- Cyber Security Challenges and Opportunities in the Context of Pakistan - 2015-03-04
- Papers presented in ICOSST held at UET Lahore - 2014-12-18
- A Journal Paper Accepted in The computer Journal, Oxford Journals - 2014-12-08
- SpringerOpen journal Paper published - 2014-11-11
- NUST Intra Research Conference - 2014-11-08
Mr. Ubaid Ur Rehman
Ubaid Ur Rehman completed his Bachelor’s degree in Telecommunication and Networking from COMSATS Institute of Information Technology in June 2012. In his final year project, he developed an “Open Source Embedded VoIP System for Enterprises” using single board computer and deployed it at COMSATS, Abbottabad. Ubaid Ur Rehman joined NUST School of Electrical Engineering and Computer Science (SEECS) in September 2012 for pursuing his Master’s degree in Computer and Communication Security. He has successfully completed his course work and currently doing thesis under the supervision of Dr. Abdul Ghafoor. In his thesis “Formal Design & Verification of Security Protocol for VoIP”, he designed a secure layered architecture for VoIP signaling protocol SIP and adds a new Security layer to the standard SIP layer model. The functional integration of the proposed Security layer with the standard SIP layer model is based on his designed “Session Initiation Protocol using Single Sign-On (SIPSSO)” protocol. Moreover, the designed secure layered architecture of SIP provides a strong resistance against eavesdropping, man-in-the-middle, message tampering, replay, session tear down, and spam over internet telephony attacks.
His association with KTH-SEECS AIS Lab started in September 2013 as a Project Lead in final year project of undergraduate students, entitled as “Generic Security Services for Lightweight VoIP Clients”. After the completion of the students FYP project, he started working as a Research Assistant in HEC funded project entitled as “Ontology-based Protocol Validation for Increased Web Application Security”. His research interests include, but are not limited to cloud computing security, cryptography, secure technologies, security in mobile applications, security protocols, and VoIP security. In the future, he wants to pursue a PhD degree in the field of cryptography and network security.
- Absract (PDF)