Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in arXiv, 2019
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Shishir Nagaraja, "A game-theoretic analysis of DoS attacks on driverless vehicles." arXiv, 2019.
Published in Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Use Google Scholar for full citation
Recommended citation: Shishir Nagaraja, Ryan Shah, "Clicktok: click fraud detection using traffic analysis." Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019.
Published in arXiv, 2019
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Shishir Nagaraja, "Cocaine delivery via driverless vehicles OR Scaling physical-proximity attacks on driverless vehicles using structured graph analysis." arXiv, 2019.
Published in Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Shishir Nagaraja, "Do we have the time for IRM? service denial attacks and SDN-based defences." Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019.
Published in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Shishir Nagaraja, "Poster: Unified access control for surgical robotics." Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019.
Published in arXiv, 2019
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Shishir Nagaraja, "Privacy with surgical robotics: challenges in applying contextual privacy theory." arXiv, 2019.
Published in arXiv, 2019
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Michael McIntee, Shishir Nagaraja, Sahil Bhandary, Prerna Arote, Joy Kuri, "Secure Calibration for Safety-Critical IoT: Traceability for Safety Resilience." arXiv, 2019.
Published in arXiv, 2019
Use Google Scholar for full citation
Recommended citation: Ryan Shah, "Security landscape for robotics." arXiv, 2019.
Published in Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16--20, 2020, Proceedings 16, 2020
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Shishir Nagaraja, "A unified access control model for calibration traceability in safety-critical IoT." Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16--20, 2020, Proceedings 16, 2020.
Published in Digital Threats: Research and Practice, 2021
Use Google Scholar for full citation
Recommended citation: Girish Vaidya, TV Prabhakar, NITHISH Gnani, Ryan Shah, Shishir Nagaraja, "Sensor identification via Acoustic Physically Unclonable Function (PUF)." Digital Threats: Research and Practice, 2021.
Published in Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021
Use Google Scholar for full citation
Recommended citation: Shishir Nagaraja, Ryan Shah, "VoIPLoc: Passive VoIP call provenance via acoustic side-channels." Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021.
Published in arXiv, 2022
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Chuadhry Ahmed, Shishir Nagaraja, "Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels." arXiv, 2022.
Published in arXiv, 2022
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Mujeeb Ahmed, Shishir Nagaraja, "Fingerprinting Robot Movements via Acoustic Side Channel." arXiv, 2022.
Published in Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Chuadhry Ahmed, Shishir Nagaraja, "(Poster) Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels." Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2022.
Published in arXiv, 2022
Use Google Scholar for full citation
Recommended citation: Ryan Shah, Mujeeb Ahmed, Shishir Nagaraja, "Reconstructing Robot Operations via Radio-Frequency Side-Channel." arXiv, 2022.
Published in University of Strathclyde Thesis Library, 2022
Use Google Scholar for full citation
Recommended citation: Ryan Shah, "Security of robotic workflows." University of Strathclyde Thesis Library, 2022.
Published in SARs: TMI Workshop at CHI'2023, 2023
Use Google Scholar for full citation
Recommended citation: Carl Bettosi, Kefan Chen, Ryan Shah, Lynne Baillie, "Communicating Complex Decisions in Robot-Assisted Therapy." SARs: TMI Workshop at CHI 2023, 2023.
Published in CHI'23 Workshop on Migration Security and Privacy, 2023
Use Google Scholar for full citation
Recommended citation: Theodoros Georgiou, Lynne Baillie, Ryan Shah, "Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia." CHI 2023 Workshop on Migration Security and Privacy, 2023.
Published:
I gave a guest lecture on the topic of Usable Security in week 4 of the Advanced Human Computer Interaction course at Heriot-Watt University, delivered to 4th year undergraduate and postgraduate students.
Published:
In this talk, delivered to masters-level students, I presented my work on side channel attacks on robotic systems, with a tailored focus on the applicability and generalisability to cyber-physical systems in general.
Published:
Abstract: Traditional penetration testing is a proven method for identifying vulnerabilities in computer systems, simulating real-world attacks to identify potential issues before they can be exploited in the real-world. Traditional pentesting makes use of a variety of techniques and tools for organisations, but with the introduction of robotic systems and other cyber-physical systems as a service (e.g. RaaS) becoming more common, will we observe a shift towards more “alternative” styles of pentesting?
MSc Software Engineering Conversion Course, University of Strathclyde, Computer and Information Sciences, 2019
CS808 (previously CS996) Computer Security Fundamentals covers a wide variety of topics, including: security fundamentals, threat modelling and security policies, cryptography, network security and privacy, OS and web security, economics of security and new topics such as AI, Software-Defined Networks (SDNs), Internet-of-Things (IoT) and the cloud.
MSc Software Engineering Conversion Course, University of Strathclyde, Computer and Information Sciences, 2020
CS996 Computer Security Fundamentals covers a wide variety of topics, including: security fundamentals, threat modelling and security policies, cryptography, network security and privacy, OS and web security, economics of security and new topics such as AI, Software-Defined Networks (SDNs), Internet-of-Things (IoT) and the cloud.
MSc Graduate Apprenticeship in Cybersecurity, University of Strathclyde, Computer and Information Sciences, 2020
CS813 Advanced Information Security was a course that made part of the Graduate Apprenticeship MSc in Cybersecurity, which gave industry professionals the opportunity to achieve a masters degree in cybersecurity while working at the same time. This course covers a wide variety of topics, including: cryptography, Internet security, OSI security, network protocols, attacks and defences in network security, wireless security, anonymity and machine learning, malware, and web and email security.
MSc Graduate Apprenticeship in Cybersecurity, University of Strathclyde, Computer and Information Sciences, 2020
CS807 Vulnerability Assessment and Security Testing was a course that made part of the Graduate Apprenticeship MSc in Cybersecurity, which gave industry professionals the opportunity to achieve a masters degree in cybersecurity while working at the same time. This course aimed at introducing students to more advanced threat modelling, exploring various vulnerabilities of different computing systems, and real-world penetration testing and security analysis.
MSc Graduate Apprenticeship in Cybersecurity, University of Strathclyde, Computer and Information Sciences, 2020
CS805 Advanced Topics in Cybersecurity aimed at providing students with experience with reading and understanding novel, high-tiered research papers from a variety of disciplines within the field of cyber security. At the time of the course, 3015 papers have been published in the top four security-research conferences within the last 25 years. New security knowledge is often first published in conference papers, so the skill for reading, assimilating, and communicating new knowledge is a crucial skill for students to learn. Students in this course would select two high tier papers out of a list we provided from the top 4 security venues (Tier 1 / A* venues), writing a review of one paper and presenting another as if they were the author.