Staff profile

Affiliation |
---|
Academic Visitor in the Department of Computer Science |
Biography
Career Highlight
The main theme of my research is security engineering and practical cryptography. I research physical security, web security and trustworthy machine learning; however, I am always ready to explore exciting research topics.
The results of my research have been published in esteemed media outlets such as The Economist, Wall Street Journal, Guardian and BBC. I am an invited expert in the Device and Sensor Group of the World Wide Web Consortium (W3C). There, I collaborate with other members to set new standards for security and privacy issues of sensor connectivity in modern browsers.
Also, I am interested in hardware security and secure identification of smart devices in various Internet of Things (IoT) infrastructures.
Research interests
- Trust in Emerging Technologies
- Integrity Assurance Mechanisms
- Side Channel Attacks
- Web Browser Security
- Trustworthy Machine Learning
Publications
Conference Paper
- The relationship between trust in AI and trustworthy machine learning technologiesToreini, E., Aitken, M., Coopamootoo, K., Elliott, K., Zelaya, C. G., & van Moorsel, A. (2020). The relationship between trust in AI and trustworthy machine learning technologies. Presented at Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency.
- Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in BankingAitken, M., Ng, M., Toreini, E., van Moorsel, A., Coopamootoo, K. P., & Elliott, K. (2020). Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking. In ESORICS 2020: Computer Security (pp. 21-38). Springer Verlag. https://doi.org/10.1007/978-3-030-66504-3_2
- What Is This Sensor and Does This App Need Access to It?Mehrnezhad, M., & Toreini, E. (2019). What Is This Sensor and Does This App Need Access to It?. Presented at Informatics.
- Making sense of sensors: mobile sensor security awareness and educationMehrnezhad, M., Toreini, E., & Alajrami, S. (2018). Making sense of sensors: mobile sensor security awareness and education. Presented at Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust.
- Touchsignatures: Identification of user touch actions based on mobile sensors via javascriptMehrnezhad, M., Toreini, E., Shahandashti, S. F., & Hao, F. (2015). Touchsignatures: Identification of user touch actions based on mobile sensors via javascript. Presented at Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security.
Doctoral Thesis
- New advances in tamper evident technologiesToreini, E. (2018). New advances in tamper evident technologies [Thesis]. Newcastle University.
Journal Article
- How Can and Would People Protect From Online Tracking?Mehrnezhad, M., Coopamootoo, K., & Toreini, E. (2022). How Can and Would People Protect From Online Tracking?. Proceedings on Privacy Enhancing Technologies, 1, 105-125. https://doi.org/10.2478/popets-2022-0006
- Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate FingerprintingWang, S., Toreini, E., & Hao, F. (2021). Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. IEEE Transactions on Information Forensics and Security, 16, 2823-2835. https://doi.org/10.1109/tifs.2021.3067440
- Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practicesAitken, M., Toreini, E., Carmichael, P., Coopamootoo, K., Elliott, K., & van Moorsel, A. (2020). Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Big Data \& Society, 7(1).
- DOMtegrity: ensuring web page integrity against malicious browser extensionsToreini, E., Shahandashti, S. F., Mehrnezhad, M., & Hao, F. (2019). DOMtegrity: ensuring web page integrity against malicious browser extensions. International Journal of Information Security, 18(6), 801-814.
- Stealing PINs via mobile sensors: actual risk versus user perceptionMehrnezhad, M., Toreini, E., Shahandashti, S. F., & Hao, F. (2018). Stealing PINs via mobile sensors: actual risk versus user perception. International Journal of Information Security, 17(3), 291-313.
- PiSHi: click the images and I tell if you are a humanMehrnezhad, M., Bafghi, A. G., Harati, A., & Toreini, E. (2017). PiSHi: click the images and I tell if you are a human. International Journal of Information Security, 16(2), 133-149.
- Texture to the rescue: Practical paper fingerprinting based on texture patternsToreini, E., Shahandashti, S. F., & Hao, F. (2017). Texture to the rescue: Practical paper fingerprinting based on texture patterns. ACM Transactions on Privacy and Security (TOPS), 20(3), 1-29.
- Identification of user touch actions and PINs based on mobile sensor data via JavaScriptMehrnezhad, M., Toreini, E., Shahandashti, S., & Hao, F. (2016). Identification of user touch actions and PINs based on mobile sensor data via JavaScript. Journal of Information Security and Applications, 26, 23-38.
- Touchsignatures: identification of user touch actions and pins based on mobile sensor data via javascriptMehrnezhad, M., Toreini, E., Shahandashti, S. F., & Hao, F. (2016). Touchsignatures: identification of user touch actions and pins based on mobile sensor data via javascript. Journal of Information Security and Applications, 26, 23-38.
- On the privacy of private browsing-A forensic approachSatvat, K., Forshaw, M., Hao, F., & Toreini, E. (2014). On the privacy of private browsing-A forensic approach. Journal of Information Security and Applications, 19(1), 88-100.
- An acoustic side channel attack on enigmaToreini, E., Randell, B., & Hao, F. (n.d.). An acoustic side channel attack on enigma. School of Computing Science Technical Report Series. Advance online publication.
- Simulating the Effects of Social Presence on Trust, Privacy Concerns \& Usage Intentions in Automated Bots for FinanceNg, M., Coopamootoo, K. P., Toreini, E., Aitken, M., Elliot, K., & van Moorsel, A. (n.d.). Simulating the Effects of Social Presence on Trust, Privacy Concerns \& Usage Intentions in Automated Bots for Finance. ArXiv Preprint arXiv:2006.15449. Advance online publication.
- End-to-End Verifiable E-Voting Trial for Polling Station Voting at GatesheadHao, F., Wang, S., Bag, S., Procter, R., Shahandashti, S. F., Mehrnezhad, M., Toreini, E., Metere, R., & Liu, L. (n.d.). End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. IEEE Security \& Privacy. Advance online publication.
- Determining User Passwords From Partial InformationClarke, D., Toreini, E., & Hao, F. (n.d.). Determining User Passwords From Partial Information. School of Computing Science Technical Report Series. Advance online publication.
- Removing trusted tallying authoritiesMcCorry, P., Toreini, E., & Mehrnezhad, M. (n.d.). Removing trusted tallying authorities. School of Computing Science Technical Report Series. Advance online publication.
- Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical ContextToreini, E., Aitken, M., Coopamootoo, K. P., Elliott, K., Zelaya, V. G., Missier, P., Ng, M., & van Moorsel, A. (n.d.). Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context. ArXiv Preprint arXiv:2007.08911. Advance online publication.