We use cookies on this site. By browsing our site you agree to our use of cookies. Close this message Find out more

More in this section Prospective MSc students

Thesis Prizes

Smart Card Open Day

The Information Security Group offers a number of prizes every year to MSc candidates who produce outstanding MSc theses. These prizes are a reward for the hard work that these candidates have put into their projects. Three different prizes are currently offered by the group:


The ISG MSc Project Prize

The ISG MSc Project Prize was introduced in the 2013-2014 academic year. It is awarded to  the student whose MSc project is judged to be the best one out of all the submitted projects in a particular academic year. The ISG MSc Project Committee has the responsibility for choosing the best project.


2014: ClusTheDroid: Clustering Android Malware by David Korczynski supervised by Lorenzo Cavallaro

The David Lindsay Prize

The David Lindsay Prize is awarded every year by the British Computer Society's Information Security Specialist Group to the project that best addresses innovative applications of Information Security. It is open to all MSc projects which focus on information security. The decision is made by BCS ISSG.

Recent winners of the David Lindsay prize include:


2014: Verifying the Integrity of Open Source Android Applications by Michael Macnair, supervised by Keith Mayes.

2013: Analyzing Application Data Security on Android Devices by Pallavi Sivakumaran, supervised by Keith Mayes.

2012: Sleeping Android: Exploit through Dormant Permission Requests by James Sellwood, supervised by Jason Crampton.

2011: Practical Implementation of Grouping Proof for RFID by Antony Bills, supervised by Konstantinos Markantonakis.

2010: Efficiency of Zero-Knowledge Proofs of Knowledge Identification Protocols on Smart Cards by Andreas Grünert, supervised by Keith Mayes.


2009: Investigating the Use of Static Analysis Techniques to Detect Obfuscation in Web-Based Content Attacks by Tony Broad, supervised by John Austen.

2008: Securing Mobile Voice End to End: Design Challenges in Developing Commercially Acceptable Solutions by John Wigley, supervised by Kenny Paterson. 

2007: The Impact of Virtualisation Upon Forensics Procedures by Matthew Hanrahan, supervised by John Austen.


2006: An Investigation into the Information Security Threats faced by a Small Network by David Thomas Hawks, supervised by Geraint Price.

2005: (Artificially) Immune Based (Hybrid) Intrusion and Detection and Prevention Systems by Georgiadis Filippos, supervised by Geraint Price.

2004: An Open Framework for Simplifying the Use and Development of Source Code Analysis Tools by Nessim Kisserli, supervised by Jason Crampton.

2003: Java Card Application to Provide Secure SMS by Brian Portsmore, supervised by Konstantinos Markantonakis.

Computer Weekly (Search Security) Awards

A number of MSc projects are chosen to receive Computer Weekly (previously SearchSecurity.co.uk) awards. These awards are given to those projects which best present research in an area of information security of interest to information security managers and professionals. These projects are re-written as short articles for a general audience and published online at www.computerweekly.com. The full projects are published as technical reports.



The 2016 Computer Weekly (Search Security) awards winners are:

  • Evaluation of the suitability of the mobility common criteria protection profiles for enterprise mobility management by Jill Dove (supervised by Geraint Price)
  • Towards an autonomous vehicle enable society: cyber attacks and countermeasures by Michael Haddrell (supervised by Keith Martin)
  • The debvil's right hand: An investigation on malware-oriented obfuscation techniques by Reza Hedayat (supervised by Lorenzo Cavallaro)
  • Digital cash and anonymous fair-exchange payment protocols by Danushka Jayasinghe (supervised by Konstantinos Markantonakis)
  • BadUSB 2.0: USB man in the middle attacks by David Kierznowski (supervised by Keith Mayes)
  • Android full-disk encryption: a security assessment by Oliver Kunz (supervised by Keith Martin)
  • Virtual currencies and their potential role in cyber crime by Kevin Law (supervised by John Austen)
  • Understanding behavioural detection of antivirus by Soon Chai Liang (supervised by Lorenzo Cavallaro)
  • Sandnett++ - A framework for analysing and visualising network traffic from malware by Anthony Nelson (supervised by Lorenzo Cavallaro)
  • A case study in critical infrastructure interdependency by Bernard Schneidhofer (supervised by Stephen Wolthusen)
  • A critical examination of UK cybercrime policing with a particular focus on the Mainstream Cyber Crime Training by Esther Snell (supervised by John Austen)
  • A Risk Analysis of Enterprise Cloud Services by Robert Sperrey (supervised by Geraint Price)
  • Extracting actionable data from modern financially motivated malware on windows personal computers by James Wyke (supervised by Frederik Mennes)



The 2015 Computer Weekly (Search Security) award winners are:

This series is edited by Colin Walter and Siaw-Lynn Ng.


The 2014 Computer Weekly (Search Security) award winners are:

  • Leveraging knowledge sharing for preventing and investigating on-line banking frauds: On-line Fraud Centre by Salvatore Camillo Zammataro
  • Defeating Memory error Exploits by Program Diversification and Process Replication by Marc Nimmerrichter
  • Analysis and detecting of misbehaviours in VANETs by Shuxian Yan
  • Cyber Security in the UK: A critical analysis of the threat to the UK and the Government Response (National Cyber Security Strategy 2011) by John Iles
  • Implementing Information Security Management System in SMEs and ensuring Effectiveness in its Governance by Vadim Gordas
  • Security at the Core: Examining Perspectives on Insider Threat by Peter Crowley
  • A utilitarian re-examination of enterprise-scale information security management by Andrew Stewart
  • Cloud Encryption and Key Management Considerations by Daniel Cushieri
  • A Security Analysis of TreuCrypt: Detecting Hidden Volumes and Operating Systems by Andrew Davies
  • Terrorist use of the Internet: an analysis of the current threat and its potential evolution by Matteo Cavallini
  • Analysing Application Data Security on Android DevicesbyPallavi Sivakumaran
  • Concurrent Memory Inspection for Intrusion Detection by Christos V. Tsopokis
  • Interdomain routing security: Motivation and challenges of RPKI by Amreesh Dev, Phokeer
  • Investigating the use of Elliptic Curve Cryptography in Transport Ticketing by Thyla Joy van der Merwe


The 2013 Computer Weekly (Search Security) award winners are:

  • Fair exchange protocols with anonymity and non-repudiation for payments by Athanasios Polychronis
  • A security enhanced RFID tracking system by Dario Bevilacqua
  • An analysis of the vulnerabilities introduced with Java Card 3 Connected Edition by Andrew Calafato
  • Detecting MPEG-2 video tampering through motion errors by Ho Hee-Meng
  • Sleeping Android: Exploit through dormant permission requests by James Sellwood
  • Visualizations in Vulnerability Management by Marco Krebs
  • Managing the client-side risks of IEEE 802.11 networks by Daan Stakenburg
  • Electronic voting: an electronic voting scheme using the secure payment card system by Voke Augoye
  • Protecting against modern password cracking by Yiannis Chrysanthou.


The 2012 Computer Weekly (Search Security) award winners are:

  • A novel card-present payment scheme using NFC Technology by Albert Attard
  • A pragmatic policy-driven XSS protection framework by Joseph Bugeja
  • A study on how a cloud service provider can offer adequate security to its customers by Robert Farrugia
  • Malware Armoring: the case against incident related binary analysis by Steve Hendrikse
  • Security in the cloud: The threat of coexist with an unknown tenant on a public environment by Jacobo Ros
  • Can PCI DSS compliance be achieved in a cloud environment? by Patrick Durkin


The 2011 Computer Weekly (Search Security) award winners are:

  • Hypervisor security: new techniques for securing virtual machines by Fotios Tsifoundtidis
  • Compromising emanations: Tactics for electronic surveillance detection by Paul Frankland
  • Quantum cryptography tutorial: is quantum key distribution realistic? by Sheila Cobourne
  • Patient confidentiality policy for UK electronic health records by Stephen Elgar
  • Ministry of Defence security: IT information assurance in the MOD by Paul Shanes


The 2010 SearchSecurity.co.UK award winners are:

  • Quantum Key Distribution – Protocols and Applications by Sheila Cobourne.
  • Developments in confidentiality and consent functions to support wider sharing of electronic health records in the UK by Stephen Elgar (via the distance learning mode of study).
  • Side Channels, Compromising Emanations and Surveillance: Current and future technologies by Richard Frankland.
  • Accreditation: An end-to-end approach to managing information within the Ministry of Defence by Paul Shanes.
  • Virtualization Security: Virtual Machine Monitoring and Introspection by Fotis Tsifountidis.


The 2009 SearchSecurity.co.UK award winners are:

  • Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks (VANET) by Abdul Kalam Kunnel Aboobaker
  • The Domain Name System (DNS): Security challenges and improvements by Richard John Matthew Agar
  • Securing the Sage Notebook by Yoav Aner
  • Security Awareness for Children by Clara Brady
  • Leveraging The Multi-Disciplinary Approach to Countering Organised Crime by Anna Cevidalli
  • Business to Business Data Sharing using Trusted Computing by Stephen S. Khan
  • Improving Residual Risk Management through the Use of Security Metrics by Jonathan Pagett
  • Attestation in Trusted Computing: Challenges and Potential Solutions by Andrew Lee-Thorp


The 2008 SearchSecurity.co.UK award winners are:

  • Interdomain Routing Security (BGP4) by Rostom Zouaghi
  • Maximising the Effectiveness of Information Security Awareness by Geordie Stewart
  • Information Security Awareness: An Innovation Approach by Carlos Orozco Corona
  • Fuzzing for Software Vulnerability Discovery by Toby Clarke
  • Applying Misuse Case to Improve the Security of Information Systems by John Ruck
  • Buffer Overflows in Microsoft Windows Environment by Parvez Anwar
  • Management of Risks Associated with De-Parameterisation by Kwok Keeng Lee
  • Digital Rights Management: Towards a Balance between Copyright Rights and Fair Use Exceptions by Christian Bonnici
  • Extending Secure Execution Environments Beyond the TPM by Talha Tariq


The 2007 SearchSecurity.co.UK award winners are:

  • Intrusion Detection and Prevention: Immunologically Inspired Approaches by Devid Pipa
  • Metamorphic Virus: Analysis and Detection by Evgenios Konstantinou
  • Copy Protection of Computer Games by Richard Hyams
  • Forensics of BitTorrent by Jamie Acorn
  • Securing Financially Sensitive Environments with OpenBSD by Nicholas Humphrey
  • Cheating and Virtual Crime in Massively Multiplayer Online Games by Rahul Joshi
  • Review and Analysis of Current and Future European e-ID Schemes by Siddhartha Arora
  • Information Security Training & Awareness by Monique Hogervorst
  • Computer Security: A Machine Learning Approach by Sandeep Sabnani
  • Proposed Model for Outsourcing PKI by Christoper McLaughlin
  • Network Covert Channels: Review of Current State and Analysis of Viability of the use of X509 Certificates for Covert Communications by Carlos Scott
  • Detecting Pandemic and Epidemic Incidents through Network Telescopes: Security Analysis by Fotis Gagadis
  • Tigger Team -- A Novel Methodology to Manage Business Risk by Ian McKinnon

The Information Security Group Smart Card Centre Open Day

Every year the ISG Smart Card Centre (SCC) is organising a Smart card Centre Open Day. This is a very popular annual networking and exhibition event for SCC sponsors, supporters and industry lecturers plus guests from industry, government and academia. The day aims to showcase the college, faculty ISG/SCC as well as industry supporters. The main focus is the exhibition in the picture gallery, with industry and SCC postgraduate student exhibits. Selected projects, supervised by the ISG SCC will be exhibited. If your project is supervised by the ISG SCC and it is selected then you will have to make sure that you attend the event. The day concludes with an invited lecture from a prestigious speaker along with voting for the best student project and exhibitor stand. Please follow the link (ISG SCC Open Days) for further information. 



Comment on this page

Did you find the information you were looking for? Is there a broken link or content that needs updating? Let us know so we can improve the page.

Note: If you need further information or have a question that cannot be satisfied by this page, please call our switchboard on +44 (0)1784 434455.

This window will close when you submit your comment.

Add Your Feedback