Skip to main content

ISG Technical reports

ISG Technical reports

The recommended style for citing a technical report is:

David Korczynski, Clustering Android Malware, RHUL-ISG-2015-1 (Information Security Group, Royal Holloway, University of London, 2015)

Note that due to migration overlap, the first 13 technical reports of 2015 should be cited in the following style:

David Korczynski, Clustering Android Malware, RHUL-ISG-2015-1 (RHUL-MA-2015-1) (Information Security Group, Royal Holloway, University of London, 2015)

Technical reports and abstracts may be viewed and downloaded via the drop-down menus below. New technical reports should be sent to the ISG Administrator.

RHUL-ISG-2020-1 (abstracttechnical report

Title: Driverless Vehicle Security: Considering Potential Attacks and Countermeasures for
Military Applications

Author: Nicola Bates

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-2 (abstracttechnical report

Title: Lessons on Catastrophe: Modelling a Relationship between Credit Ratings and Cyber Insurance Risk

Author: Rob Champion

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-3 (abstracttechnical report

Title: Connected and Autonomous Vehicle Innovation: Approaches to Navigating the Hazards

Author: Juliet Flavell

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-4 (abstracttechnical report

Title: Software-based Microarchitectural Fault Attack

Author: Jan Kalbantner

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-5 (abstracttechnical report

Title: The WannaCry Attack: An Evaluation of Centrally Mandated Information Governance for the English NHS and Local Government

Author: Tony Leary

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-6 (abstracttechnical report

Title: A Novel Approach to Clustering Malware Behaviour to Improve Malware Detection

Author: Rebecca Merriman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-7 (abstracttechnical report

Title: Purple Team Playbook: Threat Modeling for Security Testing

Author: Felisha Mouchous

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2020-8 (abstracttechnical report

Title:  An Enhanced Approach for USB Security Management

Author: Daniyal Naeem

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

RHUL-ISG-2019-1 (abstract, technical report

Title: 20 years of Bleichenbacher attacks

Author: Gage Boyle

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2019-2 (abstract, technical report)

Title: Rethinking the cybersecurity of consumer Internet of Things (IoT): how to incentivise companies to produce cyber-secure consumer IoT products

Author: Joo Ng

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2019-3 (abstract, technical report)

Title: A secure framework for protecting IPv6 Neighbor Discovery Protocol

Author: Colin Putman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series


RHUL-ISG-2019-4 
(abstract, technical report)

Title: How long does it take to get owned?

Author: David Wardle

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-1 (abstracttechnical report)

Title: Defining and developing a model for an engaged information security culture

Author: Ashley Bye

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series 

 

RHUL-ISG-2018-2  (abstracttechnical report)

Title: Demystifying the risks of public cloud computing

Author: Christopher J. Hodson

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-3  (abstracttechnical report)

Title: Apple Pay: How different is it from other Pay solutions, what role does tokenisation play, and to what degree can Card not Present payment benefit from Apple Pay in future.

Author: Marcel Fehr

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-4 (abstracttechnical report)

Title: Challenges old and new: An analysis of the impacts of the General Data Protection Regulation 

Author: Neil Fraser

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-5 (abstracttechnical report)

Title: Bluetooth Low Energy security analysis framework

Author: Jennifer Ann Janesko

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-6 (abstracttechnical report)

Title: A study on the security aspects and limitations of mobile payments using Host Card Emulation (HCE) with Near Field Communication (NFC)

Author: Shana Micallef

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2018-7 (abstracttechnical report)

Title: Evaluating the effectiveness of defences to web tracking

Author: Darrell Newman

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

RHUL-ISG-2017-1 (abstracttechnical report)

Title: Hunting ELFs: An investigation into android malware detection

Author: Thomas Atkinson

Comments: Invited to submit an article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-2  (abstracttechnical report)

Title: Cyber-risks in maritime container ports: An analysis of threats and simulation of impacts

Author: Peter Beaumont

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-3  (abstracttechnical report)

Title: A critical analysis of Internet Connection Records in the Investigatory Powers Bill 2015

Author: Daniel Coats

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-4 (abstracttechnical report)

Title: Warfare in the fifth domain: A realistic threat or hyperbole

Author: Christopher Cope

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-5 (abstracttechnical report)

Title: Graph-based modelling on the robustness of interconnected networks under attack

Author: Jamie Greenwood

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-6 (abstracttechnical report)

Title: Privacy policies in social networks: An analysis of Facebook, Twitter, Google+ and Linked In policies and relevant legislation to determine adequacy in protecting user privacy

Author: Minerva Hoessl

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-7 (abstracttechnical report)

Title: Hybrid trust model for assurance of public keys in social networks

Author: Max Kington

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-8 (abstracttechnical report)

Title: Active defence through deceptive IPS

Author: Apostolos Machas

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-9 (abstracttechnical report)

Title: An overview of the cyber insurance industry: Challenges for insurers and insureds in quantifying and mitigating cyber risk

Author: Michael Payne

Comments: Invited to submit article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2017-10 (abstracttechnical report)

Title: Firewall traversal methods and security considerations for unified communication architectures with industry case studies

Author: Thomas Reisinger

Comments: Invited to submit an article to the Computer Weekly (Search Security) Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-1 (RHUL-MA-2016-1) (abstractpdf)                                                                        
Title:  Misleading Metrics on Evaluating Machine Learning for Malware with Confidence     

Authors:  Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov and Lorenzo Cavallaro

 

RHUL-ISG-2016-2 (RHUL-MA-2016-2) (abstractpdf)      
Title: An Ontology of a computing device secured with trusted platform module 2:0.                   

Authors: Jiun Yi Yap and Allan Tomlinson

 

RHUL-ISG-2016-3 (abstractpdf)                                                                                                  Title: Evaluation of the suitability of the mobility common criteria protection profiles for enterprise mobility management                                                                                                           

Author: Jill Dove                                                                                                                                       

Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-4 (abstractpdf)                                                                                                      Title: Towards an autonomous vehicle enabled society: cyber attacks and countermeasures    

Author: Michael Haddrell                                                                                                                       

Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-5 (abstractpdf)                                                                                                      

Title: The devil's right hand: An investigation on malware-oriented obfuscation techniques

Author: Reza Hedayat                                                                                                                             

Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

 

RHUL-ISG-2016-6 (abstractpdf)                                                                                                      

Title: Digital cash and anonymous fair-exchange payment protocols                                           

Author: Danushka Jayasinghe                                                                                                           

Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-7 (abstractpdf)                                                                                                      Title: BadUSB 2.0: USB man in the middle attacks                                                                                Author: David Kierznowski                                                                                                                 Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-8 (abstractpdf)                                                                                                  

Title: Android full-disk encryption: a security assessment                                                              

 Author: Oliver Kunz                                                                                                                                 

Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-9  (abstractpdf)                                                                                                  

Title: Virtual currencies and their potential role in cybercrime
Author: Kevin Law                                                                                                                              Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-10 (abstractpdf)                                                                                                  Title: Understanding behavioural detection of antivirus                                                                       
Author: Soon Chai Liang                                                                                                                     Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-11 (abstractpdf)                                                                                                  Title: Sandnett++ - A framework for analysing and visualising network traffic from malware       

Author: Anthony Nelson                                                                                                                         

Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-12 (abstractpdf)                                                                                                   

Title: A case study in critical infrastructure interdependency                                                                 

Author: Bernhard Schneidhofer                                                                                                           

Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-13 (abstractpdf)  

Title: A risk analysis of enterprise cloud services                                                                               

Author: Robert Sperrey                                                                                                                      Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

 

RHUL-ISG-2016-14  (abstractpdf)                                                                                                    Title: Extracting actionable data from modern financially motivated malware on windows personal computers             Author: James Wyke                                                                                                                             Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series

RHUL-ISG-2016-15 (abstractpdf)                                                                                                       Title: The Analysis and Classification of Android Malware                                                               Author: Kimberly Tam                                                                                                                             Comments: PhD thesis

RHUL-ISG-2015-1 (RHUL-MA-2015-1) (abstractpdf)                                                                         Title: ClusTheDroid: Clustering Android Malware  
Author: David Korczynski                                                                                                           Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series79 pages

 

RHUL-ISG-2015-2 (RHUL-MA-2015-2) (abstractpdf)                                                                     
Title: Adversary Modelling: Evaluating the feasibility of symbolic adversary model on smart transport ticketing system  Author: Sheung Chi Chan
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 53 pages

 

RHUL-ISG-2015-3 (RHUL-MA-2015-3) (abstractpdf)  
Title: The Value of Threat Models in Enterprise Security Testing of Database Systems & Services                                Author: Timothy D. Williams
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 165 pages

 

RHUL-ISG-2015-4 (RHUL-MA-2015-4) (abstractpdf)   
Title: Verifying the Integrity of Open Source Android Applications 
Author: Michael Macnair                                                                                                           
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 61 pages

RHUL-ISG-2015-5 (RHUL-MA-2015-5) (abstractpdf)                                                                   
Title: The Influence of Software Vulnerabilities on Business Risks                                       
Author: Hilbrand Kramer                                                                                                         
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 60 pages

 

RHUL-ISG-2015-6 (RHUL-MA-2015-6) (abstractpdf)                                                                 
Title: The use of SmartCard authentication as a medium for protecting Taxi passengers             
Author: Cesar Augusto Bonilla Alvarez                                                                             
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 114 pages

 

RHUL-ISG-2015-7 (RHUL-MA-2015-7) (abstractpdf)                                                                        Title: Investigating the Effectiveness of Obfuscation against Android Application Reverse Engineering               
Author: Rowena Harrison                                                                                                     
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 64 pages

 

RHUL-ISG-2015-8 (RHUL-MA-2015-8) (abstractpdf)                                                                        
Title: Mac OS X Forensics                                                                                                                   Author: Joaquin Moreno Garijo                                                                                                
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 126 pages

 

RHUL-ISG-2015-9 (RHUL-MA-2015-9) (abstractpdf)                                                                      
Title: Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions             
Author: Esteban Masobro Garcia                                                                                   
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 171 pages

RHUL-ISG-2015-10 (RHUL-MA-2015-10) (abstractpdf)                                                                        
Title: The Use of Packers, Obfuscators and Encryptors in Modern Malware                                   
Author: Paul Moon                                                                                                                
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 272 pages

 

RHUL-ISG-2015-11 (RHUL-MA-2015-11) (abstractpdf)                                                                    
Title: Cross-Platform Malware Contamination                                                                                     Author: Nicholas Aquilina                                                                                                 
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 110 pages

 

RHUL-ISG-2015-12 (RHUL-MA-2015-12) (abstractpdf)                                                                    Title: Mitigating malicious insider cyber threat                                                                                    Author: Jason Anthony Smith
 Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information     Security Thesis Series, 52 pages

RHUL-ISG-2015-13 (RHUL-MA-2015-13) (abstractpdf)                                                                            
Title: Analysis of the Linux Audit System
Author: Bruno Morisson                                                                                                     
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 78 pages

Please see the Mathematics technical report webpage for ISG technical reports from 2011-2014.

Please see the Mathematics technical report webpage for ISG technical reports from 2005-2010.

Please see the Mathematics technical report webpage for ISG technical reports from 2001-2004.

Explore Royal Holloway

Get help paying for your studies at Royal Holloway through a range of scholarships and bursaries.

There are lots of exciting ways to get involved at Royal Holloway. Discover new interests and enjoy existing ones

Heading to university is exciting. Finding the right place to live will get you off to a good start

Whether you need support with your health or practical advice on budgeting or finding part-time work, we can help

Discover more about our 21 departments and schools

Find out why Royal Holloway is in the top 25% of UK universities for research rated ‘world-leading’ or ‘internationally excellent’

They say the two most important days of your life are the day you were born, and the day you find out why

Discover world-class research at Royal Holloway

Discover more about who we are today, and our vision for the future

Royal Holloway began as two pioneering colleges for the education of women in the 19th century, and their spirit lives on today

We’ve played a role in thousands of careers, some of them particularly remarkable

Find about our decision-making processes and the people who lead and manage Royal Holloway today