Research & Collaborations

PIEAS

Cyber Reconnaissance and Combat (CRC) Lab



Netspection

Netspection delivers unprecedented levels of security while offering flexible deployment options that help you optimize network investments. It provides category-best security effectiveness, scalable in-line performance, and next generation IDS controls that take the guesswork out of security management. Unify network security management across physical and virtual environments, streamline security operations, and protect your business from the latest malware, zero-day attacks, botnets, denial-ofservice (DoS) attempts and advanced targeted attacks.

SIEM

SIEM solutions are an important part of the data security ecosystem: they aggregate data from multiple systems and analyze that data to catch abnormal behavior or potential cyber-attacks. Netspection SIEM collects logs and alerts from distributed devices. Netspection SIEM, performs the network scanning to discover a live host available on the network and detects the operating system and network configuration.

PIEAS

Blockchain Security Lab



PKICHAIN Chain Solution

PKIChain is a blockchain-based certificate issuance, management, and revocation system to issue digital certificates for domain owners. It provides new SSL certificates, manages them, updates them, and revokes them. Every issuance operation happens with the consensus of multiple network nodes. Being built on blockchain, it offers transparency, audit, and tracking. Our solution is resilient against modern-day attacks such as tampering with centralized logs and records, denial of service (DOS), distributed denial of service (DDOS), CA power abuse, state-funded attacks, faulty systems or infrastructure.

Find out more
NED

Internet Security and Quantum Technology Lab



Security & Threat Intellingence Platform

This solution provides security controls and in-depth Threat Intelligence at a centralizes location, providing interactive dashboards. With the capability of Asset Discovery & Asset Management this solution enumerates their relationship to provide better view of your infrastructure.
Find out more



File Integrity Monitoring

It is an internal control or process that performs the act of validating the integrity of operating system and application software flies using a verification method between the current file state and a known, good baseline.
Find out more

UETL

Internet of Things (IoT) Security Lab



ThingzAnalyzer

Thingz Analyzer is an online cloud based service that Performs automated firmware security analysis and also integrates the device hardware analysis done by the team. It serves as a physician of your IoT device that delivers a 360 security analysis for vulnerabilities in both software and hardware.
Find out more



THINGZFIREWALL

ThingzFirewall Lite is a smart home/office firewall that has been designed to protect all your internet connected devices present at home or SME.
Find out more

UETL

Innovative Secured Systems Lab



Automated Tool for Security Asset Classification (ATSAC)

ATSAC provides an organization a detailed overview about the security requirements for their assets and to prioritize their assets for security testing by providing them a detailed report.

ISSL-Testbed for Web Application Vulnerabilities

ISSL-Testbed is deliberately insecure web application used for training/practice and development of vulnerability testing tools and techniques in controlled environments.

Evolutionary Algorithm based Vulnerability Detection Tool

EAB-VDT is purely based on evolutionary algorithm (EA) to generate effective testcases for the following vulnerabilities and detect them in an adequate time.
--- JSON Injection
--- Cross Site Scripting

Software Testbed for Cyber Secured Smart Logistics Framework

The testbed is used to test secured smart logistics frameworks.

Smart Container

Smart Container is based on the integration of IoT technology with logistic modules.The container is used to securely transmit information of environmental parameters inside a container during land or sea transportation to ensure confidentiality and integrity of the transmitted data.

Supply Chain Management Application

A decentralized approach to a Management Information System (MIS). Keeps track of every step or movement of products by using blockchain technology to identify the origin of an item and tracking its path from its source to destination. Provides easy to use and modern interface for all stakeholders.

Pseudonym based Anonymous Chat Application (Chapp)

Chaap is pseudonym based anonymous chatting application focused on privacy and secrecy of chats. Chaap provided as a basic application platform for organization which will further be customized depending on the organizational requirements i.e., file sharing mechanisms, notifications system mechanism etc.

 Air University

Devices and Network Security Lab



AUWATCH

AUWatch is a Mobile Device Management solution that enables you to secure, manage, and control all the Android-based mobile devices of your business via a web-based console. It is easy to use, fast to deploy, and user-friendly to adopt a new way.
Find out more

AUDROID

AUDroid is a security-enhanced customized OS that is based on Android Open-Source Project (AOSP) and provides secure ways to mitigate against potential malicious attacks.
Find out more

AUSIEM

A smart and simple way to manage, visualize and prioritize network security alerts. Continuous real-time security that allows identification of activities, trends, and patterns easily. Dynamic real-time view of all network connections, system activities, and user interactions.
Find out more

AUNIDS

AUNIDS actively detects any malicious activity that is occurring inside the network. It continuously monitors the traffic flow across the network and correspondingly reports events and alerts on a real-time basis in the web-based GUI.
Find out more

 Air University

National Cyber Crime Forensics Lab



FORKIT

FORKIT is a computer forensics toolkit that helps in analyzing the forensics evidences acquired from the potentially compromised system. It scans the file structure and place them into separate categories, for further detailed analysis. Implemented as Graphical application, designed to ease the investigator in understanding and working of the application. Its UI focuses on anticipating what examiner might need to do and ensuring that the interface has elements that are easy to access, understand, and use to facilitate those actions.
Find out more

FORECOVER

Forecover is created especially for data recovery purpose, using careful reconstruction of file system containing loss files which were deleted during the event, without meddling of original data. Application also provide the bytes level data scanning, making sure no information or file is missed.
Find out more

CYBER PATROLLING

Cyber Patrolling is social media forensics analyzer that can monitor the trends and user profiles for investigation. The fast tracking of trends and posts over the social media is beneficial for the government and the law enforcement agencies to reduce the external influence on officials. Application implemented as SaaS, which can be easily available to anyone. It can monitor profiles, channels, pages blogs, trends and hashtag simultaneously while also generating visual analytics and reports for better understanding.
Find out more

PROFYLER

Person cellphone can tell a lot about the personality of person, what types of applications person use, what types of content is searched. Everything can be possible with forensics application like Profyler. Profyler is a Mobile Forensics Application that can acquire, analyze, and review the data from android devices. Few features that can be analyzed while using Profyler includes deleted files recovery, and application details analysis.
Find out more

NUST

Security Auditing and Evaluation Lab



Operating System Compliance toolkit

The Cyberium Compliance Check is a security solution that gathers information about the current security controls deployed on the system. It allows the user to get in-depth configurations of the system such as Network settings, Countermeasures like firewalls, and other security mechanisms, User accounts, Cryptographic Services, Internet Access History, Logs of the system, software installed, Remote desktop settings and overall security state of the Operating System. The toolkit has an intuitive GUI which has been made while keeping the ease of use in mind. The report generated by the system provides both an analytical view for top management and technical nittygritty details for the security experts. At the end, toolkit generates a detailed user intuitive web and pdf report of the identified vulnerabilities.

Web Security Assessment Toolkit

The WebSAT toolkit is developed with the objectives of the assessment of web applications and the detection of vulnerabilities that exist in them. This toolkit mainly developed to detect OWASP Top 10 declared vulnerabilities. The main functionalities of this toolkit are scanning of the web application, detection and analyzing vulnerabilities, and generating reports for detected vulnerabilities. At the end, toolkit generates a detailed user intuitive web and pdf report of the identified vulnerabilities.

Firmware Extraction Analysis and Security Assessment Toolkit

FEAST is an automated novel toolkit to perform the security assessment of embedded devices. After filesystem unpacking, the proposed framework supports the in-depth security analysis of executable firmware binaries to detect vulnerabilities. For serving the purpose, a mechanism has been defined using the static and code analysis. The main functionalities of toolkit are firmware extraction, firmware unpacking, filesystem extraction, and vulnerability reporting. At the end, toolkit generates a detailed user intuitive web and pdf report of the identified vulnerabilities.