoption of electric vehicles in the UK.
- Nikolas Thomopoulos, University of Surrey: Incorporating the human aspect in the design and development of Electric and Autonomous Vehicles (an overview from the WISE-ACT EU project).
- Dimitris Potoglou, EPSRC DTE Network+: An overview of how we change our relationship with the use of electric vehicles.
- Dr Saber Fallah and Dr Sotiris Moschoyiannis, University of Surrey: An overview of the technological opportunities for electric vehicles.
Organising committee
Sponsored by the Institute of Advanced Studies (IAS), this interdisciplinary workshop, held on 18 May 2021, brought together behavioural and computer scientists to tackle the challenges of usable cyber security, which requires a blend of technical requirements and understanding of human behaviour.
Using online electronic voting as a context and exemplar of systems with challenging security requirements, the workshop explored how systems can be designed to engender secure user behaviour.
What determines users’ security decisions and behaviour? How may users’ behaviour benefit the design of security systems? How can we nudge users to take up important but inconvenient security procedures? These are some of the questions that were discussed.
Speakers
The workshop featured keynotes from international experts in electronic voting, usability and behavioural science, followed by an interdisciplinary research incubator looking to solve concrete challenges. Speakers included:
- Edward Flahavan, Policy Advisor, The Behavioural Insights Team
- Daniel Read, Professor of behavioural economics, Warwick Business School
- Peter Ryan, Professor of Applied Security, University of Luxembourg
- Karen Renaud, Human Centred Security and Privacy, University of Strathclyde.
Organising committee
The 3rd Annual UK Cyber Security PhD Winter School took place virtually on 10 - 12 January 2022, in association with the National Cyber Security Centre and supported by the NCC Group.
On 10 December 2020, Professor Steve Schneider, Director of the Surrey Centre for Cyber Security, was joined by colleagues from the Department of Computer Science – and further afield – to launch a new multi-disciplinary initiative called Surrey Security Network (SSN).
Professor David Sampson launched the online gathering with a short speech. This was followed by three-minute summaries by 18 participants introducing their current areas of research.
Speakers included staff from our School of Law, Surrey Business School, Surrey Space Centre, 5G/6G Innovation Centre, Surrey Centre for Cyber Security and Centre for Vision, Speech and Signal Processing, plus our departments of Politics, Criminology, Mathematics, Computer Science, Mechanical Engineering Sciences and Civil and Environmental Engineering.
Topics discussed included web privacy and online harm, biometrics and facial recognition, online radicalisation, device network security, secure machine learning, satellite security and, in an explosive ending, creating buildings that can withstand bomb blasts.
The aim of ESORICS was to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas.