Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

This project is no longer listed on FindAPhD.com and may not be available.

Click here to search FindAPhD.com for PhD studentship opportunities
  Prof Leandros Maglaras  Applications accepted all year round  Self-Funded PhD Students Only

About the Project

Using several messenger applications like Signal where data are not backed up or stored reduces the chance of messages being accessed, but the main problem of the data being created and consumed in cleartext on end devices remains. The bulk of the already available chat applications is primarily focused on the process of data transmission using an E2EE strategy (End-2-End Encryption method). An adversary can commit acts of technological violence by installing spyware within an application to accomplish a wide range of capabilities. These capabilities can include monitoring, changing, or accessing information or credentials that are saved on a person’s mobile device. When a mobile user accesses, edits, or otherwise manipulates data or credentials in any other way, one way to reduce the likelihood of a vulnerability of this kind arising is to use Multi-Factor Authentication techniques.

This project aims on building on our previous E2E prototype mechanism in order to provide a holistic solution for securing mobile phones from eavesdropping attacks. The solution that will be developed should be able to be applied to any mobile phone operating system and be user friendly and robust against cybersecurity threats.

Academic qualifications

A second class honour degree or equivalent qualification in Electrical / Electronic / Communications Engineering, Computer Science / Engineering, Mathematics with a good fundamental knowledge of Communication Principles, Digital Communications, Cryptography.

English language requirement

IELTS score must be at least 6.5 (with not less than 6.0 in each of the four components). Other, equivalent qualifications will be accepted. Full details of the University's policy are available online.

Essential attributes

  •  Experience of fundamental cryptography and cybersecurity
  • Competent in software development
  • Knowledge of communication principles, cryptography, algorithms
  • Good written and oral communication skills
  • Strong motivation, with evidence of independent research skills relevant to the project
  • Good time management

Desirable attributes

  •  Team player, eager to learn new technologies, flexible and knowledge of R or Java.

Application process

Prospective applicants are encouraged to contact the supervisor, Professor Leandros Maglaras () to discuss the content of the project and the fit with their qualifications and skills before preparing an application. 

The application must include: 

Research project outline of 2 pages (list of references excluded). The outline may provide details about

  • Background and motivation, explaining the importance of the project, should be supported also by relevant literature. You can also discuss the applications you expect for the project results.
  • Research questions or
  • Methodology: types of data to be used, approach to data collection, and data analysis methods.
  • List of references

The outline must be created solely by the applicant. Supervisors can only offer general discussions about the project idea without providing any additional support.

  • Statement no longer than 1 page describing your motivations and fit with the project.
  • Recent and complete curriculum vitae. The curriculum must include a declaration regarding the English language qualifications of the candidate.
  • Supporting documents will have to be submitted by successful candidates.
  • Two academic references (but if you have been out of education for more than three years, you may submit one academic and one professional reference), on the form can be downloaded here.

Applications can be submitted here.

Download a copy of the project details here.

Engineering (12)

References

[1] Nithish Velagala, Leandros Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas, "Enhancing Privacy of Online Chat Apps Utilising Secure Node End-To-End Encryption (SNE2EE)", 27th IEEE Symposium on Computers and Communications (ISCC 2022), 30 June - 3 July 2022, Rhodes, Greece, DOI: 10.1109/ISCC55528.2022.9912888
[2] Leandros Maglaras, Nick Ayres, Sotiris Moschoyiannis, Leandros Tassiulas, "The end of Eavesdropping Attacks through the Use of Advanced End to End Encryption Mechanisms", IEEE International Conference on Computer Communications (INFOCOM 2022), 2-5 May 2022 // Virtual Conference
[3] Andrabi, S. J., Reiter, M. K., & Sturton, C. (2015). Usability of augmented reality for revealing secret messages to users but not their devices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (pp. 89-102).
[4] Dong, Y., Ling, Y., Wang, D., Liu, Y., Chen, X., Zheng, S., … & Huang, W. (2022). Harnessing molecular isomerization in polymer gels for sequential logic encryption and anticounterfeiting. Science Advances, 8(44), eadd1980.

 About the Project