Academic Centre of Excellence in Cyber Security Research - University of Southampton
Lead Research Organisation:
University of Southampton
Department Name: Sch of Electronics and Computer Sci
Abstract
Cyber security is ultimately about devices and people, which together give rise to a 'cyberspace' of networks and systems. Vulnerabilities arise from hardware, software and human factors, but typically from any combination of them. Our interdisciplinary approach affords us expertise over a significant number of such combinations. We deliver a wide spectrum of interwoven research ranging from electronic (nano) devices to (physical and cyber) biometrics, passing through world-leading research on cyber-enabling infrastructures using behavioural and cognitive psychology, and deploying both formal and experimental methods.
We work on secure hardware devices such as data-secure sanitisable memories, embedded security and trusted hardware, their secure formal design and verification, and fabrication in our state-of-the-art cleanrooms. This links to (mission-critical, multi-clearance) software systems, whose design and validation builds on our expertise in language-based security. Mathematical models and static analysis techniques are also used for privacy systems, whose ultimate goal is to drive the design of data-confinement and privacy-enhancing web applications, online protocols and analysis tools. Of a similar goal-driven nature is our research on trust-and-reputation models, aimed at exploiting mutual trust mechanisms in agent communities to meet collaborative goals in the absence of reliable information.
Agents systems link to secure services and information risk management over advanced networks and provide the basis for cutting-edge research on situational awareness. The latter extends to ad-hoc networks of practical operational relevance, such as the integration of human-agent teams. This establishes a synergy with our behavioural and cognitive scientists, who focus on the analysis of patterns of cyber-behaviour and group decision-making and risk behaviour.
Our work on the security of critical infrastructures concerns cyber-physical and industrial control systems, financial trading, and the web. It includes IoT, the power grid, building automation, clouds, distributed ledgers, the analysis of cyber controls and of human factors affecting response time to cyber-attacks in financial trading markets. We also focus on access control, attack visualisation, linked-data (de-)anonymisation and provenance. A theme of growing importance concerns users' (web) identities. This builds on foundational work on cryptoprotocols, and provides a strong connection between our computer and social sciences researchers, in particular through the issues of (un-linkable) identities, super-identities, and the work on privacy and cyber-crime legislation. Finally, we mention our seminal work on biometrics for access control based on physical and cyber individual characteristics.
The present proposal aims at securing a support grant for the centre. Specifically, we seek funds to: support the Director in the organisation and daily running of the centre; run a series of seminars in Cyber Security; foster multidisciplinary activities; participate in networking events with other ACE-CSRs and host a national ACE-CSR workshop; run outreach, public engagement and industrial liaison events; revamp our web portal; print and distribute brochures and publicity material.
We work on secure hardware devices such as data-secure sanitisable memories, embedded security and trusted hardware, their secure formal design and verification, and fabrication in our state-of-the-art cleanrooms. This links to (mission-critical, multi-clearance) software systems, whose design and validation builds on our expertise in language-based security. Mathematical models and static analysis techniques are also used for privacy systems, whose ultimate goal is to drive the design of data-confinement and privacy-enhancing web applications, online protocols and analysis tools. Of a similar goal-driven nature is our research on trust-and-reputation models, aimed at exploiting mutual trust mechanisms in agent communities to meet collaborative goals in the absence of reliable information.
Agents systems link to secure services and information risk management over advanced networks and provide the basis for cutting-edge research on situational awareness. The latter extends to ad-hoc networks of practical operational relevance, such as the integration of human-agent teams. This establishes a synergy with our behavioural and cognitive scientists, who focus on the analysis of patterns of cyber-behaviour and group decision-making and risk behaviour.
Our work on the security of critical infrastructures concerns cyber-physical and industrial control systems, financial trading, and the web. It includes IoT, the power grid, building automation, clouds, distributed ledgers, the analysis of cyber controls and of human factors affecting response time to cyber-attacks in financial trading markets. We also focus on access control, attack visualisation, linked-data (de-)anonymisation and provenance. A theme of growing importance concerns users' (web) identities. This builds on foundational work on cryptoprotocols, and provides a strong connection between our computer and social sciences researchers, in particular through the issues of (un-linkable) identities, super-identities, and the work on privacy and cyber-crime legislation. Finally, we mention our seminal work on biometrics for access control based on physical and cyber individual characteristics.
The present proposal aims at securing a support grant for the centre. Specifically, we seek funds to: support the Director in the organisation and daily running of the centre; run a series of seminars in Cyber Security; foster multidisciplinary activities; participate in networking events with other ACE-CSRs and host a national ACE-CSR workshop; run outreach, public engagement and industrial liaison events; revamp our web portal; print and distribute brochures and publicity material.
Planned Impact
During the past five years we have produced huge change and progress in the ACE-CSR through interdisciplinary research and significant results backed by external funding and investment. We have established a vibrant cyber security community across campus, forging stable working links between colleagues from four distinct faculties; engaged in externally-funded, high-quality research and outreach activities with GCHQ, FCO, NCA, Bank of England, the Metropolitan and Hampshire Police forces, and the South East Regional Cyber Crime Unit (SEROCU); and built a Cyber Security Academy (CSA). The CSA is a partnership between the University and industry leaders -currently DSTL, Northrop-Grumman, Roke Manor- and arguably the first instance of HMR's CyberInvest scheme in the country. Its objectives span from research and consultancy to outreach, training and knowledge transfer. Fig. 1 shows the ACE- CSR acting as the founding stone for the partnership, which then unfolds through six, outward-looking components.
There can be no doubt that the ACE-CSR is changing the University. It is helping reshape the University by inspiring the creation of a new research group in cyber security, a new institute in international security, and three degrees of studies. It afforded us the opportunity to forge thriving links with industry and to embed industrial influence through the awarding of visiting professorships to the CSA partners' leaders. The ACE-CSR's impact on the UK cyber security landscape is unfolding through our research on the security of Cyber Essentials, effective anonymisation, smart meters, CPS, blockchains as a computational infrastructure, hardware security and the IoT. Project CASTLE involving penetration testing of campus facilities by students exemplifies a thriving environment where research is quickly fed into postgraduate training and teaching. Renewing the recognition of our status in the national cyber security academic network will go a long way towards helping us consolidate and complete this transformation.
There can be no doubt that the ACE-CSR is changing the University. It is helping reshape the University by inspiring the creation of a new research group in cyber security, a new institute in international security, and three degrees of studies. It afforded us the opportunity to forge thriving links with industry and to embed industrial influence through the awarding of visiting professorships to the CSA partners' leaders. The ACE-CSR's impact on the UK cyber security landscape is unfolding through our research on the security of Cyber Essentials, effective anonymisation, smart meters, CPS, blockchains as a computational infrastructure, hardware security and the IoT. Project CASTLE involving penetration testing of campus facilities by students exemplifies a thriving environment where research is quickly fed into postgraduate training and teaching. Renewing the recognition of our status in the national cyber security academic network will go a long way towards helping us consolidate and complete this transformation.
Organisations
- University of Southampton (Lead Research Organisation)
- Defence Science & Technology Laboratory (DSTL) (Collaboration)
- Duke University (Collaboration)
- Zhejiang University (Collaboration)
- Northwestern University (Collaboration)
- University of Applied Sciences Emden / Leer (Collaboration)
- City University of Hong Kong (Collaboration)
- Roke Manor Research Ltd. (Collaboration)
- Northrop Grumman (Collaboration)
People |
ORCID iD |
Vladimiro Sassone (Principal Investigator) |
Publications

Abbas H
(2021)
Learning-based BTI stress estimation and mitigation in multi-core processor systems
in Microprocessors and Microsystems

Aitchison C
(2023)
A memristor fingerprinting and characterisation methodology for hardware security.
in Scientific reports


Akintunde M
(2023)
Verifiably Safe and Trusted Human-AI Systems: A Socio-technical Perspective

Al-Daloo M
(2020)
Bootstrapped Driver and the Single-Event-Upset Effect
in IEEE Transactions on Circuits and Systems I: Regular Papers

Alagundagi DB
(2023)
Exploring breast cancer exosomes for novel biomarkers of potential diagnostic and prognostic importance.
in 3 Biotech

Amri S
(2023)
A Review of Upgradeable Smart Contract Patterns based on OpenZeppelin Technique
in The Journal of The British Blockchain Association


Description | We are working to enhance cyber security at large, and finding specific applications to public administrations and industry. For the former, our key finding at the moment of writing is the applicability of distributed ledger technologies. Next, we plan to expand our research to application domains such as the IoT and smart grids. We are also developing a substantial programme of professional training that we expect will benefit industry. The difficulty and comprehensiveness of the challenges arising from cyber security. There several things that we understand pretty well, but we are yet to bridge the gaps between theoretical understanding, practical realisation and real-world deployment. There are also are so many things that we don't yet understand even theoretically. In the final two years of the grants we applied a step change to our approach, funded the Southampton Cyber Security Academy, and grew our research group and our portfolio of grants and research achievements. I am satisfied with the work, and believe that the objects have all been met. |
Exploitation Route | Our main finding at this moment is the applicability of distributed ledger technologies to problems in the public administration sphere. The next phase of our research will be to expand those findings to other application domains, including the IoT. We are now exploring the application of AI and machine learning to cyber security, and the initial response is very promising. Look forward to future work with excitement. |
Sectors | Digital/Communication/Information Technologies (including Software) Education Energy Financial Services and Management Consultancy Government Democracy and Justice |
Description | The project started just recently, we are continuing to grow our Cyber Security Academy, which uses our research findings for industry collaboration and impact and outreach. Most notably, to our work we are finding solutions to problems in the public sector domain, including taxation, police and administration. Our next domain of interest is the IoT and energy, with particular focus on smart grids. We are using our findings is several realistic scenarios, in partnership with real-world actors from industry, government, law enforcement and the real world. It is still early to draw any conclusions and report, since we're not even yet half way through the grant. In the final part of the grant we develop significant collaboration with government departments and public services across Europe, most notably the UK, Malta and Italy. Our engagement with the public sector is ongoing, and is currently focusing on the development and applications of distributed ledger technologies. On the basis of the research and activities from this project, we have expanded and currently continue to expand our network of industry partners, our programme of training for professionals as well as our engagement with the cyber community at large. Thanks to the outcomes of this project, Southampton has developed a model of work with government, industry and academic which is coming to be recognised as our approach to cyber security |
First Year Of Impact | 2016 |
Sector | Digital/Communication/Information Technologies (including Software),Energy,Government, Democracy and Justice |
Impact Types | Societal Policy & public services |
Description | Member of the Biometrics and Forensics Ethics Group |
Geographic Reach | National |
Policy Influence Type | Participation in a guidance/advisory committee |
Impact | The Biometrics and Forensics Ethics Group - BFEG - advises across the home office and at request across wider government and law enforcement activities. The group's yearly activity is partially laid out by the Home Office and partly by the interests of the members. The group minutes and reports are published where possible on the Home Office BFEG group webpage |
URL | https://www.gov.uk/government/organisations/biometrics-and-forensics-ethics-group |
Description | Member of the Policing Science Council |
Geographic Reach | Europe |
Policy Influence Type | Participation in a guidance/advisory committee |
Description | Ministry of Finance (Italy). |
Geographic Reach | Europe |
Policy Influence Type | Influenced training of practitioners or researchers |
Description | South East Regional Crime Unit |
Geographic Reach | Local/Municipal/Regional |
Policy Influence Type | Participation in a guidance/advisory committee |
Description | influence of cybercrime policing |
Geographic Reach | National |
Policy Influence Type | Influenced training of practitioners or researchers |
Description | A development methodology for cyber secure safety control systems |
Amount | £112,000 (GBP) |
Organisation | National Cyber Security Centre |
Sector | Public |
Country | United Kingdom |
Start | 09/2019 |
End | 09/2025 |
Description | AP4L: Adaptive PETs to Protect & emPower People during Life Transitions |
Amount | £2,794,276 (GBP) |
Funding ID | EP/W032473/1 |
Organisation | Engineering and Physical Sciences Research Council (EPSRC) |
Sector | Public |
Country | United Kingdom |
Start | 03/2022 |
End | 03/2025 |
Description | Artificial Intelligence-enhanced design for secure, anti-tamper embedded devices. |
Amount | £86,000 (GBP) |
Organisation | Royal Academy of Engineering |
Sector | Charity/Non Profit |
Country | United Kingdom |
Start | 08/2020 |
End | 08/2022 |
Description | Automated analysis of threats and countermeasures for SME's to feed into cyber essentials |
Amount | £112,000 (GBP) |
Organisation | National Cyber Security Centre |
Sector | Public |
Country | United Kingdom |
Start | 02/2019 |
End | 07/2025 |
Description | CyberHelper - CyberASAP Phase 1 |
Amount | £32,000 (GBP) |
Organisation | Department for Digital, Culture, Media & Sport |
Sector | Public |
Country | United Kingdom |
Start | 03/2020 |
End | 07/2020 |
Description | CyberHelper - CyberASAP Phase 2 |
Amount | £60,000 (GBP) |
Organisation | Department for Digital, Culture, Media & Sport |
Sector | Public |
Country | United Kingdom |
Start | 08/2020 |
End | 02/2021 |
Description | Cyberkit4SME |
Amount | € 391,305,238 (EUR) |
Organisation | European Commission H2020 |
Sector | Public |
Country | Belgium |
Start | 03/2020 |
End | 03/2023 |
Description | Robust Cyber Security Framework for Longitudinal Smart Energy Monitoring Device Data |
Amount | £38,275 (GBP) |
Organisation | UK-India Education and Research Initiative (UKIERI) |
Sector | Academic/University |
Country | United Kingdom |
Start | 05/2018 |
End | 06/2020 |
Description | Scalability & security of blockchain technology |
Amount | £112,000 (GBP) |
Organisation | National Cyber Security Centre |
Sector | Public |
Country | United Kingdom |
Start | 08/2018 |
End | 07/2021 |
Title | IoT Smart Home Attack Network Traces |
Description | IoT Smart Home Attack Network Traces |
Type Of Material | Database/Collection of data |
Year Produced | 2018 |
Provided To Others? | No |
Impact | Used by BSc and MSc students for their projects. |
Description | Collaboration with Duke University Center for Computational Evolutionary Intelligence, led by Professor Yiran Chen and Professor Hai Li from Duke University, USA |
Organisation | Duke University |
Country | United States |
Sector | Academic/University |
PI Contribution | Contribution to our research collaboration and international outreach in cyber security |
Collaborator Contribution | contribution to research and outreach in cyber security |
Impact | research collaboration underway |
Start Year | 2020 |
Description | Collaboration with Institute for Industrial Informatics, Automation and Robotics, University of Applied Sciences Emden/Leer, led by Professor Armando Walter Colombo, Germany |
Organisation | University of Applied Sciences Emden / Leer |
Country | Germany |
Sector | Academic/University |
PI Contribution | Contribution to our research collaboration and international outreach in cyber security |
Collaborator Contribution | contribution to research and outreach in cyber security |
Impact | research collaboration underway |
Start Year | 2020 |
Description | Collaboration with Memory System and IoT Laboratory, City University of Hong Kong, led by Professor Tei-Wei Kuo, Hong Kong, P.R. China |
Organisation | City University of Hong Kong |
Country | Hong Kong |
Sector | Academic/University |
PI Contribution | Contribution to our research collaboration and international outreach in cyber security |
Collaborator Contribution | contribution to research and outreach in cyber security |
Impact | research collaboration underway |
Start Year | 2020 |
Description | Collaboration with Northwestern Design Automation of Intelligent Systems Lab, led by Professor Qi Zhu from Northwestern University, USA |
Organisation | Northwestern University |
Country | United States |
Sector | Academic/University |
PI Contribution | Contribution to our research collaboration and international outreach in cyber security |
Collaborator Contribution | contribution to research and outreach in cyber security |
Impact | research collaboration underway |
Start Year | 2020 |
Description | Collaboration with Zhejiang University, P.R. China, International Joint Laboratory of Cyber-Physical System Intelligence and Security, directed by Professor Qiang Yang (Zhejiang University) |
Organisation | Zhejiang University |
Country | China |
Sector | Academic/University |
PI Contribution | Contribution to our research collaboration and international outreach (planned exchange program for academic staff and students) in cyber security |
Collaborator Contribution | contribution to research and outreach in cyber security |
Impact | research collaboration underway |
Start Year | 2021 |
Description | Cyber Security Academy |
Organisation | Defence Science & Technology Laboratory (DSTL) |
Country | United Kingdom |
Sector | Public |
PI Contribution | identification of research needs in cyber security |
Collaborator Contribution | Contribution to our research, education, outreach in cyber security |
Impact | contribution to research education outreach in cyber security |
Start Year | 2015 |
Description | Cyber Security Academy |
Organisation | Defence Science & Technology Laboratory (DSTL) |
Country | United Kingdom |
Sector | Public |
PI Contribution | The academy was re-established in 2021 as a hub for training and consultancy services. |
Collaborator Contribution | DSTL |
Impact | It is has since, organised a workshop for the local cyber companies (50+ attendees), two series of research seminars (15 speakers external speakers on topics related to security, AI and hardware ), developed and delivered two set of CPD security training courses. |
Start Year | 2021 |
Description | Cyber Security Academy |
Organisation | Northrop Grumman |
Country | United States |
Sector | Private |
PI Contribution | identification of research needs in cyber security |
Collaborator Contribution | Contribution to our research, education, outreach in cyber security |
Impact | contribution to research education outreach in cyber security |
Start Year | 2015 |
Description | Cyber Security Academy |
Organisation | Roke Manor Research Ltd. |
Country | United Kingdom |
Sector | Private |
PI Contribution | identification of research needs in cyber security |
Collaborator Contribution | Contribution to our research, education, outreach in cyber security |
Impact | contribution to research education outreach in cyber security |
Start Year | 2015 |
Description | Eastleigh college for an Internship program |
Form Of Engagement Activity | Participation in an open day or visit at my research institution |
Part Of Official Scheme? | No |
Geographic Reach | Local |
Primary Audience | Schools |
Results and Impact | We wanted to create a quick reward learning experience for ages 16-18. We also wanted to create an experience that builds habits which will continue to empower students after the end of the internship. Therefore, we created a five-day internship program. The internship was designed using gamification approach, the tasks required a minimal attention span. The tasks had quick learning objectives which meant the students will continue to get rewarded for completing the tasks. This activity ran twice in 2019. |
Year(s) Of Engagement Activity | 2019 |
Description | Guest Lecture on Hardware Security |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Postgraduate students |
Results and Impact | The aim of this activity is to build collaboration with Synopsis Armenia , a leading company in hardware security. The lectures have been attended by 80 students and engineers. |
Year(s) Of Engagement Activity | 2021,2022 |
Description | Guest Lecture on PUF |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | The aim of the talk was to build links with the UK-SPS community |
Year(s) Of Engagement Activity | 2021 |
URL | https://www.youtube.com/watch?v=B0BkB2V0EAI |
Description | Guest Lecture on Secure PUF |
Form Of Engagement Activity | A formal working group, expert panel or dialogue |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Professional Practitioners |
Results and Impact | The aim of the talk was to build research links with the anti-tamper design community. It was sponsored by the NATO |
Year(s) Of Engagement Activity | 2021 |
URL | https://events.sto.nato.int/index.php/event-summary/download.file/2197 |
Description | Higher Education Cyber Security Challenge (HECC) |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Undergraduate students |
Results and Impact | Over 100 students from Ace universities across the country came to Southampton for the day, to take part in HECC. A day of competing against one another in teams to win prizes. It was good for the ACE network, it received national and regional ,media coverage and radio interviews and excellent feedback. |
Year(s) Of Engagement Activity | 2019 |
URL | http://hecc.io |
Description | Invited Speaker, Hardware Supply Chain Security Threat Analysis, and emerging countermeasures |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Undergraduate students |
Results and Impact | This was a lecturer given to the Armenia Educational Department, Armenia, March 2023 |
Year(s) Of Engagement Activity | 2023 |
Description | Invited Speaker, Hardware Supply Chain Security Threat Analysis, and emerging countermeasures |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Industry/Business |
Results and Impact | This was delivered as part of the third-Party & Supply Chain Cyber Security, Summit, Amsterdam, The Netherlands, 2022 |
Year(s) Of Engagement Activity | 2022 |
Description | Invited Speaker, Hardware Supply Chain Security Threat Analysis, and emerging countermeasures |
Form Of Engagement Activity | A talk or presentation |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Industry/Business |
Results and Impact | This was delivered as part of Supply Chain Risk and Resilience Forum - Berlin 2023 |
Year(s) Of Engagement Activity | 2023 |
Description | several media and radio interviews |
Form Of Engagement Activity | A press release, press conference or response to a media enquiry/interview |
Part Of Official Scheme? | No |
Geographic Reach | International |
Primary Audience | Media (as a channel to the public) |
Results and Impact | radio and media interviews on cyber security matters. |
Year(s) Of Engagement Activity | 2014,2015,2016 |