Inferring User Behaviour Despite Wireless Network Encryption
MEng, Computer Systems & Software Engineering - The University of York
I worked as a software engineer for Sophos Plc., a large UK-based company which develops and sells computer security software (e.g. Antivirus, Firewall, Anti-spam). I was briefly employed as a research associate at the University of York, before beginning my PhD course at SECReT.
I'M ORIGINALLY FROM...
WHY I APPLIED TO THE SECURITY SCIENCE DTC
Security provides a challenge. I would greatly prefer to innovate and help drive security systems forward rather than, like other potential careers in this field, maintain the status quo. Aside from being interesting in its own right, the opportunity to consult with experts in usually inaccessible subject areas made the multi-disciplinary aspect of UCL's programme particularly appealing. A greater exchange of ideas between research disciplines can only be beneficial to my own ability as an engineer, and the development of security systems as a whole.
My research will focus on cyber security and privacy leaks from wireless communications (e.g. mobile phones and WiFi). I will investigate how increasingly commonplace technology can divulge a great amount of detail about user activities, even when the encryption is working 100% as designed. This enables development of technogies to prevent this when not wanted, as well as potentially useful applications in the field of digital forensics.
WHAT I DO WHEN I'M NOT STUDYING
I run, play squash and keyboard. I've dabbled in Open Source software, like Amarok, when my time hasn't been consumed by work-related projects. I ski and snowboard (badly) and love to travel.
MY CAREER ASPIRATIONS
Security is something which is often ignored for the sake of convenience. Similarly, when security precautions are implemented, they are often resented because of their inconvenience. This can easily be a bigger problem than designing the technical details of a security system. As an engineer, this is a problem I would like to help combat, be it within academia, industry or both.
WHAT KIND OF PARTNER ORGANISATION I'D LIKE TO WORK WITH AND WHAT I'D LIKE FROM THEM
My research is partially funded by SELEX ES, an international company whose primary focus is supplying and developing technology for the defence sector. However, this need not rule out collaboration with other interested parties, especially in the area of digital forensics.
Current Technical Work: Your WiFi Is Leaking: What Do Your Mobile Apps Gossip About You? (in review)
Previous Technical Papers: Publication List @ Google Scholar.
Other papers: "Proof is not Binary" article on the complexities of digital evidence.
Pressed for time? See this poster summarising my work into WiFi privacy leaks or you may also be interested in my Bright Club comedy set about Security Research in general.
OTHER RESPONSIBILITIES & ACADEMIC WORK
Teaching Assistant / Assessor for Multimedia Computing (COMP6008/GC14). Technical Supervision for MSc projects under John Mitchell.
European Security Research Conference '10. Ostend, Belgium. September 2010.
UCL Security and Crime Research Network Conference 2010. London, UK. December 2010.
International Association of Forensic Sciences Conference. Madeira, Portugal. September 2011.
London Communications Symposium 2011. London, UK. September 2011.
London Cybersecurity Forum. London, UK. September 2011.
44CON Information Security Conference. London, UK. September 2012.
Wireless Communications and Networking Conference (WCNC), 2013. Shanghai, China. April 2013.
Cyberpatterns 2013. Oxford, UK. July 2013.
Information Advisory Council Conference. London, UK. September 2013.
National Security Capabilities Conference. London, UK. July 2014.
44Con 2014. London, UK. September 2014.
Milcom 2014. Baltimore MD, USA. October 2014.