skip to content

Department of Computer Science and Technology

Read more at: Police responses to young people’s experiences of cyberstalking

Police responses to young people’s experiences of cyberstalking

Friday, 31 January, 2025 - 14:00 to 15:00

In our digitally interconnected world, cyberstalking has become a significant concern for online users worldwide. Young people have embraced new technologies for communication, making social media apps such as Facebook, X, Instagram, Snapchat and other platforms an integral part of their lives for communicating with each...


Read more at: Fighting cancer and fake news: A battle against misinformation

Fighting cancer and fake news: A battle against misinformation

Tuesday, 18 March, 2025 - 14:00 to 15:00

Cancer-related medical misinformation is a wicked problem, deeply embedded in social, cultural, and technical systems. It represents a deliberate and profit-driven phenomenon, perpetuated by bad actors exploiting online platforms and societal vulnerabilities. Cancer misinformation thrives on information asymmetry, where...


Read more at: Physical-Layer Security of Satellite Communications Links

Physical-Layer Security of Satellite Communications Links

Tuesday, 18 February, 2025 - 14:00 to 15:00

In recent years, building and launching satellites has become considerably cheaper, making satellite systems more accessible to an expanding user base. This accessibility has led to a diverse array of applications—such as navigation, communications, and earth observation—that depend on satellites. However, hardware...


Read more at: Towards a Faster Finality Protocol for Ethereum

Towards a Faster Finality Protocol for Ethereum

Tuesday, 4 March, 2025 - 14:00 to 15:00

Ethereum's Gasper consensus protocol typically requires 64 to 95 slots-the units of time during which a new chain extending the previous one by one block is proposed and voted-to finalize, even under ideal conditions with synchrony and honest validators. This exposes a significant portion of the blockchain to potential...


Read more at: Designing Counter Strategies against Online Harms

Designing Counter Strategies against Online Harms

Tuesday, 11 February, 2025 - 14:00 to 15:00

Common mitigation strategies to combat harmful speech online, such as reporting and blocking, are often insufficient as they are reactive, involve unethical human labour and impose censorship. This explores alternative counter strategies such as a quarantining tool and automated counterspeech generator. Quarantining online...


Read more at: Bluesky and the AT Protocol: Usable Decentralized Social Media

Bluesky and the AT Protocol: Usable Decentralized Social Media

Friday, 22 November, 2024 - 14:00 to 15:00

Bluesky is a new social network built upon the AT Protocol, a decentralized foundation for public social media. It was launched in private beta in February 2023, and has grown to over 16 million registered users by November 2024. In this talk I introduce the architecture of Bluesky and the AT Protocol, and explain how the...


Read more at: Cyber security and privacy issues raised by mobile data extraction for evidential purposes. 

Cyber security and privacy issues raised by mobile data extraction for evidential purposes. 

Tuesday, 26 November, 2024 - 14:00 to 15:00

Please note this talk is online only. The focus of this lecture will be on privacy and cyber-security issues raised by extracting mobile data for evidential purposes. Firstly, we will provide an overview of our TAS funded project “Trustworthy and useful tools for mobile extraction” led by Helena Webb. We will also describe...


Read more at: On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Learnings from XZ

On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Learnings from XZ

Tuesday, 19 November, 2024 - 14:00 to 15:00

An emerging supply-chain attack due to a backdoor in XZ Utils has been identified. The backdoor allows an attacker to run commands remotely on vulnerable servers utilizing SSH without prior authentication. We have analyzed the critical attack path to discuss current mitigation strategies for such kinds of supply-chain...


Read more at: Title to be confirmed

Title to be confirmed

Tuesday, 10 December, 2024 - 14:00 to 15:00

Abstract not available


Read more at: Design and Verification of Byzantine Fault Tolerant CRDTs

Design and Verification of Byzantine Fault Tolerant CRDTs

Friday, 15 November, 2024 - 14:00 to 15:00

Decentralized collaboration systems offer powerful solutions for various applications. For instance, Wikipedia currently requires significant operational costs to maintain its servers, but a decentralized alternative could run without such constraints. However, maintaining data consistency across peers remains challenging...