BLOG

The Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast is seeking motivated PhD students to work on the following research topics: Secure IoT devices using Digital FingerprintInvestigating Security Vulnerabilities of Approximate ComputingPractical and Post-quantum IoT securityPractical Privacy-preserving homomorphic analyticsPost Quantum Anonymous CredentialFunctional Encryption and its Application For further information and how to apply, please visit the QUB website for PhD study
Presenting the work of AESIN and the UK Automotive Council and Zenzic, supported by Queens University Belfast, University of South Wales, University of Edinburgh and the Turing Institute and with further support from BSI, this series of workshops is designed to: Present and discuss the limitations with existing standards in meeting the requirements of the Automotive and other mobility industries worldwide Present the methodology proposed by AESIN, UK Automotive Council and Zenzic to achieve operationalizable and legally sustainable cyber resilience In the context of that methodology set out the research agenda and give examples of applying the outcomes of existing
The UK Research Institute in Secure Hardware and Embedded Systems (RISE) will be holding the 2nd RISE Annual Conference on 21 November 2019 at the National Liberal Club in London. For further information, and to register, please visit: https://www.ukrise.org/rise-2019-annual-conference/
We are delighted to welcome another new guest blogger to contribute to the RISE blog for August 2019. Shichao Yu is a PhD student at Queen’s University Belfast, working in the world class research centre – The Centre for Secure Information Technology (CSIT). Thank you Shichao! Welcome to Miami – Summer is coming! Hi, I am Shichao, I am typing this blog shortly after the closing remarks of IEEE Computer Society Annual Symposium on VLSI in Miami, which is excellent and provided me an amazing conference experience. This was my first time in Miami, and this is the first conference
Our July blog post has been written by one of our Industrial Stakeholders Advisory Board (ISAB) members. A special thanks from RISE to Ilhan Gurel from Ericsson for contributing this best practice advice. Ilhan is HW and SW security expert at Ericsson. “Security baked in at every layer, not later” Securing entire end to end IoT chain covers securing IoT devices, backends and everything in between as well as life cycle starting from manufacturing and deployment to disposal. Every component in this chain may have different attack surfaces, different adversaries and may be managed by different entities. It is also