Academic Patners

Information Technology University (ITU)
Blockchain Security Lab

The blockchain is often considered as the internet 2.0. The blockchain, essentially a database and a giant network, known as a distributed ledger, records ownership and value, and allows anyone with access to view and take part. The blockchain is currently having its biggest impact in financial services, with the largest changes caused by infrastructures using blockchain APIs, which are delivering in the areas of speed in data processing, transparency (amongst the right people) and security. The blockchain offers consumers opportunity to achieve greater control over their information. This will impact on most organisations, as they increasingly rely on the acquisition and application of customer data.

The lab will deliver following applications using blockchain technology

  • Blockchain-powered Trust management system for identity authentication
  • Blockchain-based storage of Highly sensitive data.
  • Detection and Mitigation system for vulnerabilities in blockchain (private data-leakage)

The above-mentioned application areas are symbiotic and complement each other: only trusted entities are allowed to update data stored in blockchains running on hardware that are being protected against data leakage attacks.

Our People

Our core members and researchers are academics, developers, administrators and MS/PhD students. Our industrial partners are public and private cyber security organizations that advise us on the design, implementation and commercialization of the R&D work originating from our Lab.

Core Members
Principle Investigator/Director

The Lab is managed by a Principle Investigator (PI) and three Co-PIs
who are leading one research project each with the support of project team leads.

Dr.Muhammad Umar Janjua

Principal Investigator
CO-PI Trust Management

Dr. Ali Ahmed

Co-Principal Investigator
Data Immutability

Dr. Adnan Noor Mian

Co-Principal Investigator
Estamping

Dr. Muhammad Khurram Bhatti

Co-Principal Investigator
Vulnerability Detection and Mitigation