Academic Patners

Information Technology University (ITU)
Blockchain Security Lab

The blockchain is often considered as the internet 2.0. The blockchain, essentially a database and a giant network, known as a distributed ledger, records ownership and value, and allows anyone with access to view and take part. The blockchain is currently having its biggest impact in financial services, with the largest changes caused by infrastructures using blockchain APIs, which are delivering in the areas of speed in data processing, transparency (amongst the right people) and security. The blockchain offers consumers opportunity to achieve greater control over their information. This will impact on most organisations, as they increasingly rely on the acquisition and application of customer data.

The lab will deliver following applications using blockchain technology

  • Blockchain-powered Trust management system for identity authentication
  • Blockchain-based storage of Highly sensitive data.
  • Detection and Mitigation system for vulnerabilities in blockchain (private data-leakage)

The above-mentioned application areas are symbiotic and complement each other: only trusted entities are allowed to update data stored in blockchains running on hardware that are being protected against data leakage attacks.

Our People

Our core members and researchers are academics, developers, administrators and MS/PhD students. Our industrial partners are public and private cyber security organizations that advise us on the design, implementation and commercialization of the R&D work originating from our Lab.

Core Members
Principal Investigator/Director

The Lab is managed by a Principal Investigator (PI)
who is leading research projects with the support of project team leads.

Dr.Muhammad Umar Janjua

Principal Investigator
& Co-PI Trust Management

Former Members

        

Dr. Ali Ahmed

Co-Principal Investigator
Data Immutability

Dr. Adnan Noor Mian

Co-Principal Investigator
Estamping

Dr. Muhammad Khurram Bhatti

Co-Principal Investigator
Vulnerability Detection and Mitigation