"Good research comes from tackling real problems."
"Good research is done with a shovel not with tweezers."
--- Roger Needham

Research team

Who are we

Current members

  1. Dr Feng Hao (PI) - PhD, University of Cambridge
  2. Dr Dylan Clarke (RA) - PhD, Newcastle University
  3. Dr Samiran Bag (RA) - PhD, Indian Statistical Institute
  4. Muhammad Ajmal Azad - PhD, University of Porto
  5. Maryam Mehrnezhad (Research fellow)
  6. Patrick McCorry (PhD student)
  7. Ehsan Toreini (PhD student)
  8. Raffaello Perrotta (PhD student)

PhD graduates

Alumni

Visitors in the past

  • Prof Xun Yi (Feb, 2014)
  • Carlos Vegas (Sep-Oct, 2013)

What we work on

Any security or cryptographic problems that really matter in practice. Check out our Security Research Wiki and our blog Security Upon Tyne.

Research highlights (from 2012)

In terms of publication, the tradition in our team is to list authors according to their contributions with the first author being the leading researcher.

2016

YearProjectResearcher(s)Output
2016 Removing Trusted Tallying Authorities Patrick McCorry, Ehsan Toreini, Maryam Mehrnezhad School Technical Report (ranked 3rd in 2016 Economist Cybersecurity challenge)
2016 Decentralized Privacy-Aware Collaborative Filtering of Smart Spammers in a Telecommunication Network Muhammad Ajmal Azad, Samiran Bag ACM SAC 2017
2016 An End-to-End Secure Chat App for iOS Based on J-PAKE Renu Raj (MSc) JPAKEChatApp (Github)
2016 DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities Siamak F. Shahandashti and Feng Hao ESORICS 2016
2016 Stealing PINs via Mobile Sensors: Actual Risk versus User Perception Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti and Feng Hao EuroUSEC 2016
2016 Towards Bitcoin Payment Networks Patrick McCorry, Malte Möser, Siamak F. Shahandasti, and Feng Hao ACISP 2016
2016 Real-World Electronic Voting: Design, Analysis and Deployment Feng Hao and Peter Ryan (Eds) Book published by CRC Press
2016 DRE-i and Self-Enforcing E-Voting Feng Hao A contributing book chapter of "Real-World Electronic Voting: Design, Analysis and Deployment"
2016 Theoretical Attacks on E2E Voting Systems Peter Hyun-Jeen Lee and Siamak Shahandashti A contributing book chapter of "Real-World Electronic Voting: Design, Analysis and Deployment"
2016 An Overview of End-to-End Verifiable Voting Systems Syed Taha Ali and Judy Murray A contributing book chapter of "Real-World Electronic Voting: Design, Analysis and Deployment"
2016 E-voting in Estonia Dylan Clarke and Tarvi Martens A contributing book chapter of "Real-World Electronic Voting: Design, Analysis and Deployment"
2016 Electoral Systems Used around the World Siamak F. Shahandashti A contributing book chapter of "Real-World Electronic Voting: Design, Analysis and Deployment"

2015

YearProjectResearcher(s)Output
2015 Refund Attacks on Bitcoin's Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao FC'16
2015 TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensors via JavaScript Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao Eselvier JISA
2015 Tap-Tap and Pay (TTP): Preventing The Mafia Attack in NFC Payment Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti SSR'15
2015 Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke and Feng Hao SSR'15
2015 The Nuts and Bolts of Conspiracy Theories - and what they may be telling us about ourselves Syed Taha Ali Decepticon, 2015
2015 Deleting Secret Data with Public Verifiability Feng Hao, Dylan Clarke and Avelino Zorzo IEEE TDSC, in press, 2015
2015 The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group Feng Hao, Xun Yi, Liqun Chen and Siamak Shahandashti ASIACCS workshop on IoT Privacy, Trust, and Security (IoTPST'15), Singapore
2015 TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript Maryam Mehrnezhad, Ehsan Toreini, Siamak Shahandashti and Feng Hao Accepted as a poster (with one page abstract included in the proceedings) by ASIACCS'15, Singapore
2015 Bitcoin: Perils of an Unregulated Global P2P Currency ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Dylan Clarkey and Patrick McCorry SPW'15, Cambridge

2014

YearProjectResearcher(s)Output
2014 ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee and Feng Hao the 2nd Workshop on Bitcoin Research, 2015
2014 Secure end-to-end communication between mobile phones Jack Hindmarch (BSc) Free E2E Messenger published at Google Play
2014 The SPEKE Protocol Revisited Feng Hao and Siamak Shahandashti SSR'14; attacks discussed and acknowledged by ISO SC27 Working Group 2 and revision of SPEKE in ISO/IEC 11770-4 in process.
2014 Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting Feng Hao, Matthew Kreeger, Brian Randell, Dylan Clarke, Siamak Shahandashti and Peter Lee Published by USENIX Journal of Election Technology and Systems, 2014.
2014 New special issue on "Security and Privacy in Cloud Computing" Feng Hao, Xun Yi and Elisa Bertino Call for papers
2014 New book proposal on "real-world e-voting" Feng Hao and Peter Ryan Accepted; book to be published in 2015/2016
2014 Including J-PAKE in ISO/IEC 11770-4 Feng Hao Initial proposal accepted by ISO/IEC; revision of ISO/IEC 11770-4 in process.

2013

YearProjectResearcher(s)Output
2013 Draft standard specification for J-PAKE Feng Hao Internet draft submitted to IETF (Author F. Hao)
2013 Draft standard specification for Schnorr signature Feng Hao Internet draft submitted to IETF (Author: F Hao)
2013 Powerpoint plugin for a verifiable classroom voting system Ehsan Toreini A free Powerpoint plugin program for Windows with full open source code
2013 Cryptanalysis of a dragonfly key exchange protocol (submitted to IETF) Dylan Clarke, Feng Hao Journal paper published by IET Information Security, 2014
2013 Pedagogical trials of using DRE-i for classroom voting Feng Hao, Dylan Clarke, Carlton Shepherd Workshop paper in SPW'13

2012

YearProjectResearcher(s)Output
2012 Android voting client for a verifiable classroom voting system Carlton Shepherd (BSc) Free Anroid app in Goolge Play
2012 iPhone voting client for a verifiable classroom voting system Dylan Clarke Free iPhone app in Apple Store
2012 Security analysis of private browsing Kiavash Satvat (MSc), Matthew Forshaw, Feng Hao and Ehsan Toreini Workshop paper in DPM'13; Journal version accepted by Elsevier JISA; open source code here
2012 Preliminary trials of using DRE-i for remote voting Feng Hao, Dylan Clarke, Brian Randell Workshop paper in SPW'12
2012 Analysis of e-voting in the UK Dylan Clarke, Feng Hao, Brian Randell Workshop paper in SPW'12
2012 Cryptanalysis of a multi-factor key exchange protocol (published in ACNS'08) Feng Hao, Dylan Clarke Conference paper in ACNS'12
2012 Robust public key based authenticated key exchange (the YAK protocol) Feng Hao Journal paper in Wiley SCN (Author: F. Hao). An earlier conference short paper appeared in FC'10.

Acknowledgement

The research is kindly supported by several funding sponsors.