-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.html
More file actions
2 lines (2 loc) · 13.2 KB
/
index.html
File metadata and controls
2 lines (2 loc) · 13.2 KB
1
2
<!DOCTYPE html><html><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><title>SafeNetIoT</title><meta name="description" content="The UCL EEE SafeNetIoT lab focuses on the security and privacy of Internet of Things (IoT) devices."/><meta property="og:title" content="SafeNetIoT"/><meta property="og:description" content="The UCL EEE SafeNetIoT lab focuses on the security and privacy of Internet of Things (IoT) devices."/><meta property="og:image" content="/_next/static/media/profile.7c5c4dd2.png"/><meta property="og:type" content="website"/><meta name="next-head-count" content="8"/><link rel="preload" href="/_next/static/css/673ebc16d01c8136.css" as="style"/><link rel="stylesheet" href="/_next/static/css/673ebc16d01c8136.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-69bfa6990bb9e155.js" defer=""></script><script src="/_next/static/chunks/framework-7dc8a65f4a0cda33.js" defer=""></script><script src="/_next/static/chunks/main-84ef8f6faac559d3.js" defer=""></script><script src="/_next/static/chunks/pages/_app-29bc13de28cf3fe8.js" defer=""></script><script src="/_next/static/chunks/2cca2479-5b5e8847aa1af278.js" defer=""></script><script src="/_next/static/chunks/682-b19a9f11b931c958.js" defer=""></script><script src="/_next/static/chunks/890-9517093ffa6ec433.js" defer=""></script><script src="/_next/static/chunks/217-75670a35655c4b74.js" defer=""></script><script src="/_next/static/chunks/pages/index-0fef7c703587d3fb.js" defer=""></script><script src="/_next/static/nfPmu_x71hJSpbIpbGEqW/_buildManifest.js" defer=""></script><script src="/_next/static/nfPmu_x71hJSpbIpbGEqW/_ssgManifest.js" defer=""></script></head><body><div id="__next"><nav class="navbar navbar-expand-sm navbar-light bg-secondary"><div class="container"><a class="navbar-brand" href="/"><span class="">SafeNetIoT</span></a><button class="custom-toggler navbar-toggler" type="button" data-toggle="collapse" data-target="#navbarsExample09" aria-controls="navbarsExample09" aria-expanded="false" aria-label="Toggle navigation"><span class="navbar-toggler-icon"></span></button><div class="collapse navbar-collapse" id="navbarsExample09"><div class="navbar-nav"><a class="nav-link" href="/people">People</a><a class="nav-link" href="/news">News</a><a class="nav-link" href="/research">Research</a><a class="nav-link" href="/lab">Lab</a><a class="nav-link" href="/contact">Contact</a></div></div></div></nav><div class="bg-secondary py-5 px-5"><div class="container"><div class=" row align-items-center"><div class="col-sm-6"><h1 class="text-primary fw-bold display-3">SafeNetIoT</h1><p>The UCL EEE SafeNetIoT Lab pioneers research into securing the Internet of Things (IoT) across critical environments. We identify and analyze vulnerabilities in IoT systems deployed in smart homes, healthcare facilities, and industrial infrastructures. Our work focuses on designing robust security protocols, privacy-preserving architectures, and real-time threat detection mechanisms tailored to constrained IoT ecosystems.</p><div class="text-center"><a class="btn btn-primary my-1 mx-3" href="mailto: anna.mandalari@ucl.ac.uk">Contact Us</a><a target="_blank" rel="noreferrer" class="btn btn-outline-primary my-1 mx-3" href="https://www.ucl.ac.uk/engineering/about/getting-here">Find Us</a></div></div><div class="col-sm-6 text-center"><img class="img-fluid my-3 card-image" width="250" height="250" src="/_next/static/media/profile.7c5c4dd2.png" alt="profile of hashirshoaeb"/></div></div></div></div><div id="about" class="bg-primary py-5 px-5"><div class="container"><h1 class="text-light fw-bold">Recent News</h1><div class="px-sm-5"><div style="margin-bottom:2rem"><h2 class="text-secondary">7th April 2025 - NTNU Lab Tour </h2><p class="text-light">We hosted students and staff from the Norwegian University of Science and Technology's (NTNU) Cybersecurity program. The group engaged directly with our researchers developing revolutionary adaptive defense frameworks capable of evolving alongside emerging threats. </p> <img src="/images/news/NTNUVisit.jpg" alt="News from 7th April 2025 - NTNU Lab Tour " style="width:100%;max-width:400px;height:auto;border-radius:8px"/></div><div style="margin-bottom:2rem"><h2 class="text-secondary">15-16th March 2025 - RIPE NCC DNS Hackathon </h2><p class="text-light">PhD Student Andrew visited Stockholm for RIPE's DNS Hackathon. He formed a team made and developed code to investigate the IoT traffic captures. They uncovered critical DNS-related security vulnerabilities in IoT devices, discovering the highly fingerprintable nature of the traffic</p> <img src="/images/news/RIPENCC.png" alt="News from 15-16th March 2025 - RIPE NCC DNS Hackathon " style="width:100%;max-width:400px;height:auto;border-radius:8px"/></div><div style="margin-bottom:2rem"><h2 class="text-secondary">6th February 2025 - BBC's Blue Room Visit</h2><p class="text-light">We recieved an invitation to visit the BBC's 'Blue Room' - the consumer technology research and demo lab from BBC Research & Development. We discussed our work on Smart TVs as well as our Matter Device study and the security of medical devices</p> <img src="/images/news/BBCVisit.jpg" alt="News from 6th February 2025 - BBC's Blue Room Visit" style="width:100%;max-width:400px;height:auto;border-radius:8px"/></div></div><div class="text-center"><button type="button" class="btn btn-outline-light" href="/news">See More News</button></div></div></div><div id="skills" class="bg-secondary py-5 px-5"><div class="container"><h1 class="text-primary fw-bold">People</h1><div class="d-flex flex-row flex-wrap justify-content-center"><div class="card py-3 px-3 mx-sm-4 my-4 card-work" style="width:20rem"><h4 class="text-primary">Anna Maria Mandalari</h4><p class="text-dark">Anna Maria Mandalari works as Assistant Professor at University College London (UCL). She is affiliated with the Electronic and Electrical Engineering Department, where she is the Director of the SafeNetIoT laboratory and the Director of the Internet Engineering/ Telecommunications MSc/ MRes Programme.</p><div class="text-end"></div></div><div class="card py-3 px-3 mx-sm-4 my-4 card-work" style="width:20rem"><h4 class="text-primary">Baraa Zieni </h4><p class="text-dark">Dr Zieni (B.Eng., M.Eng, Ph.D. ) is a Senior Research Fellow in Computer Science and Engineering, joint the Department of Electrical & Electronic Engineering in UCL in 2024. Her current research is focus on homecare sensing technologies their communication, control system and privacy challenges.</p><div class="text-end"></div></div><div class="card py-3 px-3 mx-sm-4 my-4 card-work" style="width:20rem"><h4 class="text-primary">Aurelio Loris Canino </h4><p class="text-dark">Visiting researcher</p><div class="text-end"></div></div></div></div><div class="text-center"><button type="button" class="btn btn-outline-dark" href="/people">See All People</button></div></div><div id="projects" class="bg-primary py-5 px-5"><div class="container"><h1 class="text-light fw-bold">Research</h1><div class="d-flex flex-row flex-wrap justify-content-center"><div class="card py-3 px-3 mx-sm-4 my-4 card-work" style="width:20rem"><h4 class="text-primary">Hacking Health: Unveiling Vulnerabilities in Wireless Wearable Sensors</h4><p class="text-dark">Mohammad Alhussan highlights the potential vulnerabilities in wearable medical devices that utilise Bluetooth Low Energy (BLE) for communication. He shows how these attacks can compromise not only the confidentiality and integrity of potentially sensitive medical data transmitted by wearable medical devices, but also patients’ privacy and safety as well as sensors’ reliability</p><div class="text-end"><a target="_blank" rel="noreferrer" href="/biosensors2024.html">
<svg aria-hidden="true" focusable="false" data-prefix="fab" data-icon="researchgate" class="svg-inline--fa fa-researchgate fa-2x icon-style mx-1" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M0 32v448h448V32H0zm262.2 334.4c-6.6 3-33.2 6-50-14.2-9.2-10.6-25.3-33.3-42.2-63.6-8.9 0-14.7 0-21.4-.6v46.4c0 23.5 6 21.2 25.8 23.9v8.1c-6.9-.3-23.1-.8-35.6-.8-13.1 0-26.1.6-33.6.8v-8.1c15.5-2.9 22-1.3 22-23.9V225c0-22.6-6.4-21-22-23.9V193c25.8 1 53.1-.6 70.9-.6 31.7 0 55.9 14.4 55.9 45.6 0 21.1-16.7 42.2-39.2 47.5 13.6 24.2 30 45.6 42.2 58.9 7.2 7.8 17.2 14.7 27.2 14.7v7.3zm22.9-135c-23.3 0-32.2-15.7-32.2-32.2V167c0-12.2 8.8-30.4 34-30.4s30.4 17.9 30.4 17.9l-10.7 7.2s-5.5-12.5-19.7-12.5c-7.9 0-19.7 7.3-19.7 19.7v26.8c0 13.4 6.6 23.3 17.9 23.3 14.1 0 21.5-10.9 21.5-26.8h-17.9v-10.7h30.4c0 20.5 4.7 49.9-34 49.9zm-116.5 44.7c-9.4 0-13.6-.3-20-.8v-69.7c6.4-.6 15-.6 22.5-.6 23.3 0 37.2 12.2 37.2 34.5 0 21.9-15 36.6-39.7 36.6z"></path></svg></a></div></div><div class="card py-3 px-3 mx-sm-4 my-4 card-work" style="width:20rem"><h4 class="text-primary">An Investigation of Matter Smart Home Mechanisms to Mitigate Denial-of-Service (DoS) Attacks</h4><p class="text-dark">Andrew Losty's research examines the relatively new open-source Smart Home automation protocol, Matter. This protocol aims to unify the Smart Home ecosystem, eliminating the need for multiple apps and competing architectures, and is supported by over 270 manufacturers, including major tech leaders such as Amazon, Google, Apple, and Samsung.</p><div class="text-end"><a target="_blank" rel="noreferrer" href="https://www.ewsn.org/file-repository/ewsn2024/EWSN24-PSCE_paper_14.pdf"><svg aria-hidden="true" focusable="false" data-prefix="fab" data-icon="researchgate" class="svg-inline--fa fa-researchgate fa-2x icon-style mx-1" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M0 32v448h448V32H0zm262.2 334.4c-6.6 3-33.2 6-50-14.2-9.2-10.6-25.3-33.3-42.2-63.6-8.9 0-14.7 0-21.4-.6v46.4c0 23.5 6 21.2 25.8 23.9v8.1c-6.9-.3-23.1-.8-35.6-.8-13.1 0-26.1.6-33.6.8v-8.1c15.5-2.9 22-1.3 22-23.9V225c0-22.6-6.4-21-22-23.9V193c25.8 1 53.1-.6 70.9-.6 31.7 0 55.9 14.4 55.9 45.6 0 21.1-16.7 42.2-39.2 47.5 13.6 24.2 30 45.6 42.2 58.9 7.2 7.8 17.2 14.7 27.2 14.7v7.3zm22.9-135c-23.3 0-32.2-15.7-32.2-32.2V167c0-12.2 8.8-30.4 34-30.4s30.4 17.9 30.4 17.9l-10.7 7.2s-5.5-12.5-19.7-12.5c-7.9 0-19.7 7.3-19.7 19.7v26.8c0 13.4 6.6 23.3 17.9 23.3 14.1 0 21.5-10.9 21.5-26.8h-17.9v-10.7h30.4c0 20.5 4.7 49.9-34 49.9zm-116.5 44.7c-9.4 0-13.6-.3-20-.8v-69.7c6.4-.6 15-.6 22.5-.6 23.3 0 37.2 12.2 37.2 34.5 0 21.9-15 36.6-39.7 36.6z"></path></svg></a></div></div><div class="card py-3 px-3 mx-sm-4 my-4 card-work" style="width:20rem"><h4 class="text-primary">Enabling Lawful Interception in Environments Protected by IoT Safeguard</h4><p class="text-dark">Aurelio Canino's work analyzes a novel challenge: the potential exploitation of IoT devices for covert lawful interceptions, circumventing existing IoT safeguards. In this paper, a system to clandestinely capture audio or video data from IoT devices without an IoT safeguard being able to detect it is defined. </p><div class="text-end"><a target="_blank" rel="noreferrer" href="https://www.researchgate.net/publication/383139967_Enabling_Lawful_Interception_in_Environments_Protected_by_IoT_Safeguard"><svg aria-hidden="true" focusable="false" data-prefix="fab" data-icon="researchgate" class="svg-inline--fa fa-researchgate fa-2x icon-style mx-1" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M0 32v448h448V32H0zm262.2 334.4c-6.6 3-33.2 6-50-14.2-9.2-10.6-25.3-33.3-42.2-63.6-8.9 0-14.7 0-21.4-.6v46.4c0 23.5 6 21.2 25.8 23.9v8.1c-6.9-.3-23.1-.8-35.6-.8-13.1 0-26.1.6-33.6.8v-8.1c15.5-2.9 22-1.3 22-23.9V225c0-22.6-6.4-21-22-23.9V193c25.8 1 53.1-.6 70.9-.6 31.7 0 55.9 14.4 55.9 45.6 0 21.1-16.7 42.2-39.2 47.5 13.6 24.2 30 45.6 42.2 58.9 7.2 7.8 17.2 14.7 27.2 14.7v7.3zm22.9-135c-23.3 0-32.2-15.7-32.2-32.2V167c0-12.2 8.8-30.4 34-30.4s30.4 17.9 30.4 17.9l-10.7 7.2s-5.5-12.5-19.7-12.5c-7.9 0-19.7 7.3-19.7 19.7v26.8c0 13.4 6.6 23.3 17.9 23.3 14.1 0 21.5-10.9 21.5-26.8h-17.9v-10.7h30.4c0 20.5 4.7 49.9-34 49.9zm-116.5 44.7c-9.4 0-13.6-.3-20-.8v-69.7c6.4-.6 15-.6 22.5-.6 23.3 0 37.2 12.2 37.2 34.5 0 21.9-15 36.6-39.7 36.6z"></path></svg></a></div></div></div><div class="text-center"><button type="button" class="btn btn-outline-light" href="/research">See All Research</button></div></div></div><div id="contact" class="bg-white py-5 px-5"><div class="container"><h1 class="text-primary fw-bold">Get in touch</h1><div class="px-sm-5"><p>Please do not hesitate to reach out to collaborate etc.</p><div class=""><a class="btn btn-primary my-1 mx-3" href="mailto:anna.mandalari@ucl.ac.uk">Email Us</a><a class="btn btn-outline-primary my-1 mx-3" href="https://topmate.io/hashirshoaeb">Schedule Meeting</a></div></div></div></div><footer class="bg-secondary text-center py-2 px-5"><div class="container text-muted"><small>© 2021 <!-- --> <a href="https://github.com/hashirshoaeb">hashirshoaeb</a>. Open sourced with love under <!-- --> <a href="https://github.com/hashirshoaeb/portfolio/blob/main/LICENSE">MIT</a> <!-- --> License</small></div></footer></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{}},"page":"/","query":{},"buildId":"nfPmu_x71hJSpbIpbGEqW","nextExport":true,"autoExport":true,"isFallback":false,"scriptLoader":[]}</script></body></html>