Research Group: Cybersecurity
About the group
In an increasingly uncertain world, the need for the security of citizens, data and critical infrastructure is a major concern. A parallel but not unrelated body of research acknowledges safety needs requiring rigorous engineering, fail-proof mechanisms and protection systems to ensure a dependable design and reliable operation. The Cyber Security Group at the Institute for Future Transport and Cities at Coventry University is a team of multi-disciplinary researchers addressing issues of systems security for automotive, rail and connected infrastructure.
Meet the team
Over the past 6 years, the group has been involved in a number of projects including:
- CyberOwl, a new commercial venture spun-out of the group in 2016 that is developing early warning systems for the cyberspace;
- Automotive Cyber Security collaboration with HORIBA MIRA, involving a number of doctoral students investigating both testing and design aspects of security on vehicular platforms;
- App Collusion Detection (ACiD) (2015-2017), which is funded by the EPSRC, in collaboration with City and Swansea Universities, and with Intel Security as industrial partner. The aim of this work is to develop novel theoretical methods and tools to detect Android applications of suspected collusion;
- Knowledge Elicitation for Railway Safety (KEEP SAFE) (2013-2014), which was funded by the RSSB to assess the use of safety-related data for effective safety decision-making for rail safety and security;
- Unmanned Distribution Capability (2011-2013), which was funded by the MoD to investigate communication resilience for semi-autonomous military logistics vehicles;
- Efficient and Reliable Transportation of Consignments (ERTOC) (2010-2012), which was funded by InnovateUK and EPSRC, and led by Ricardo, to build an open-API data-centric approach to logistics routing and payload sharing aimed at reducing carbon footprint.
Automotive cybersecurity poses a major challenge to connected and autonomous vehicles. This course addresses the wider challenge of increasing digital and software components on connected platforms and focusses specifically on threat intelligence and engineering aspects of automotive systems. Issues of policy and personal data are also explored.
This course is for engineers, scientists and consultants with an interest in cybersecurity of connected and autonomous vehicles; automotive manufacturers, electronics designers and suppliers, components manufacturers and software tool developers; and policy makers, academics and researchers.
- Cheah, M., Shaikh, S.A., Bryans, J., Wooderson, P. Building an automotive security assurance case using systematic security evaluations. Computers & Security, Volume 77, August 2018, Pages 360-379, Elsevier.
- Atif Hussain, Siraj Ahmed Shaikh, Alex Chung, Sneha Dawda, and Madeline Carr. An Evidence Quality Assessment Model for Cyber Security Policymaking. In Critical Infrastructure Protection XII - 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14,2018, Revised Selected Papers, IFIP Advances in Information and Communication Technology. Springer, 2018
- Tomlinson, A., Bryans, J., Shaikh, S.A. Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network. 2nd ACM Computer Science in Cars Symposium - Future Challenges in Artificial Intelligence & Security for Autonomous Vehicles, September 13th & 14th, Techikum, Munich, Germany (ECCV 2018 Satellite Event)
- Tomlinson, A., Bryans, J., Shaikh, S.A., Kalutarage, H.K., Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows. In 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2018, Luxembourg, June 25-28, 2018, pages 231–238, 2018
- Fowler, D., Bryans, J., Shaikh, S.A., Wooderson, P., Fuzz Testing for Automotive Cyber-Security. In 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2018, Luxembourg, June 25-28, 2018, pages 239–246, 2018
- Tomlinson, A., Bryans, J., Shaikh, S.A. Using a one-class compound classifier to detect in-vehicle network attacks. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO 2018, Kyoto, Japan, July 15-19, 2018, pages 1926–1929, 2018
- Asavoae, I.M., Nguyen, H.N., Roggenbach, M. Software Model Checking for Mobile Security – Collusion Detection in K. Software Model Checking for Mobile Security – Collusion Detection in K. In: Gallardo M., Merino P. (eds) Model Checking Software. SPIN 2018. Lecture Notes in Computer Science, vol 10869. Springer.
- Cheah, M., Nguyen, H.N., Bryans, J., Shaikh, S.A. Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. In: Hancke G., Damiani E. (eds) Information Security Theory and Practice. WISTP 2017. Lecture Notes in Computer Science, vol 10741. Springer.
- Fowler, D.S, Bryans, J., Shaikh, S.A. Automating fuzz test generation to improve the security of the Controller Area Network. ACM Chapters Computer Science in Cars Symposium (CSCS 2017), Munich, Germany, July 6, 2017. (Poster. Accepted)
- Asavoae, I.M., Blasco, J., Chen, T.M., Kalutarage, H.K., Muttik, I., Nguyen, H.N., Roggenbach, M. Shaikh, S.A. Detecting Malicious Collusion Between Mobile Software Applications: The Android Case. Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications 2017. Springer. (Peer-Reviewed Book Chapter. In Press)
- Asavoae, I.M., Nguyen, H.N., Roggenbach, M., Shaikh, S.A. Software Model Checking: A Promising Approach to Verify Mobile App Security. 19th Workshop on Formal Techniques for Java-like Programs (FTfJP 2017) held as part of the European Conference on Object-Oriented Programming (ECOOP 2017), 20th June 2017.
- Cheah, M., Bryans, J., Fowler, D.S., Shaikh, S.A. Threat Intelligence for Bluetooth-enabled Systems with Automotive Applications: An Empirical Study. 3rd Workshop on Safety and Security of Intelligent Vehicles (SSIV) to be held in conjunction with 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017.
- Kalutarage, H.K., Nguyen, H.N., and Shaikh, S.A. Towards a threat assessment framework for apps collusion. Telecommunication Systems. Open Access (2017).
- Cheah, M., Shaikh, S.A, Haas, O., and Ruddle, A. Towards a systematic security evaluation of the automotive Bluetooth interface. Vehicular Communications. Volume 9, July 2017, Pages 8–18. Elsevier.
- Fowler, D., Cheah, M., Shaikh, S.A., and Bryans, J. Towards a Testbed for Automotive Cybersecurity. 10th IEEE International Conference on Software Testing, Verification and Validation 2017. Best Industry Paper Award.
- Cheah, M., Shaikh, S.A., Bryans, J., and Nguyen, H.N. Combining third party components securely in automotive systems. In 10th International Conference on Information Security Theory and Practice (WISTP'2016), 26-27 September 2016, Heraklion, Crete, Greece, Lecture Notes in Computer Science. Springer, 2016
- Holt, J., Perry, S., Payne, R.J., Bryans, J., Hallerstede, S., and Hansen, F.O. A Model-Based Approach for Requirements Engineering for Systems of Systems. IEEE Systems Journal (2015) 9 (1):252-262
- James, P., Moller, F., Nguyen, H.N., Roggenbach, M., Schneider, S., and Treharne, H. On modelling and verifying railway interlockings: Tracking train lengths. Science of Computer Programming (2014) 96(3):315-336
- James, P., Moller, F., Nguyen, H.N. et al. Techniques for modelling and verifying railway interlockings. International Journal on Software Tools for Technology Transfer (2014) 16: 685-711.