Academic Centre of Excellence in Cyber Security Research - University of Southampton

Lead Research Organisation: University of Southampton
Department Name: Sch of Electronics and Computer Sci

Abstract

Cyber security is ultimately about devices and people, which together give rise to a 'cyberspace' of networks and systems. Vulnerabilities arise from hardware, software and human factors, but typically from any combination of them. Our interdisciplinary approach affords us expertise over a significant number of such combinations. We deliver a wide spectrum of interwoven research ranging from electronic (nano) devices to (physical and cyber) biometrics, passing through world-leading research on cyber-enabling infrastructures using behavioural and cognitive psychology, and deploying both formal and experimental methods.

We work on secure hardware devices such as data-secure sanitisable memories, embedded security and trusted hardware, their secure formal design and verification, and fabrication in our state-of-the-art cleanrooms. This links to (mission-critical, multi-clearance) software systems, whose design and validation builds on our expertise in language-based security. Mathematical models and static analysis techniques are also used for privacy systems, whose ultimate goal is to drive the design of data-confinement and privacy-enhancing web applications, online protocols and analysis tools. Of a similar goal-driven nature is our research on trust-and-reputation models, aimed at exploiting mutual trust mechanisms in agent communities to meet collaborative goals in the absence of reliable information.

Agents systems link to secure services and information risk management over advanced networks and provide the basis for cutting-edge research on situational awareness. The latter extends to ad-hoc networks of practical operational relevance, such as the integration of human-agent teams. This establishes a synergy with our behavioural and cognitive scientists, who focus on the analysis of patterns of cyber-behaviour and group decision-making and risk behaviour.

Our work on the security of critical infrastructures concerns cyber-physical and industrial control systems, financial trading, and the web. It includes IoT, the power grid, building automation, clouds, distributed ledgers, the analysis of cyber controls and of human factors affecting response time to cyber-attacks in financial trading markets. We also focus on access control, attack visualisation, linked-data (de-)anonymisation and provenance. A theme of growing importance concerns users' (web) identities. This builds on foundational work on cryptoprotocols, and provides a strong connection between our computer and social sciences researchers, in particular through the issues of (un-linkable) identities, super-identities, and the work on privacy and cyber-crime legislation. Finally, we mention our seminal work on biometrics for access control based on physical and cyber individual characteristics.

The present proposal aims at securing a support grant for the centre. Specifically, we seek funds to: support the Director in the organisation and daily running of the centre; run a series of seminars in Cyber Security; foster multidisciplinary activities; participate in networking events with other ACE-CSRs and host a national ACE-CSR workshop; run outreach, public engagement and industrial liaison events; revamp our web portal; print and distribute brochures and publicity material.

Planned Impact

During the past five years we have produced huge change and progress in the ACE-CSR through interdisciplinary research and significant results backed by external funding and investment. We have established a vibrant cyber security community across campus, forging stable working links between colleagues from four distinct faculties; engaged in externally-funded, high-quality research and outreach activities with GCHQ, FCO, NCA, Bank of England, the Metropolitan and Hampshire Police forces, and the South East Regional Cyber Crime Unit (SEROCU); and built a Cyber Security Academy (CSA). The CSA is a partnership between the University and industry leaders -currently DSTL, Northrop-Grumman, Roke Manor- and arguably the first instance of HMR's CyberInvest scheme in the country. Its objectives span from research and consultancy to outreach, training and knowledge transfer. Fig. 1 shows the ACE- CSR acting as the founding stone for the partnership, which then unfolds through six, outward-looking components.

There can be no doubt that the ACE-CSR is changing the University. It is helping reshape the University by inspiring the creation of a new research group in cyber security, a new institute in international security, and three degrees of studies. It afforded us the opportunity to forge thriving links with industry and to embed industrial influence through the awarding of visiting professorships to the CSA partners' leaders. The ACE-CSR's impact on the UK cyber security landscape is unfolding through our research on the security of Cyber Essentials, effective anonymisation, smart meters, CPS, blockchains as a computational infrastructure, hardware security and the IoT. Project CASTLE involving penetration testing of campus facilities by students exemplifies a thriving environment where research is quickly fed into postgraduate training and teaching. Renewing the recognition of our status in the national cyber security academic network will go a long way towards helping us consolidate and complete this transformation.
 
Description We are working to enhance cyber security at large, and finding specific applications to public administrations and industry. For the former, our key finding at the moment of writing is the applicability of distributed ledger technologies. Next, we plan to expand our research to application domains such as the IoT and smart grids. We are also developing a substantial programme of professional training that we expect will benefit industry.

The difficulty and comprehensiveness of the challenges arising from cyber security. There several things that we understand pretty well, but we are yet to bridge the gaps between theoretical understanding, practical realisation and real-world deployment. There are also are so many things that we don't yet understand even theoretically. In the final two years of the grants we applied a step change to our approach, funded the Southampton Cyber Security Academy, and grew our research group and our portfolio of grants and research achievements. I am satisfied with the work, and believe that the objects have all been met.
Exploitation Route Our main finding at this moment is the applicability of distributed ledger technologies to problems in the public administration sphere. The next phase of our research will be to expand those findings to other application domains, including the IoT. We are now exploring the application of AI and machine learning to cyber security, and the initial response is very promising. Look forward to future work with excitement.
Sectors Digital/Communication/Information Technologies (including Software),Education,Energy,Financial Services, and Management Consultancy,Government, Democracy and Justice

 
Description The project started just recently, we are continuing to grow our Cyber Security Academy, which uses our research findings for industry collaboration and impact and outreach. Most notably, to our work we are finding solutions to problems in the public sector domain, including taxation, police and administration. Our next domain of interest is the IoT and energy, with particular focus on smart grids. We are using our findings is several realistic scenarios, in partnership with real-world actors from industry, government, law enforcement and the real world. It is still early to draw any conclusions and report, since we're not even yet half way through the grant. In the final part of the grant we develop significant collaboration with government departments and public services across Europe, most notably the UK, Malta and Italy. Our engagement with the public sector is ongoing, and is currently focusing on the development and applications of distributed ledger technologies. On the basis of the research and activities from this project, we have expanded and currently continue to expand our network of industry partners, our programme of training for professionals as well as our engagement with the cyber community at large. Thanks to the outcomes of this project, Southampton has developed a model of work with government, industry and academic which is coming to be recognised as our approach to cyber security
First Year Of Impact 2016
Sector Digital/Communication/Information Technologies (including Software),Energy,Government, Democracy and Justice
Impact Types Societal,Policy & public services

 
Description Member of the Biometrics and Forensics Ethics Group
Geographic Reach National 
Policy Influence Type Participation in a guidance/advisory committee
Impact The Biometrics and Forensics Ethics Group - BFEG - advises across the home office and at request across wider government and law enforcement activities. The group's yearly activity is partially laid out by the Home Office and partly by the interests of the members. The group minutes and reports are published where possible on the Home Office BFEG group webpage
URL https://www.gov.uk/government/organisations/biometrics-and-forensics-ethics-group
 
Description Member of the Policing Science Council
Geographic Reach Europe 
Policy Influence Type Participation in a guidance/advisory committee
 
Description Ministry of Finance (Italy).
Geographic Reach Europe 
Policy Influence Type Influenced training of practitioners or researchers
 
Description South East Regional Crime Unit
Geographic Reach Local/Municipal/Regional 
Policy Influence Type Participation in a guidance/advisory committee
 
Description influence of cybercrime policing
Geographic Reach National 
Policy Influence Type Influenced training of practitioners or researchers
 
Description A development methodology for cyber secure safety control systems
Amount £112,000 (GBP)
Organisation National Cyber Security Centre 
Sector Public
Country United Kingdom
Start 10/2019 
End 09/2025
 
Description Artificial Intelligence-enhanced design for secure, anti-tamper embedded devices.
Amount £86,000 (GBP)
Organisation Royal Academy of Engineering 
Sector Charity/Non Profit
Country United Kingdom
Start 09/2020 
End 08/2022
 
Description Automated analysis of threats and countermeasures for SME's to feed into cyber essentials
Amount £112,000 (GBP)
Organisation National Cyber Security Centre 
Sector Public
Country United Kingdom
Start 02/2019 
End 07/2025
 
Description CyberHelper - CyberASAP Phase 1
Amount £32,000 (GBP)
Organisation Department for Digital, Culture, Media & Sport 
Sector Public
Country United Kingdom
Start 04/2020 
End 07/2020
 
Description CyberHelper - CyberASAP Phase 2
Amount £60,000 (GBP)
Organisation Department for Digital, Culture, Media & Sport 
Sector Public
Country United Kingdom
Start 09/2020 
End 02/2021
 
Description Cyberkit4SME
Amount € 391,305,238 (EUR)
Organisation European Commission H2020 
Sector Public
Country Belgium
Start 03/2020 
End 03/2023
 
Description Robust Cyber Security Framework for Longitudinal Smart Energy Monitoring Device Data
Amount £38,275 (GBP)
Organisation UK-India Education and Research Initiative (UKIERI) 
Sector Academic/University
Country United Kingdom
Start 06/2018 
End 06/2020
 
Description Scalability & security of blockchain technology
Amount £112,000 (GBP)
Organisation National Cyber Security Centre 
Sector Public
Country United Kingdom
Start 09/2018 
End 07/2021
 
Title IoT Smart Home Attack Network Traces 
Description IoT Smart Home Attack Network Traces 
Type Of Material Database/Collection of data 
Year Produced 2018 
Provided To Others? No  
Impact Used by BSc and MSc students for their projects. 
 
Description Collaboration with Duke University Center for Computational Evolutionary Intelligence, led by Professor Yiran Chen and Professor Hai Li from Duke University, USA 
Organisation Duke University
Country United States 
Sector Academic/University 
PI Contribution Contribution to our research collaboration and international outreach in cyber security
Collaborator Contribution contribution to research and outreach in cyber security
Impact research collaboration underway
Start Year 2020
 
Description Collaboration with Institute for Industrial Informatics, Automation and Robotics, University of Applied Sciences Emden/Leer, led by Professor Armando Walter Colombo, Germany 
Organisation University of Applied Sciences Emden / Leer
Country Germany 
Sector Academic/University 
PI Contribution Contribution to our research collaboration and international outreach in cyber security
Collaborator Contribution contribution to research and outreach in cyber security
Impact research collaboration underway
Start Year 2020
 
Description Collaboration with Memory System and IoT Laboratory, City University of Hong Kong, led by Professor Tei-Wei Kuo, Hong Kong, P.R. China 
Organisation City University of Hong Kong
Country Hong Kong 
Sector Academic/University 
PI Contribution Contribution to our research collaboration and international outreach in cyber security
Collaborator Contribution contribution to research and outreach in cyber security
Impact research collaboration underway
Start Year 2020
 
Description Collaboration with Northwestern Design Automation of Intelligent Systems Lab, led by Professor Qi Zhu from Northwestern University, USA 
Organisation Northwestern University
Country United States 
Sector Academic/University 
PI Contribution Contribution to our research collaboration and international outreach in cyber security
Collaborator Contribution contribution to research and outreach in cyber security
Impact research collaboration underway
Start Year 2020
 
Description Collaboration with Zhejiang University, P.R. China, International Joint Laboratory of Cyber-Physical System Intelligence and Security, directed by Professor Qiang Yang (Zhejiang University) 
Organisation Zhejiang University
Country China 
Sector Academic/University 
PI Contribution Contribution to our research collaboration and international outreach (planned exchange program for academic staff and students) in cyber security
Collaborator Contribution contribution to research and outreach in cyber security
Impact research collaboration underway
Start Year 2021
 
Description Cyber Security Academy 
Organisation Defence Science & Technology Laboratory (DSTL)
Country United Kingdom 
Sector Public 
PI Contribution identification of research needs in cyber security
Collaborator Contribution Contribution to our research, education, outreach in cyber security
Impact contribution to research education outreach in cyber security
Start Year 2015
 
Description Cyber Security Academy 
Organisation Northrop Grumman
Country United States 
Sector Private 
PI Contribution identification of research needs in cyber security
Collaborator Contribution Contribution to our research, education, outreach in cyber security
Impact contribution to research education outreach in cyber security
Start Year 2015
 
Description Cyber Security Academy 
Organisation Roke Manor Research Ltd.
Country United Kingdom 
Sector Private 
PI Contribution identification of research needs in cyber security
Collaborator Contribution Contribution to our research, education, outreach in cyber security
Impact contribution to research education outreach in cyber security
Start Year 2015
 
Description Eastleigh college for an Internship program 
Form Of Engagement Activity Participation in an open day or visit at my research institution
Part Of Official Scheme? No
Geographic Reach Local
Primary Audience Schools
Results and Impact We wanted to create a quick reward learning experience for ages 16-18. We also wanted to create an experience that builds habits which will continue to empower students after the end of the internship. Therefore, we created a five-day internship program. The internship was designed using gamification approach, the tasks required a minimal attention span. The tasks had quick learning objectives which meant the students will continue to get rewarded for completing the tasks. This activity ran twice in 2019.
Year(s) Of Engagement Activity 2019
 
Description Guest Lecture on Hardware Security 
Form Of Engagement Activity A talk or presentation
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Postgraduate students
Results and Impact The aim of this activity is to build collaboration with Synopsis Armenia , a leading company in hardware security. The lectures have been attended by 80 students and engineers.
Year(s) Of Engagement Activity 2021,2022
 
Description Guest Lecture on PUF 
Form Of Engagement Activity A talk or presentation
Part Of Official Scheme? No
Geographic Reach National
Primary Audience Professional Practitioners
Results and Impact The aim of the talk was to build links with the UK-SPS community
Year(s) Of Engagement Activity 2021
URL https://www.youtube.com/watch?v=B0BkB2V0EAI
 
Description Guest Lecture on Secure PUF 
Form Of Engagement Activity A formal working group, expert panel or dialogue
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Professional Practitioners
Results and Impact The aim of the talk was to build research links with the anti-tamper design community. It was sponsored by the NATO
Year(s) Of Engagement Activity 2021
URL https://events.sto.nato.int/index.php/event-summary/download.file/2197
 
Description Higher Education Cyber Security Challenge (HECC) 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? No
Geographic Reach National
Primary Audience Undergraduate students
Results and Impact Over 100 students from Ace universities across the country came to Southampton for the day, to take part in HECC. A day of competing against one another in teams to win prizes. It was good for the ACE network, it received national and regional ,media coverage and radio interviews and excellent feedback.
Year(s) Of Engagement Activity 2019
URL http://hecc.io
 
Description several media and radio interviews 
Form Of Engagement Activity A press release, press conference or response to a media enquiry/interview
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Media (as a channel to the public)
Results and Impact radio and media interviews on cyber security matters.
Year(s) Of Engagement Activity 2014,2015,2016