We use cookies on this site. By browsing our site you agree to our use of cookies. Close this message Find out more

Home > Information Security home > Research > Technical Reports
More in this section Technical Reports

Technical Reports

The recommended style for citing a technical report is:

David Korczynski, Clustering Android Malware, RHUL-ISG-2015-1 (Information Security Group, Royal Holloway, University of London, 2015)

Note that due to migration overlap, the first 13 technical reports of 2015 should be cited in the following style:

David Korczynski, Clustering Android Malware, RHUL-ISG-2015-1 (RHUL-MA-2015-1) (Information Security Group, Royal Holloway, University of London, 2015)

http://www.royalholloway.ac.uk/isg/research/technicalreports

Technical reports and abstracts may be viewed and downloaded via the drop-down menus below. New technical reports should be sent to the Senior ISG Administrator, Emma Mosley. For instructions on the preparation and submission of technical reports, please see the technical reports guidance page.

2016-2017

RHUL-ISG-2017-1 (abstract, technical report)

Title: Hunting ELFs: An investigation into android malware detection

Author: Thomas Atkinson

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-2 (abstract, technical report)

Title: Cyber-risks in maritime container ports: An analysis of threats and simulation of impacts

Author: Peter Beaumont

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-3 (abstract, technical report)

Title: A critical analysis of Internet Connection Records in the Investigatory Powers Bill 2015

Author: Daniel Coats

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-4 (abstract, technical report)

Title: Warfare in the fifth domain: A realistic threat or hyberbole

Author: Christopher Cope

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-5 (abstract, technical report)

Title: Graph-based modelling on the robustness of interconnected networks under attack

Author: Jamie Greenwood

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-6 (abstract, technical report)

Title: Privacy policies in social networks: An analysis of Facebook, Twitter, Google+ and Linked In policies and relevant legislation to determine adequacy in protecting user privacy

Author: Minerva Hoessl

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-7 (abstract, technical report)

Title: Hybrid trust model for assurance of public keys in social networks

Author: Max Kington

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-8 (abstract, technical report)

Title: Active defence through deceptive IPS

Author: Apostolos Machas

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-9 (abstract, technical report)

Title: An overview of the cyber insurance industry: Challenges for insurers and insureds in quantifying and mitigating cyber risk

Author: Michael Payne

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2017-10 (abstract, technical report)

Title: Firewall traversal methods and security considerations for unified communication architectures with industry case studies

Author: Thomas Reisinger

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

2015-2016 

RHUL-ISG-2016-1 (RHUL-MA-2016-1) (abstractpdf)                                                                        
Title:  Misleading Metrics on Evaluating Machine Learning for Malware with Confidence     Authors:  Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov and Lorenzo Cavallaro

RHUL-ISG-2016-2 (RHUL-MA-2016-2) (abstractpdf)        
Title: An Ontology of a computing device secured with trusted platform module 2:0.                   Authors: Jiun Yi Yap and Allan Tomlinson

RHUL-ISG-2016-3 (abstractpdf)                                                                                                         Title: Evaluation of the suitability of the mobility common criteria protection profiles for enterprise mobility management                                                                                                           Author: Jill Dove                                                                                                                                       Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-4 (abstractpdf)                                                                                                         Title: Towards an autonomous vehicle enabled society: cyber attacks and countermeasures    Author: Michael Haddrell                                                                                                                       Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-5 (abstractpdf)                                                                                                       Title: The devil's right hand: An investigation on malware-oriented obfuscation techniques Author: Reza Hedayat                                                                                                                             Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-6 (abstractpdf)                                                                                                       Title: Digital cash and anonymous fair-exchange payment protocols                                           Author: Danushka Jayasinghe                                                                                                           Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-7 (abstractpdf)                                                                                                       Title: BadUSB 2.0: USB man in the middle attacks                                                                                Author: David Kierznowski                                                                                                                 Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-8 (abstractpdf)                                                                                                     Title: Android full-disk encryption: a security assessment                                                               Author: Oliver Kunz                                                                                                                                 Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-9 (abstractpdf)                                                                                                   Title: Virtual currencies and their potential role in cybercrime                                                             Author: Kevin Law                                                                                                                                 Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-10 (abstractpdf)                                                                                                     Title: Understanding behavioural detection of antivirus                                                                       Author: Soon Chai Liang                                                                                                                       Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-11 (abstractpdf)                                                                                                     Title: Sandnett++ - A framework for analysing and visualising network traffic from malware       Author: Anthony Nelson                                                                                                                         Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-12 (abstractpdf)                                                                                                     Title: A case study in critical infrastructure interdependency                                                                 Author: Bernhard Schneidhofer                                                                                                           Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-13 (abstractpdf)                                                                                                     Title: A risk analysis of enterprise cloud services                                                                               Author: Robert Sperrey                                                                                                                         Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-14 (abstractpdf)                                                                                                     Title: Extracting actionable data from modern financially motivated malware on windows personal computers                                                                                                           Author: James Wyke                                                                                                                               Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-15 (abstract, pdf)                                                                                                        Title: The Analysis and Classification of Android Malware                                                               Author: Kimberly Tam                                                                                                                             Comments: PhD thesis

 

2014-2015

RHUL-ISG-2015-1 (RHUL-MA-2015-1) (abstract, pdf)                                                                         Title: ClusTheDroid: Clustering Android Malware                                                                           Author: David Korczynski                                                                                                             Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series79 pages

RHUL-ISG-2015-2 (RHUL-MA-2015-2) (abstract, pdf)                                                                       Title: Adversary Modelling: Evaluating the feasibility of symbolic adversary model on smart transport ticketing system                                                                                                                   Author: Sheung Chi Chan                                                                                             Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 53 pages

RHUL-ISG-2015-3 (RHUL-MA-2015-3) (abstract, pdf)                                                                       Title: The Value of Threat Models in Enterprise Security Testing of Database Systems & Services                                                                                                                                                   Author: Timothy D. Williams                                                                                               Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 165 pages

RHUL-ISG-2015-4 (RHUL-MA-2015-4) (abstract, pdf)                                                                         Title: Verifying the Integrity of Open Source Android Applications                                           Author: Michael Macnair                                                                                                           Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 61 pages

RHUL-ISG-2015-5 (RHUL-MA-2015-5) (abstract, pdf)                                                                   Title: The Influence of Software Vulnerabilities on Business Risks                                       Author: Hilbrand Kramer                                                                                                         Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 60 pages

RHUL-ISG-2015-6 (RHUL-MA-2015-6) (abstract, pdf)                                                                   Title: The use of SmartCard authentication as a medium for protecting Taxi passengers             Author: Cesar Augusto Bonilla Alvarez                                                                             Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 114 pages

RHUL-ISG-2015-7 (RHUL-MA-2015-7) (abstract, pdf)                                                                         Title: Investigating the Effectiveness of Obfuscation against Android Application Reverse Engineering                                                                                                                                             Author: Rowena Harrison                                                                                                     Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 64 pages

RHUL-ISG-2015-8 (RHUL-MA-2015-8) (abstract, pdf)                                                                     Title: Mac OS X Forensics                                                                                                                     Author: Joaquin Moreno Garijo                                                                                                   Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 126 pages

RHUL-ISG-2015-9 (RHUL-MA-2015-9) (abstract, pdf)                                                                         Title: Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions                                                                                                                         Author: Esteban Masobro Garcia                                                                                     Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 171 pages

RHUL-ISG-2015-10 (RHUL-MA-2015-10) (abstract, pdf)                                                                     Title: The Use of Packers, Obfuscators and Encryptors in Modern Malware                                   Author: Paul Moon                                                                                                                Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 272 pages

RHUL-ISG-2015-11 (RHUL-MA-2015-11) (abstract, pdf)                                                                     Title: Cross-Platform Malware Contamination                                                                                       Author: Nicholas Aquilina                                                                                                 Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 110 pages

RHUL-ISG-2015-12 (RHUL-MA-2015-12) (abstract, pdf)                                                                     Title: Mitigating malicious insider cyber threat                                                                                     Author: Jason Anthony Smith                                                                                             Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 52 pages

RHUL-ISG-2015-13 (RHUL-MA-2015-13) (abstract, pdf)                                                                     Title: Analysis of the Linux Audit System                                                                                         Author: Bruno Morisson                                                                                                     Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 78 pages

2011-2014

Please see the Mathematics technical report webpage for ISG technical reports from 2011-2014.

2005-2010

Please see the Mathematics technical report webpage for ISG technical reports from 2005-2010.

2001-2004

Please see the Mathematics technical report webpage for ISG technical reports from 2001-2004.

 

 

 
 
 

Comment on this page

Did you find the information you were looking for? Is there a broken link or content that needs updating? Let us know so we can improve the page.

Note: If you need further information or have a question that cannot be satisfied by this page, please call our switchboard on +44 (0)1784 434455.

This window will close when you submit your comment.

Add Your Feedback
Close