Gordon Russell

Gordon Russell

Dr Gordon Russell

Associate Professor

Biography

Gordon is Head of Subject of the Cyber Security and Networks group, which has a successful portfolio of undergraduate and postgraduate programmes and around 15 staff. His current research interests focus on Cryptography, Digital Forensics and Cyber Security.
He has led the development of the GCHQ certified MSc Advanced Security and Digital Forensics, including introducing new modes of study including distance learning.  Along with this Gordon led the development of the MSc Advanced Security and Cybercrime, which provides distance learning opportunities for postgraduate studies. He project manages the BSc Cyber Higher Apprenticeship degree in the School.
Gordon has also helped develop The Cyber Academy, which aims to disseminate cyber intelligence at both a national and international level, with current links in Europe to law enforcement. He is currently an external examiner at the University of Bedfordshire.
Gordon has a strong international reputation, which has been built on innovative teaching and virtualization environments, such as LinuxZoo. His current research work investigates decrypting messages using keys extracted from active virtual machines, forensic triage techniques to improve the speed of forensics analysis, and detecting cyber attacks on industrial systems including public water supplies.

News

Events

Esteem

Advisory panels and expert committees or witness

  • Member of the Technical Expert Group for Cyber Security apprenticeships

 

External Examining/Validations

  • External Examiner at Bedfordshire University
  • External Examiner at Northumbria University

 

Date


53 results

5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum

Conference Proceeding
Khan, J. S., Tahir, A., Ahmad, J., Shah, S. A., Abbasi, Q. H., Russell, G., & Buchanan, W. (2020)
5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum. In Intelligent Computing: Proceedings of the 2020 Computing Conference, Volume 3. https://doi.org/10.1007/978-3-030-52243-8_3
Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairme...

Forensic Considerations for the High Efficiency Image File Format (HEIF)

Conference Proceeding
Mckeown, S., & Russell, G. (in press)
Forensic Considerations for the High Efficiency Image File Format (HEIF
The High Efficiency File Format (HEIF) was adopted by Apple in 2017 as their favoured means of capturing images from their camera application, with Android devices such as the...

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., …Abbasi, Q. H. (2020)
Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachines, 11(4), https://doi.org/10.3390/mi11040379
Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies ...

Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (in press)
Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features
Industrial Control Systems have become a priority domain for cybersecurity practitioners due to the number of cyber-attacks against those systems has increased over the past f...

Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems

Journal Article
Mckeown, S., Russell, G., & Leimich, P. (2020)
Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems. Journal of Digital Forensics, Security and Law, 14(3),
A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and check...

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2019)
WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels. In Proceedings of 15th IEEE International Conference on Control & Automation (ICCA)https://doi.org/10.1109/ICCA.2019.8899564
Industrial Control Systems (ICS) have faced a growing number of threats over the past few years. Reliance on isolated controls networks or air-gapped computers is no longer a ...

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

Journal Article
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019)
Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, https://doi.org/10.1016/j.jisa.2019.102372
There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly r...

PLC Memory Attack Detection and Response in a Clean Water Supply System

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018, (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...

Current Post Grad projects

Previous Post Grad projects