Skip to content
  • Home / Category: Publications

Category: Publications

ACSAC 2016: Amplifying Side Channels Through Performance Degradation

In this work, accepted to ACSAC 2016, we show that an adversary can amplify a side channel leakage from a victim by slowing the victim down. We apply the technique against a victim that uses the Bitcoin elliptic curve and show that we need to observe only 6 signatures to completely break the private key.  The […]

Posted in Publications, Research, Security | Tagged |

Comments Off on ACSAC 2016: Amplifying Side Channels Through Performance Degradation

CCS 2016: ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

Working with researchers from the Technion and from Tel Aviv University, we show that undesired electromagnetic emanations from mobile phones allow adversaries to steal cryptographic keys from the phone. The work has been accepted to CCS 2016. D. Genkin, L. Pachmanov, I. Pipman, E. Tromer and Y. Yarom, ECDSA Key Extraction from Mobile Devices via […]

Posted in Publications, Research, Security | Tagged |

Comments Off on CCS 2016: ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

CCS 2016: “Make Sure DSA Signing Exponentiations Really are Constant-Time”

  Our joint work with researchers from the Tampere University of Technology on a weakness in OpenSSL has been accepted to CCS 2016. C. Pereida García, B. B. Brumley and Y. Yarom, “Make Sure DSA Signing Exponentiations Really are Constant-Time”, Abstract: TLS and SSH are two of the most commonly used protocols for securing Internet traffic. Many of the implementations of […]

Posted in Publications, Research, Security | Tagged |

Comments Off on CCS 2016: “Make Sure DSA Signing Exponentiations Really are Constant-Time”

CDIT Presenting in CHES 2016

Next week CDIT is presenting two papers and a tutorial in CHES 2016. The papers are: L. Groot Bruinderink, A. Hülsing, T. Lange and Y. Yarom, Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme. We present the first side-channel attack on a lattice-based signature scheme, using the FLUSH+RELOAD cache-attack. The […]

Posted in News, Publications, Security | Tagged |

Comments Off on CDIT Presenting in CHES 2016

HPCA 2016: CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing

Working with colleagues from Princeton University, NICTA and Intel we show how to use the Intel Cache Allocation Technology (CAT) to provide protection from cache-based side-channel attacks. CAT is a hardware cache-partitioning mechanism for enforcing quality of service with respect to cache occupancy. However due to the small number of partitions it cannot be used […]

Posted in News, Publications, Research, Security | Tagged |

Comments Off on HPCA 2016: CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing

SoSym: Model-driven Performance Prediction of Systems of Systems

An update on our MEDEA model-driven engineering environment supporting early performance prediction of Systems of Systems has been accepted for publication in the Journal of Software and Systems Modeling. The MEDEA system is an outcome of our long standing collaboration with DST Group, and colleagues at the University of Pau. K. Falkner, C. Szabo, V. […]

Posted in Modelling and Analysis, Publications, Research | Tagged |

Comments Off on SoSym: Model-driven Performance Prediction of Systems of Systems

WSC 2015: Best Applied Paper Award

Lachlan Birdsey’s paper on modeling and visualizing the emergence of knowledge topics on Twitter has won the Best Applied Paper Award at WSC 2015. Congratulations Lachlan! Title: Twitter Knows: Understanding The Emergence Of Topics In Social Networks Abstract: Social networks such as Twitter and Facebook are important and widely used communication environments that exhibit scale, complexity, node interaction, […]

Posted in Complex Systems, News, Publications | Tagged |

Comments Off on WSC 2015: Best Applied Paper Award

ASWEC 2015: A case study in agility and evolving the long-lived software system

DSTO colleague, Shannon Felhmann has had the results of his Masters coursework thesis work accepted for publication at the ASWEC conference. Shannon’s work explores a case study at DSTO of agile software development techniques and applies data analysis to software repositories to understand how software development practices have changed over time. A case study in […]

Posted in Modelling and Analysis, Publications, Research | Tagged |

Comments Off on ASWEC 2015: A case study in agility and evolving the long-lived software system

WSC 2015: The Emergence of Knowledge on Twitter

Lachlan Birdsey’s paper on modeling and visualizing the emergence of knowledge topics on Twitter has been accepted for publication in WSC 2015. Congratulations Lachlan! Title: Twitter Knows: Understanding The Emergence Of Topics In Social Networks Abstract: Social networks such as Twitter and Facebook are important and widely used communication environments that exhibit scale, complexity, node interaction, and […]

Posted in Complex Systems, Publications, Research | Tagged |

Comments Off on WSC 2015: The Emergence of Knowledge on Twitter

WISE 2015: Undestanding Users on Social Media

Yihong Zhang’s paper on classifying different user perspectives on Twitter has been accepted for publication in WISE 2015. Congratulations Yihong! Paper: Classifying Perspectives on Twitter: Immediate Observation, Affection, and Speculation Abstract: Popular micro-blogging services such as Twitter enable users to effortlessly publish observations and thoughts about ongoing events. Such social sensing generates a very large pool of […]

Posted in Complex Systems, Publications, Research | Tagged |

Comments Off on WISE 2015: Undestanding Users on Social Media
School of Computer Science
Address

Level 4, Ingkarni Wardli
North Terrace Campus
THE UNIVERSITY OF ADELAIDE
ADELAIDE SA 5005 AUSTRALIA

Contact
Phone: +61 8 8313 5586
Fax: +61 8 8313 4366