Personal profile

Biography

Siraj is currently involved in a three-year (2014-17) EPSRC-Funded project App Collusion Detection (ACiD), in collaboration with City and Swansea University, and McAfee (part of Intel Security). As of February 2015, he is seconded to the Knowledge Transfer Network (KTN). He serves as cyber security lead for the KTN coordinating activities across academia, industry and policy. As of March 2015, he is also seconded to MIRA, as part of the Royal Academy of Engineering’s industrial secondment scheme.

From 2013 to 2014, he investigated safety data modelling for the UK Rail Industry, funded by the RSSB. From 2011 to 2013, he was involved with the development of an intelligent control and guidance system for unmanned logistics vehicles for unmanned distribution capability. This work was funded by the Ministry of Defence (MoD) of UK over two phased projects.

From 2010 to 2012, he worked with the transport and logistics sector in the UK investigating efficient and reliable supply chain networks for consignment delivery. This initiative was led by Ricardo and funded by InnovateUK and EPSRC.

In 2011, he participated in the Pairing Scheme by The Royal Society of UK, as part of which he worked with Civil Servants at the Foreign and Commonwealth Office (FCO). In 2010, he served as a EPSRC-Funded Policy Fellow to the Department of Environment, Food and Rural Affairs (Defra) of Her Majesty’s Government (HMG), advising on secure storage and transmission of data from field-based rapid diagnostics devices.

From 2007 to 2009, he worked as a Research Fellow at Cranfield University, at the Defence Academy of the United Kingdom, and from 2006 to 2007 as a Postdoctoral Research Fellow at the International Institute of Software Technology of the United Nations University, Macau SAR China. Prior to academia he worked in the industry developing smart-card based access control systems for use by HMG.

He is the Vice-Chair for the International Federation for Information Processing (IFIP) Technical Committee 6 on Communication Systems, and also a member of the Developing Countries Support Committee (DCSC) of IFIP.

His paper titled A Deployment Value Model for Intrusion Detection Sensors won the Best Paper Award at the 3rd International Conference on Information Security and Assurance (ISA 2009), held in Seoul, Korea in 2009.

He has over sixty-five peer-reviewed research publications. He holds a PhD in Computer Security, MSc in Computer Networking, MA in Higher and Professional Education, and BSc (Honours) in Computing. He is a Chartered Fellow of BCS − The Chartered Institute for IT (FBCS CITP) and also a Chartered Scientist (CSci).

He has served on the Program Committee (PC) for several conferences and has been the PC Co-chair for the 3rd, 4th, 6th and 8th International Workshop on Foundations and Techniques for Open Source Software Certification (OpenCert) in 2009, 2010, 2012 and 2014 respectively. He was the Organisation Co-Chair for OpenCert 2011, held as a satellite event of 9th International Conference on Software Engineering and Formal Methods (SEFM 2011), at Montevideo, Uruguay, in November 2011. He has co-edited a special issue of the journal ‘Science of Computing Programming’ for selected contributions from the OpenCert workshops (2014). He was PC Co-chair for the 1st International Conference on Cyber Security for Sustainable Society (CSSS 2015), held on 26-27th February 2015 in Coventry, UK.

Research Interests

Formal Methods; Network Security ; Open Source Software ; ICT for Developing Countries

Vision Statement

I am currently a Reader in Cyber Security at the Centre for Mobility and Transport at Coventry University. My main research interest lies in systems security, essentially at the intersection of cyber security, systems engineering and traditional computer science. I have addressed a range of problem domains including monitoring of insider and stealthy attacks, automotive cybersecurity, rail safety, and software assurance. My research brings together a mix of research methods including formal methods (process algebra), (Bayesian) statistical analysis and others. I have been involved in research, development and evaluation of large-scale distributed secure systems for over fifteen years. My doctoral and post-doctoral research involved design and verification of security and safety-critical systems.

Fingerprint Fingerprint is based on mining the text of the persons scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Intrusion detection Mathematics
Sensor Mathematics
Open source software Engineering & Materials Science
Attack Mathematics
Redistribution Mathematics
early warning system Earth & Environmental Sciences
safety Earth & Environmental Sciences
Sensor placement Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2008 2017

  • 80 Citations
  • 5 h-Index
  • 23 Article
  • 15 Chapter
  • 2 Conference contribution
  • 2 Paper

Towards a systematic security evaluation of the automotive Bluetooth interface

Cheah, M., Shaikh, S. A., Haas, O. & Ruddle, A. Jul 2017 In : Vehicular Communications. 9, p. 8-18 10 p.

Research output: Contribution to journalArticle

Bluetooth
Interfaces (computer)
Testing

Towards A Testbed for Automotive Cybersecurity

Fowler, D. S., Cheah, H., Shaikh, S. & Bryans, J. 14 Mar 2017 2 p.

Research output: Contribution to conferencePaper

Testbeds
Demonstrations
Simulators
Controllers
Testing

Towards a threat assessment framework for apps collusion

Kalutarage, H. K., Nguyen, H. N. & Shaikh, S. A. 21 Feb 2017 In : Telecommunication Systems. (in press)

Research output: Contribution to journalArticle

Application programs
Android (operating system)
1 Citations

Combining Third Party Components Securely in Automotive Systems

Cheah, H., Shaikh, S., Bryans, J. & Nguyen, H. N. Sep 2016 Information Security Theory and Practice. Foresti, S. & Lopez, J. (eds.). Springer Verlag, Vol. 9895 LNCS, p. 262-269

Research output: Chapter in Book/Report/Conference proceedingConference contribution

methodology

Early Warning Systems for Cyber Defence

Kalutarage, H., Shaikh, S., Lee, B-S., Lee, C. & Kiat, Y. C. 2016 Open Problems in Network Security. Camenisch, J. & Kesdoğan, D. (eds.). Switzerland: Springer Verlag, Vol. 9591, p. 29-42

Research output: Chapter in Book/Report/Conference proceedingChapter

early warning system

Activities 2007 2010

  • 16 Participation in conference
  • 1 Editorial activity

The 2010 International Symposium on Industrial Security and its Applications (InSA-10)

Siraj Shaikh (Member of Programme Committee), 12 Dec 2010, The 2010 International Symposium on Industrial Security and its Applications (InSA-10)

Activity: Conference participationParticipation in conference

4th International Workshop on Foundations and Techniques for Open Source Software Certification (Satellite Event of SEFM 2010)

Siraj Shaikh (Co-chair), 1 Sep 2010, 4th International Workshop on Foundations and Techniques for Open Source Software Certification (Satellite Event of SEFM 2010)

Activity: Conference participationParticipation in conference

5th ACM Symposium on Information, Computer and Communications Security (AsiaCCS’10)

Siraj Shaikh (Member of Programme Committee), 13 Apr 201016 Apr 2010, 5th ACM Symposium on Information, Computer and Communications Security (AsiaCCS’10)

Activity: Conference participationParticipation in conference

IFIP World Computer Congress (WCC)

Siraj Shaikh (Member of Programme Committee), 20 Sep 201023 Sep 2010, IFIP World Computer Congress (WCC)

Activity: Conference participationParticipation in conference

The Sixth International Conference on Open Source Systems (OSS 2010)

Siraj Shaikh (Member of Programme Committee), 30 May 20102 Jun 2010, The Sixth International Conference on Open Source Systems (OSS 2010)

Activity: Conference participationParticipation in conference