Computer Security & Software Verification Lab


About

The Computer Security and Software Verification Lab seeks to conduct cutting edge research in the specific areas of cyber security such as steganography, authentication, privacy, computational cryptography and security verification. Each of these areas has its own aims (Table 1). To ensure that the results of the research will reach the relevant academic communities, we strive to disseminate them in recognized publications (Table 2). Besides that, the results will also be communicated in specific subjects offered by this lab (Table 3).


Members


Head of Lab
Prof. Dr. Zarina Shukur
Members
Assoc. Prof.Dr. Ravie Chandren a/l Muniyandi
Dr. Rossilawati Sulaiman
Dr. Mohd Rosmadi Mokhtar

Video


Research Focus


Table 1: Research Aims


Research Areas

Aims

Steganography

The aim of this research is to find new algorithms that can hide various types of secret messages in multimedia carriers. The algorithm shall improve steganography requirements; capacity, transparency and robustness as dimensions of quality.   

Authentication

The aim of this research is to find new methods, protocols or techniques that can authenticate someone or something, with usability, efficiency and security as dimensions of quality.

Privacy

The aim of this research is to find new methods or techniques to secure personal data so that only authorize users can have access to the data. The methods should be easy to use, efficient and resist against malicious attacks.

Computational Cryptography

The aim of this research is to find new computational algorithms of existing cryptography mathematical models, with time and/or space complexity as dimensions of quality.

Applied Security Verification

The aim of this research is to prove mathematically that algorithms, methods or techniques satisfy some security properties aided by an automated proving tool. In this research, the findings will be in a form of mathematical theorem. Furthermore, the aesthetics view (trivial, difficult, deep or beautiful) of the theorem is an additional knowledge.

Software Security

The aim of this research is to find a new way to protect software against attacks. The findings must maintain the software efficiency, yet secure the software. It should also be systematic and applicable.


Related Publisher


Table 2: Related Publisher (April 2020)

Rank

Specific

Q1

General computing

Q2

General computing

Q3

  • Elsevier Journal of Information Security  and Applications
  • IEEE Security and Privacy
  • IET Information Security
  • Information and Computer Security Journal
  • International Journal of Information Security         

Q4

  • ACM Transactions on Privacy and Security
  • Security and Communication Networks
  • Malaysian Journal of Computer Science

Scopus

  • Journal of Cybersecurity

MyCite

General computing


Subjects Offered


Table 3: Subjects offered

Level

Subject

Postgraduate Subjects

1. TTTX6114 Computer Security
2. TTTX6124 Network Security 
3. TTTX6234 Software Security
4. TTTX6334 Digital Banking and Financial Services
5. TTTX6344 Financial Technology Security and Risk

Undergraduate Subjects

TTTK2223 Theory of Computer Science
TTTN3513 Computer and Network security
TTTN4133 WAN Technology
TTTK2103 Computer Network Technology