Computer Security & Software Verification Lab
About
The Computer Security and Software Verification Lab seeks to conduct cutting edge research in the specific areas of cyber security such as steganography, authentication, privacy, computational cryptography and security verification. Each of these areas has its own aims (Table 1). To ensure that the results of the research will reach the relevant academic communities, we strive to disseminate them in recognized publications (Table 2). Besides that, the results will also be communicated in specific subjects offered by this lab (Table 3).
Members
Head of Lab |
Prof. Dr. Zarina Shukur |
Members |
Assoc. Prof.Dr. Ravie Chandren a/l Muniyandi |
Dr. Rossilawati Sulaiman |
Dr. Mohd Rosmadi Mokhtar |
Video
Research Focus
Table 1: Research Aims
Research Areas |
Aims |
Steganography |
The aim of this research is to find new algorithms that can hide various types of secret messages in multimedia carriers. The algorithm shall improve steganography requirements; capacity, transparency and robustness as dimensions of quality. |
Authentication |
The aim of this research is to find new methods, protocols or techniques that can authenticate someone or something, with usability, efficiency and security as dimensions of quality. |
Privacy |
The aim of this research is to find new methods or techniques to secure personal data so that only authorize users can have access to the data. The methods should be easy to use, efficient and resist against malicious attacks. |
Computational Cryptography |
The aim of this research is to find new computational algorithms of existing cryptography mathematical models, with time and/or space complexity as dimensions of quality. |
Applied Security Verification |
The aim of this research is to prove mathematically that algorithms, methods or techniques satisfy some security properties aided by an automated proving tool. In this research, the findings will be in a form of mathematical theorem. Furthermore, the aesthetics view (trivial, difficult, deep or beautiful) of the theorem is an additional knowledge. |
Software Security |
The aim of this research is to find a new way to protect software against attacks. The findings must maintain the software efficiency, yet secure the software. It should also be systematic and applicable. |
Related Publisher
Table 2: Related Publisher (April 2020)
Rank |
Specific |
Q1 |
General computing |
Q2 |
General computing |
Q3 |
|
Q4 |
|
Scopus |
|
MyCite |
General computing |
Subjects Offered
Table 3: Subjects offered
Level |
Subject |
Postgraduate Subjects |
1. TTTX6114 Computer Security |
Undergraduate Subjects |
TTTK2223 Theory of Computer Science |