Thomas McAtee will be joining our group to study how to best design communication strategies in contested and resource constrained environments using evolutionary approaches. Welcome Tom!
Ben Morris will work on his honours project in 2018, entitled: Analysis Cities from a Bacterial Growth Perspective Project description: Rapid growth of urban centres over the decades has led to shortage of resources, high-density habitation, and massive transit expansion amongst others. Several studies of urban growth have found similarity between human urban expansion and […]
Mastik is a new toolkit for performing microarchitectural side channel attacks has been announced in the CHES 2016 rump session. The toolkit provides an implementation of popular side channel attacks. Version 0.01, code name Scurvy Dog, can be downloaded from the Mastik home page. The CHES 2016 rump session presentation is also available.
Two research papers from CDIT researchers have been accepted by 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016), to be held in Heidelberg, Germany, 12-16 September, 2016. This is a fantastic achievement and UbiComp is arguably the most prestigious conference in the area of ubiquitous computing. Congratulations. Paper 1: AudioGest: Enabling […]
Claudia Szabo, the Complex Systems project leader will be pitching research ideas during the Land Forces 2016 conference. Come and find her to discuss ways of best modeling human interactions (both in person and online) in areas of conflict, to best identify emerging unwanted behaviors! The work builds on the group’s modeling of complex systems […]
Yuval Yarom has been invited to present a keynote talk at PROOFS 2016. PROOFS is a security workshop focusing on Security Proofs for Embedded Systems. Title: Thwarting cache-based side-channel attacks Abstract: Cache-based side-channel attacks leak sensitive information through a shared cache. The attacker exploits contention on the cache to trace the victim’s access to memory. These traces […]
Next week CDIT is presenting two papers and a tutorial in CHES 2016. The papers are: L. Groot Bruinderink, A. Hülsing, T. Lange and Y. Yarom, Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme. We present the first side-channel attack on a lattice-based signature scheme, using the FLUSH+RELOAD cache-attack. The […]
CDIT researchers have made another successful year at this year’s ACM CIKM conference (http://cikm2016.cs.iupui.edu/), to be held at Indianapolis, USA in Oct. With acceptance rate of full papers as low as 17%, CDIT secured 3 full research papers and 2 short papers. Well done and congratulations!! The three full research papers are: 1. Efficient Orthogonal […]
Scott Bourne’s PhD thesis was recognised by Dean’s Commendation for Doctoral Thesis Excellence. Co-supervised by Prof. Michael Sheng and Dr Claudia Szabo, Scott’s PhD project focuses on developing novel solutions on formal validation of service-based business processes based on model checking techniques. The result has the potential to be applied in mission-critical applications (e.g., defence) […]
Self-organisation is one of the key properties of complex systems yet automated tools to identify it have yet to be applied to systems other than toy models such as the Game of Life. Lachlan’s work is looking at implementing system complexity, Chan’s interaction metric, limited bandwidth recognition, de-centralised emergence detection and multi-scale Shannon entropy. His experiments […]