Dr Raja Akram

Dr Raja Akram
Dr Raja Akram
Dr Raja Akram

Phd (Information Security), MSc (Information Security), MSc (Computer Science), BSc (Mathematics, Physics)

Senior Lecturer

About

Biography

I joined the Department of Computer Science as Senior Lecturer in July 2020. 

Previously, I have worked as Post Doctoral research assistant at the Information Security Group (ISG), Royal Holloway, University of London. During my time at ISG, I was involved with the research projects related to Data Control and Compliance, digital avionics, EMV and decentralised payment systems, transport ticketing and mobile contactless transactions. Previously, I have worked as Research Fellow at the Cyber Security Lab, Department of Computer Science, University of Waikato, New Zealand. At the Cyber Security Lab, I am involved with the user centric security and privacy paradigms. Before joining the University of Waikato, I worked as a Senior Research Fellow at Edinburgh Napier University. During my work at the Edinburgh Napier University, I worked on the RatTrap project. The RatTrap project designed a suite of preventive technologies to avoid online fraud - especially in the online affiliate marketing. I got my PhD in Information Security from Royal Holloway, University of London. I completed my MSc Information Security at Royal Holloway, University of London in September 2007. I also have MSc Computer Science from the University of Agriculture, Faisalabad and B.Sc (Mathematics, Physics and Geography) from the University of the Punjab, Lahore.

My current research interests revolve around the user centric applied security and privacy architectures, data ownership and control in a heterogeneous computing environment, security for machine learning and machine learning for security. In addition, I am also interested in smart card security, secure cryptographic protocol design and implementation, smartphone and IoT security, trusted platform architecture, trusted/secure execution environment and security & privacy issues in emerging technologies like blockchain, UAVs/Drone and autonomous vehicles.

Latest Publications

View My Publications

Teaching

Programmes

Publications

Page 1 of 1 Results 1 to 91 of 91

  • Autonomous vehicles: Cybersecurity and privacy challenges and opportunities

    He, H., Ertan, A., Hopcraft, R., Akram, R. N., Mansor, H.
    Cybersecurity in Transport Systems. Hawley, M. (ed.). Institution of Engineering and Technology, pp. 337-375, 39 pages
    Chapters in Books, Reports and Conference Proceedings: Chapters
  • Secure mobile edge server placement using multi-agent reinforcement learning

    Kasi, M. K., Ghazalah, S. A., Akram, R. N., Sauveron, D.
    Electronics (Switzerland), vol. 10, no. 17, 2098
    Contributions to Journals: Articles
  • Multi-objective function-based node-disjoint multipath routing for mobile ad hoc networks

    Velusamy, B., Karunanithy, K., Sauveron, D., Akram, R. N., Cho, J.
    Electronics (Switzerland), vol. 10, no. 15, 1781
    Contributions to Journals: Articles
  • P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time

    Kalbantner, J., Markantonakis, K., Hurley-Smit, D., Akram, R. N., Semal, B.
    Energies, vol. 14, no. 3, 606
    Contributions to Journals: Articles
  • A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

    Semal, B., Markantonakis, K., Akram, R. N., Kalbantner, J.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Return-Oriented Programming on RISC-V

    Jaloyan, G., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K., Naccache, D.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Driverless Vehicle Security for Military Applications

    Bates, N., Akram, R. N.
    Computer Weekly, vol. Jul 2020
    Contributions to Journals: Articles
  • Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems

    Semal, B., Markantonakis, K., Akram, R. N., Kalbantner, J.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z., Watkins, C.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • E-Voting With Blockchain

    Hardwick, F. S., Gioulis, A., Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K., Akram, R. N.
    ACM Transactions on Embedded Computing Systems, vol. 18, no. 3, 26
    Contributions to Journals: Articles
  • Removing epoxy underfill between neighbouring components using acid for component chip-off

    Heckmann, T., McEvoy, J., Markantonakis, K., Akram, R. N., Naccache, D.
    Digital Investigation, vol. 29, pp. 198-209
    Contributions to Journals: Articles
  • Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks

    Semal, B., Markantonakis, K., Akram, R. N.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A Secure and Trusted Channel Protocol for UAVs Fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D., Chaumette, S.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H., Lopez, J., Sauveron, D., Yang, L.
    Future Generation Computer Systems, vol. 80, pp. 417-420
    Contributions to Journals: Articles
  • May the Force Be with You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K., Akram, R. N.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Good Vibrations: artificial ambience-based relay attack detection

    Gurulian, I., Markantonakis, K., Frank, E., Akram, R. N.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K., Panaousis, E.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., Chaumette, S.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K., Chaumette, S.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Provisioning Software with Hardware-Software Binding

    Lee, R. P., Markantonakis, K., Akram, R.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E., Akram, R.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K., Akram, R. N.
    Smart Cards, Tokens, Security and Applications. Mayes, K., Markantonakis, K. (eds.). 2 edition. Springer International Publishing AG, pp. 253-281, 29 pages
    Chapters in Books, Reports and Conference Proceedings: Chapters
  • Multi-Application Smart Card Platforms and Operating Systems

    Markantonakis, K., Akram, R. N.
    Smart Cards, Tokens, Security and Applications. Mayes, K., Markantonakis, K. (eds.). Springer International Publishing AG, pp. 59-92, 34 pages
    Chapters in Books, Reports and Conference Proceedings: Chapters
  • Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N., Markantonakis, K.
    Smart Cards, Tokens, Security and Applications. Mayes, K., Markantonakis, K. (eds.). Springer International Publishing AG, pp. 305-349, 45 pages
    Chapters in Books, Reports and Conference Proceedings: Chapters
  • Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C., Akram, R.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K., Gurulian, I., Xiang, Y. (ed.), Ren, K. (ed.), Feng, D. (ed.)
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P., Chaumette, S., Markantonakis, K., Sauveron, D.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R. P., Markantonakis, K., Akram, R., Sauveron, D., Conchon, E.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Can you call the software in your device firmware?

    Hassan, M., Markantonakis, K., Akram, R.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R., Markantonakis, K., Lopez, J., Fischer-Hübner, S. (ed.), Lambrinoudakis, C.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K., Gurulian, I.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Frank, E., Markantonakis, K., Akram, R., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P., Sauveron, D., Chaumette, S.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P., Sauveron, D., Chaumette, S.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K., Akram, R. N.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Challenges of security and trust of mobile devices as digital avionics component

    Akram, R., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R. P., Markantonakis, K., Akram, R.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Secure Application Execution in Mobile Devices

    Msgna, M., Ferradi, H., Akram, R., Markantonakis, K.
    The New Codebreakers. Ryan, P. A., Naccache, D., Quisquater, J. (eds.). Springer, pp. 417-438, 22 pages
    Chapters in Books, Reports and Conference Proceedings: Chapters
  • Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R., Msgna, M.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags

    Bonnefoi, P., Dusart, P., Sauveron, D., Akram, R., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K., Sauveron, D., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K., Sauveron, D.
    Journal of Information Science, vol. 321, pp. 150-161
    Contributions to Journals: Articles
  • Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Challenges of security and trust in Avionics Wireless Networks

    Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seem, A., Atkinson, R.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Digital Trust - Trusted Computing and Beyond A Position Paper

    Akram, R. N., Ko, R. K. L.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager

    Akram, R. N., Markantonakis, K., Sauveron, D.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Unified Model for Data Security -- A Position Paper

    Akram, R. N., Ko, R. K. L.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N., Ko, R. K. L.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Rethinking the Smart Card Technology

    Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • An Introduction to Java Card Programming

    Akram, R. N., Markantonakis, K., Mayes, K.
    Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K., Mayes, K. (eds.). Springer, pp. 497-513, 17 pages
    Chapters in Books, Reports and Conference Proceedings: Chapters
  • An Introduction to the Trusted Platform Module and Mobile Trusted Module

    Akram, R. N., Markantonakis, K., Mayes, K.
    Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K., Mayes, K. (eds.). Springer, pp. 71-93, 23 pages
    Chapters in Books, Reports and Conference Proceedings: Chapters
  • Consumer-Centric Protection for Online Social Networks

    Akram, R. N., Ko, R. K. L., Law, T. F.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K., Akram, R. N.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Smart Cards: State-of-the-Art to Future Directions, Invited Paper

    Akram, R. N., Markantonakis, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K., Mayes, K., Chow, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K., Mayes, K.
    Liverpool, United Kingdom: IEEE Computer Society Press.
    Other Contributions: Other Contributions
  • Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K., Mayes, K.
    .
    Other Contributions: Other Contributions
  • A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N.
    469 pages
    Books and Reports: Commissioned Reports
  • Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K., Mayes, K.
    Changsha, China: IEEE Computer Society Press.
    Other Contributions: Other Contributions
  • User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Location Based Application Availability

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
  • Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K., Mayes, K.
    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings

Refine

Books and Reports

Chapters in Books, Reports and Conference Proceedings

Contributions to Journals

Other Contributions