The Computer Security and Incident Response Group at the Information Security Department, Military College of Signals aims to conduct research in the broader area of computer security. The prime focus of the group is in studying vulnerabilities, attacks as applied to the computing devices such as computers and smartphones, as well as designing the processes and mechanisms by which computer-based equipment, information and services can be protected from unintended or unauthorized access, change or destruction. Incident Response is also incorporated as a prime area of the group. In this regard, a project NUST-CSIRT was completed in 2014.

Welcome to Computer Security and Incident Response Research Group


The Computer Security and Incident Response Research Group (CSIRG) is comprised of six academics supported by a few masters and doctoral students. The research and developmental work at the group reach from foundational issues of computer security to requirements of today’s real-world and complex security domains. Vision​ To become a nationally and internationally renowned research group in Computer Security […]



Malware Analysis and Detection

malware (1)

Malware is a generic term that encompasses different types of malicious software components like viruses, worms, Trojans, spyware, etc. Traditionally, signature based approach has been used for malware detection that attempts to detect a specific part of the representation of a malware instance. However, more recently, malware analysis cannot be done effectively by these techniques alone as these fail to detect previously […]


Web Security


A number of existing vulnerability analysis approaches have been applied to web applications. However, there are some characteristics of web applications that make them different from traditional stand-alone applications, such as the use of scripting languages, the structuring of the application logic into separate pages and code modules, and the interaction with back-end databases.  Most approaches to web application vulnerability analysis […]


Cyber Situation Awareness


Cyber networks have evolved into a ubiquitous infrastructure, and the Internet has become a mission-critical asset for the DoD and its partners. To assure the availability of these large-scale networks and their resources, it is necessary to maintain situation awareness of the current status of the networks during 24/7 operations. To achieve these goals, one […]