Computer Security & Software Verification Lab


The Computer Security and Software Verification Lab seeks to conduct cutting edge research in the specific areas of cyber security such as steganography, authentication, privacy, computational cryptography and security verification. Each of these areas has its own aims (Table 1). To ensure that the results of the research will reach the relevant academic communities, we strive to disseminate them in recognized publications (Table 2). Besides that, the results will also be communicated in specific subjects offered by this lab (Table 3).


Head of Lab
Prof. Dr. Zarina Shukur
Assoc. Prof.Dr. Ravie Chandren a/l Muniyandi
Dr. Rossilawati Sulaiman
Dr. Mohd Rosmadi Mokhtar


Research Focus

Table 1: Research Aims

Research Areas



The aim of this research is to find new algorithms that can hide various types of secret messages in multimedia carriers. The algorithm shall improve steganography requirements; capacity, transparency and robustness as dimensions of quality.   


The aim of this research is to find new methods, protocols or techniques that can authenticate someone or something, with usability, efficiency and security as dimensions of quality.


The aim of this research is to find new methods or techniques to secure personal data so that only authorize users can have access to the data. The methods should be easy to use, efficient and resist against malicious attacks.

Computational Cryptography

The aim of this research is to find new computational algorithms of existing cryptography mathematical models, with time and/or space complexity as dimensions of quality.

Applied Security Verification

The aim of this research is to prove mathematically that algorithms, methods or techniques satisfy some security properties aided by an automated proving tool. In this research, the findings will be in a form of mathematical theorem. Furthermore, the aesthetics view (trivial, difficult, deep or beautiful) of the theorem is an additional knowledge.

Software Security

The aim of this research is to find a new way to protect software against attacks. The findings must maintain the software efficiency, yet secure the software. It should also be systematic and applicable.

Related Publisher

Table 2: Related Publisher (April 2020)




General computing


General computing


  • Elsevier Journal of Information Security  and Applications
  • IEEE Security and Privacy
  • IET Information Security
  • Information and Computer Security Journal
  • International Journal of Information Security         


  • ACM Transactions on Privacy and Security
  • Security and Communication Networks
  • Malaysian Journal of Computer Science


  • Journal of Cybersecurity


General computing

Subjects Offered

Table 3: Subjects offered



Postgraduate Subjects

1. TTTX6114 Computer Security
2. TTTX6124 Network Security 
3. TTTX6234 Software Security
4. TTTX6334 Digital Banking and Financial Services
5. TTTX6344 Financial Technology Security and Risk

Undergraduate Subjects

TTTK2223 Theory of Computer Science
TTTN3513 Computer and Network security
TTTN4133 WAN Technology
TTTK2103 Computer Network Technology