Staff profile
Affiliation |
---|
Academic Visitor in the Department of Computer Science |
Biography
Career Highlight
The main theme of my research is security engineering and practical cryptography. I research physical security, web security and trustworthy machine learning; however, I am always ready to explore exciting research topics.
The results of my research have been published in esteemed media outlets such as The Economist, Wall Street Journal, Guardian and BBC. I am an invited expert in the Device and Sensor Group of the World Wide Web Consortium (W3C). There, I collaborate with other members to set new standards for security and privacy issues of sensor connectivity in modern browsers.
Also, I am interested in hardware security and secure identification of smart devices in various Internet of Things (IoT) infrastructures.
Research interests
- Trust in Emerging Technologies
- Integrity Assurance Mechanisms
- Side Channel Attacks
- Web Browser Security
- Trustworthy Machine Learning
Publications
Conference Paper
- Toreini, E., Aitken, M., Coopamootoo, K., Elliott, K., Zelaya, C. G., & van Moorsel, A. (2020, December). The relationship between trust in AI and trustworthy machine learning technologies. Presented at Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency
- Aitken, M., Ng, M., Toreini, E., van Moorsel, A., Coopamootoo, K. P., & Elliott, K. (2020, December). Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking. Presented at European Symposium on Research in Computer Security 2020, Guildford, England
- Mehrnezhad, M., & Toreini, E. (2019, December). What Is This Sensor and Does This App Need Access to It?. Presented at Informatics
- Mehrnezhad, M., Toreini, E., & Alajrami, S. (2018, December). Making sense of sensors: mobile sensor security awareness and education. Presented at Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust
- Mehrnezhad, M., Toreini, E., Shahandashti, S. F., & Hao, F. (2015, December). Touchsignatures: Identification of user touch actions based on mobile sensors via javascript. Presented at Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Doctoral Thesis
Journal Article
- Clarke, D., Toreini, E., & Hao, F. (online). Determining User Passwords From Partial Information
- Toreini, E., Randell, B., & Hao, F. (online). An acoustic side channel attack on enigma
- Ng, M., Coopamootoo, K. P., Toreini, E., Aitken, M., Elliot, K., & van Moorsel, A. (online). Simulating the Effects of Social Presence on Trust, Privacy Concerns \& Usage Intentions in Automated Bots for Finance
- Hao, F., Wang, S., Bag, S., Procter, R., Shahandashti, S. F., Mehrnezhad, M., Toreini, E., Metere, R., & Liu, L. (online). End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead
- McCorry, P., Toreini, E., & Mehrnezhad, M. (online). Removing trusted tallying authorities
- Toreini, E., Aitken, M., Coopamootoo, K. P., Elliott, K., Zelaya, V. G., Missier, P., Ng, M., & van Moorsel, A. (online). Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context
- Mehrnezhad, M., Coopamootoo, K., & Toreini, E. (2022). How Can and Would People Protect From Online Tracking?. Proceedings on Privacy Enhancing Technologies, 1, 105-125. https://doi.org/10.2478/popets-2022-0006
- Wang, S., Toreini, E., & Hao, F. (2021). Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. IEEE Transactions on Information Forensics and Security, 16, 2823-2835. https://doi.org/10.1109/tifs.2021.3067440
- Aitken, M., Toreini, E., Carmichael, P., Coopamootoo, K., Elliott, K., & van Moorsel, A. (2020). Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices
- Toreini, E., Shahandashti, S. F., Mehrnezhad, M., & Hao, F. (2019). DOMtegrity: ensuring web page integrity against malicious browser extensions
- Mehrnezhad, M., Toreini, E., Shahandashti, S. F., & Hao, F. (2018). Stealing PINs via mobile sensors: actual risk versus user perception
- Mehrnezhad, M., Bafghi, A. G., Harati, A., & Toreini, E. (2017). PiSHi: click the images and I tell if you are a human
- Toreini, E., Shahandashti, S. F., & Hao, F. (2017). Texture to the rescue: Practical paper fingerprinting based on texture patterns
- Mehrnezhad, M., Toreini, E., Shahandashti, S. F., & Hao, F. (2016). Touchsignatures: identification of user touch actions and pins based on mobile sensor data via javascript. Journal of Information Security and Applications, 26, 23-38
- Mehrnezhad, M., Toreini, E., Shahandashti, S., & Hao, F. (2016). Identification of user touch actions and PINs based on mobile sensor data via JavaScript. Journal of Information Security and Applications, 26, 23 - 38
- Satvat, K., Forshaw, M., Hao, F., & Toreini, E. (2014). On the privacy of private browsing-A forensic approach. Journal of Information Security and Applications, 19(1), 88-100