{"id":84,"date":"2013-03-25T15:23:22","date_gmt":"2013-03-25T15:23:22","guid":{"rendered":"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=84"},"modified":"2017-11-23T11:22:46","modified_gmt":"2017-11-23T11:22:46","slug":"kent-selected-for-uks-new-cyber-research-institute","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2013\/03\/25\/kent-selected-for-uks-new-cyber-research-institute\/","title":{"rendered":"Kent selected for UK\u2019s new cyber research institute"},"content":{"rendered":"<p>The University of Kent has been selected for the UK\u2019s new Academic Research Institute for cyber threats.<\/p>\n<p>Funded by a \u00a34.5 million grant, a team at the School of Computing will work alongside other world-leading researchers to investigate new ways of automatically analysing computer software to reduce its vulnerability to cyber threats.<\/p>\n<p>The University\u2019s involvement in the institute will focus on two research projects. One will look at malware &#8211; malicious programs &#8211; and how to automatically assess the threat they pose.\u00a0 The project will develop techniques to automatically compare a new piece of malware against a database of known malware samples.<\/p>\n<p>The second project will focus on the development of scientific techniques to pinpoint in computer code where memory handling can inadvertently leak secret information. Memory needs to be recycled in a computer program, but it is not safe to recycle memory that contains a secret. Instead secrets must be erased before the memory is recycled. The project will develop techniques to ensure that memory is properly erased.<\/p>\n<p>Andy King, from the University\u2019s School of Computing, said: \u2018Undertaking research into ways of ensuring safety and secrecy of private information is vital, and we are looking forward to getting our teeth into these difficult research problems.\u2019<\/p>\n<p>The second Research Institute,\u00a0which follows the creation of the\u00a0first research institute in cyber security in September 2012, will carry out world-leading research into techniques for Automated Program Analysis and Verification of computer software. The outputs from the Research Institute will provide businesses, individuals and government with additional confidence that software will behave in a secure fashion when installed on operational networks.<\/p>\n<p>The institute\u00a0has been established by GCHQ,\u00a0one of the three UK intelligence agencies,\u00a0in partnership with the Engineering and Physical Sciences Research Council (EPSRC) through the Research Councils UK (RCUK) Global Uncertainties Programme and the Department for Business, Innovation and Skills (BIS).<\/p>\n<p>The Research Institute aims to open for business on 1 April 2013 for a period of 3 years.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The University of Kent has been selected for the UK\u2019s new Academic Research Institute for cyber threats. Funded by a \u00a34.5 million grant, a team &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2013\/03\/25\/kent-selected-for-uks-new-cyber-research-institute\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":5321,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[124,122],"tags":[37341,37346,37339,37345,37342,10470,8814,37343,37344],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/84"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/5321"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=84"}],"version-history":[{"count":3,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/84\/revisions"}],"predecessor-version":[{"id":86,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/84\/revisions\/86"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=84"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=84"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}