Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

portfolio

publications

Clicktok: click fraud detection using traffic analysis

Published in Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Use Google Scholar for full citation

Recommended citation: Shishir Nagaraja, Ryan Shah, "Clicktok: click fraud detection using traffic analysis." Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019.

Poster: Unified access control for surgical robotics

Published in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Use Google Scholar for full citation

Recommended citation: Ryan Shah, Shishir Nagaraja, "Poster: Unified access control for surgical robotics." Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019.

A unified access control model for calibration traceability in safety-critical IoT

Published in Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16--20, 2020, Proceedings 16, 2020

Use Google Scholar for full citation

Recommended citation: Ryan Shah, Shishir Nagaraja, "A unified access control model for calibration traceability in safety-critical IoT." Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16--20, 2020, Proceedings 16, 2020.

VoIPLoc: Passive VoIP call provenance via acoustic side-channels

Published in Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021

Use Google Scholar for full citation

Recommended citation: Shishir Nagaraja, Ryan Shah, "VoIPLoc: Passive VoIP call provenance via acoustic side-channels." Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021.

(Poster) Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels

Published in Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022

Use Google Scholar for full citation

Recommended citation: Ryan Shah, Chuadhry Ahmed, Shishir Nagaraja, "(Poster) Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels." Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022.

Security of robotic workflows

Published in University of Strathclyde Thesis Library, 2022

Use Google Scholar for full citation

Recommended citation: Ryan Shah, "Security of robotic workflows." University of Strathclyde Thesis Library, 2022.

talks

Usable Security Lecture

Published:

I gave a guest lecture on the topic of Usable Security in week 4 of the Advanced Human Computer Interaction course at Heriot-Watt University, delivered to 4th year undergraduate and postgraduate students.

Side Channel Attacks in Robotic Systems

Published:

In this talk, delivered to masters-level students, I presented my work on side channel attacks on robotic systems, with a tailored focus on the applicability and generalisability to cyber-physical systems in general.

Alternative Penetration Testing: A Focus on Cyber-Physical Systems

Published:

Abstract: Traditional penetration testing is a proven method for identifying vulnerabilities in computer systems, simulating real-world attacks to identify potential issues before they can be exploited in the real-world. Traditional pentesting makes use of a variety of techniques and tools for organisations, but with the introduction of robotic systems and other cyber-physical systems as a service (e.g. RaaS) becoming more common, will we observe a shift towards more “alternative” styles of pentesting?

teaching

Tutor - CS808 Computer Security Fundamentals

MSc Software Engineering Conversion Course, University of Strathclyde, Computer and Information Sciences, 2019

CS808 (previously CS996) Computer Security Fundamentals covers a wide variety of topics, including: security fundamentals, threat modelling and security policies, cryptography, network security and privacy, OS and web security, economics of security and new topics such as AI, Software-Defined Networks (SDNs), Internet-of-Things (IoT) and the cloud.

Course Development & Tutor - CS808 Computer Security Fundamentals

MSc Software Engineering Conversion Course, University of Strathclyde, Computer and Information Sciences, 2020

CS996 Computer Security Fundamentals covers a wide variety of topics, including: security fundamentals, threat modelling and security policies, cryptography, network security and privacy, OS and web security, economics of security and new topics such as AI, Software-Defined Networks (SDNs), Internet-of-Things (IoT) and the cloud.

Course Development & Tutor - CS813 Advanced Information Security

MSc Graduate Apprenticeship in Cybersecurity, University of Strathclyde, Computer and Information Sciences, 2020

CS813 Advanced Information Security was a course that made part of the Graduate Apprenticeship MSc in Cybersecurity, which gave industry professionals the opportunity to achieve a masters degree in cybersecurity while working at the same time. This course covers a wide variety of topics, including: cryptography, Internet security, OSI security, network protocols, attacks and defences in network security, wireless security, anonymity and machine learning, malware, and web and email security.

Course Development & Tutor - CS807 Vulnerability Assessment and Security Testing

MSc Graduate Apprenticeship in Cybersecurity, University of Strathclyde, Computer and Information Sciences, 2020

CS807 Vulnerability Assessment and Security Testing was a course that made part of the Graduate Apprenticeship MSc in Cybersecurity, which gave industry professionals the opportunity to achieve a masters degree in cybersecurity while working at the same time. This course aimed at introducing students to more advanced threat modelling, exploring various vulnerabilities of different computing systems, and real-world penetration testing and security analysis.

Course Development & Tutor - CS805 Advanced Topics in Cybersecurity

MSc Graduate Apprenticeship in Cybersecurity, University of Strathclyde, Computer and Information Sciences, 2020

CS805 Advanced Topics in Cybersecurity aimed at providing students with experience with reading and understanding novel, high-tiered research papers from a variety of disciplines within the field of cyber security. At the time of the course, 3015 papers have been published in the top four security-research conferences within the last 25 years. New security knowledge is often first published in conference papers, so the skill for reading, assimilating, and communicating new knowledge is a crucial skill for students to learn. Students in this course would select two high tier papers out of a list we provided from the top 4 security venues (Tier 1 / A* venues), writing a review of one paper and presenting another as if they were the author.