Skip to content

About Toyosi Oyinloye

Toyosi started her career as a Computer Programmer/Analyst after graduating with a BSc in Computer Science from the University of Ilorin, Nigeria, in 2003. She has many years of experience in designing Graphical User Interface for Data Management and Data Security. She joined the academia after obtaining her MSc in Cybersecurity (with distinction) from the University of Chester in 2019 and she is currently researching on Software Protection Measures via Control Flow Integrity (CFI) for binaries that are built and executed in X86 and RISC-V architectures. 


Toyosi joined the academic body of the University of Chester in 2019 teaching Cybersecurity (L3) at the Centre for foundation studies. She later joined the Computer Science Department where she has taught (levels 4-7) modules in Cybersecurity, Computer Programming, Research methods and Research dissertation, as well as Supervising Research projects in areas of Computing and Cybersecurity.  Her teaching experience cuts across all levels in the University, and she currently teaches Levels 6 & 7 (BSc and Msc) Programming in Swift for iOS & macOS development, and Software Exploitation in Ethical Hacking. Toyosi is an Associate Fellow of the Higher Education Academy (AFHEA) and she applies her knowledge and skills from current research to her teaching. 


Toyosi’s current research is in Control Flow Integrity (CFI): Securing systems by implementing the CFI concept on software processes within various Central Processing Unit (CPU) architectures.  The aim is to secure applications that are vulnerable to Buffer Overflow, Stack Overflows, Return Oriented Programming (ROP) attacks, etc., from exploitation that could lead to Control Flow Hijacking.

Research Interest

 Toyosi has research interest in combatting Social Engineering in Cybersecurity and she has published research work on the impact of user awareness in preventing Cyber attacks. 

Published Work

Oyinloye, T., Speakman, L., & Eze, T. (2023). Ret-gadgets in RISC-V-based binaries resulting in traps for hijackers. Proceedings of the 18th International Conference on Cyber Warfare and Security, (pp. 291-299). Academic Conferences International.

Oyinloye, T., Speakman, L., Eze, T., & O’Mahony, L. (2022). Watchdog monitoring for detecting and handling of control flow hijack on RISC-V-based Binaries. International Journal of Advanced Computer Science and Applications, 13(8), 2022.

Underhill, P., Oyinloye, T., Speakman, L., & Eze, T. (2022). Forensic trails obfuscation and preservation via hard drive firmware. European Conference on Cyber Warfare and Security21(1), 419-428.

Oyinloye, T., Speakman, L. & Eze, T., “Inter-Process CFI for Peer/Reciprocal Monitoring in RISC-V-Based Binaries”, 21st European Conference on Cyber Warfare and Security (ECCWS), 2021, England.

Oyinloye, T., Eze, T. & Speakman, L, “Towards Cyber-User Awareness: Design and Evaluation”, 20th European Conference on Cyber Warfare and Security (ECCWS), 2020, England.




Currently studying for PhD in Cyber Security (Control Flow Integrity for Software Protection in X86 and RISC-V systems).