Phd (Information Security), MSc (Information Security), MSc (Computer Science), BSc (Mathematics, Physics)
Senior Lecturer
- About
-
- Email Address
- raja.akram@abdn.ac.uk
- School/Department
- School of Natural and Computing Sciences
Biography
I joined the Department of Computer Science as Senior Lecturer in July 2020.
Previously, I have worked as Post Doctoral research assistant at the Information Security Group (ISG), Royal Holloway, University of London. During my time at ISG, I was involved with the research projects related to Data Control and Compliance, digital avionics, EMV and decentralised payment systems, transport ticketing and mobile contactless transactions. Previously, I have worked as Research Fellow at the Cyber Security Lab, Department of Computer Science, University of Waikato, New Zealand. At the Cyber Security Lab, I am involved with the user centric security and privacy paradigms. Before joining the University of Waikato, I worked as a Senior Research Fellow at Edinburgh Napier University. During my work at the Edinburgh Napier University, I worked on the RatTrap project. The RatTrap project designed a suite of preventive technologies to avoid online fraud - especially in the online affiliate marketing. I got my PhD in Information Security from Royal Holloway, University of London. I completed my MSc Information Security at Royal Holloway, University of London in September 2007. I also have MSc Computer Science from the University of Agriculture, Faisalabad and B.Sc (Mathematics, Physics and Geography) from the University of the Punjab, Lahore.
My current research interests revolve around the user centric applied security and privacy architectures, data ownership and control in a heterogeneous computing environment, security for machine learning and machine learning for security. In addition, I am also interested in smart card security, secure cryptographic protocol design and implementation, smartphone and IoT security, trusted platform architecture, trusted/secure execution environment and security & privacy issues in emerging technologies like blockchain, UAVs/Drone and autonomous vehicles.
Latest Publications
Autonomous vehicles: Cybersecurity and privacy challenges and opportunities
Cybersecurity in Transport Systems. Hawley, M. (ed.). Institution of Engineering and Technology, pp. 337-375, 39 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1049/PBTR015E_ch9
- [ONLINE] View publication in Scopus
Secure mobile edge server placement using multi-agent reinforcement learning
Electronics (Switzerland), vol. 10, no. 17, 2098Contributions to Journals: ArticlesMulti-objective function-based node-disjoint multipath routing for mobile ad hoc networks
Electronics (Switzerland), vol. 10, no. 15, 1781Contributions to Journals: ArticlesP2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time
Energies, vol. 14, no. 3, 606Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.3390/en14030606
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/16068/1/Kalbantner_etal_P2PEdge_VOR.pdf
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Teaching
-
Programmes
- Postgraduate, 3 semester, September start
- Publications
-
Page 3 of 4 Results 51 to 75 of 91
Challenges of security and trust of mobile devices as digital avionics component
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ICNSURV.2016.7486323
Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/2899015.2899029
Secure Application Execution in Mobile Devices
The New Codebreakers. Ryan, P. A., Naccache, D., Quisquater, J. (eds.). Springer, pp. 417-438, 22 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-3-662-49301-4_26
Secure and Trusted Application Execution on Embedded Devices
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-27179-8_1
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/Trustcom.2015.426
Enhancing EMV Online PIN Verification
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/Trustcom.2015.451
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/Trustcom.2015.410
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-24177-7_27
A Novel Consumer-Centric Card Management Architecture and Potential Security Issues
Journal of Information Science, vol. 321, pp. 150-161Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1016/j.ins.2014.12.049
Let’s Get Mobile: Secure FOTA for Automotive System
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-25645-0_38
Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ARES.2015.58
Challenges of security and trust in Avionics Wireless Networks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/DASC.2015.7311416
Digital Trust - Trusted Computing and Beyond A Position Paper
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TrustCom.2014.116
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TrustCom.2014.57
Unified Model for Data Security -- A Position Paper
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TrustCom.2014.110
End-to-End Secure and Privacy Preserving Mobile Chat Application
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-662-43826-8_9
Rethinking the Smart Card Technology
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsTrusted Platform Module for Smart Cards
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/NTMS.2014.6814058
An Introduction to Java Card Programming
Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K., Mayes, K. (eds.). Springer, pp. 497-513, 17 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-1-4614-7915-4_22
An Introduction to the Trusted Platform Module and Mobile Trusted Module
Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K., Mayes, K. (eds.). Springer, pp. 71-93, 23 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-1-4614-7915-4_4
Consumer-Centric Protection for Online Social Networks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/IRI.2014.7051872
Subscriber Centric Conditional Access System for Pay-TV Systems
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ICEBE.2013.70
A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TrustCom.2013.245
Smart Cards: State-of-the-Art to Future Directions, Invited Paper
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ISSPIT.2013.6781871
Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings