InfoSec Research Group Projects

Examples of projects currently being carried out in the UCL Information Security Group are listed below. Highlights of projects that have been completed can be found in the listing of previous projects.

REPHRAIN

Madeline Carr, Emiliano De Cristofaro and Steven Murdoch

The National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online, is a collaboration between the University of Bristol, UCL, the University of Bath, the University of Edinburgh and Kings College London.

QuePaxa: Escaping the Tyranny of Timeouts in Consensus

Cristina Basescu (Swiss Federal Institute of Technology Lausanne), Vero Estrada-Galinanes (Swiss Federal Institute of Technology Lausanne), Bryan Ford (Swiss Federal Institute of Technology Lausanne), Lefteris Kokoris-Kogias (Mysten Labs and Institute of Science and Technology Austria), Philipp Jovanovic (University College London), Ewa Syta (Trinity College) and Pasindu Tennage (Swiss Federal Institute of Technology Lausanne)

AQuePaxa, is the first consensus protocol offering state-of-the-art normalcase efficiency without depending on timeouts.

Usable Privacy in Female Health Apps

Lisa Malki (University College London), Dilisha Patel (University College London), Mark Warner (University College London), Ruba Abu-Salma (Kings College London), Majid Hatamian (Google) and Ina Kaleva (Kings College London)

This project explores the usability of privacy mechanisms within female mHealth apps, focusing on features that allow users to manage their data such as deletion and data portability mechanisms.

Towards A Smart Digital Forensic Advisor To Support First Responders With At-Scene Triage Of Digital Evidence Across Crime Types

Val Abreu (UCL), Catherine O'Brien (UCL), Mark Warner (UCL), Maria Maclennan (University of Edinburgh), Niamh Nic DaƩid (University of Dundee), Oriola Sallavaci (University of Essex) and Sarah Morris (University of Southampton)

This project is investigating existing practices, resources, challenges, and user needs around the process of search and seizure of digital devices across two distinct crime types.