BLOGS WEBSITE
Category: Security
Virtualisation is a key potential approach to alleviating performance issues within constrained environments. However, within defence environments, security is a constant concern, and virtualised environments must be assessed to ensure that they do not introduce additional security risks with their introduction.
In this research, we explore security issues within defence and constrained environments, including analysis of existing virtualisation environments for security concerns, identification and mitigation against security attacks, and the design and development of virtualised environments that are more resilient against security attacks.
Project Leaders: Yuval Yarom and A/Prof Katrina Falkner
Tom Allan invited to Tel-Aviv University
As part of our ongoing collaboration with the Laboratory for Experimental Information Security (LEISec), our intern, Tom Allan, was invited to an extended visit To Israel. Tom will spend six weeks in the Tel-Aviv University, where he will work on microarchitectural side-channel attacks.
Research Contract: Computing Infrastructure Performance and Interoperability Research – Security. K. Falkner and Y. Yarom, DSTO Research Contract ($170,000) (2015)
This research agreement will be supporting research in the areas of combat system security, continuing our existing collaborative research relationship with DSTO in the areas of Security and Virtualisation within distributed environments. The areas of research for this Research Agreement will be: Research into threats applicable to Virtualisation technologies in a common pool of resources approach […]
CDIT Presenting at the I-CORE Day
Yuval Yarom has recently attended the Israeli Center of Research Excellence in Algorithms (I-CORE) day, where he was invited to present our work on last-level cache side-channel attacks. Last-Level Cahce Side-Channel Attacks are Practical System virtualisation increases hardware utilisation by sharing the hardware resources between several virtual machines. While these virtual machines are supposed to […]
CDIT Welcomes Michelle McClintock, Matt Hart, Gefei Li and Tom Allan
This week we welcome four new members to the CDIT team. Michelle McClintock joins CDIT to complete her PhD research on an organisational framework for enterprise security architecture. While modern enterprise architecture frameworks have planned to capture a holistic picture of an organisation, security has been identified as a separate component which fails to have […]
Comments Off on CDIT Welcomes Michelle McClintock, Matt Hart, Gefei Li and Tom Allan
Computer Standards & Interfaces: ASE – A Comprehensive Pattern-Driven Security Methodology for Distributed Systems
Anton Uzunov’s thesis work has been in the area of pattern-based security methodologies for distributed systems. Final work from thesis has been recently accepted for Computer Standards & Interfaces. Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to […]
Comments Off on Computer Standards & Interfaces: ASE – A Comprehensive Pattern-Driven Security Methodology for Distributed Systems
IEEE S&P: Last-level cache side-channel attacks are practical
Working with colleagues from Princeton University and from NICTA we demonstrate how to implement last-level cache side channels, measure their capacity and demonstrate that their resolution is sufficient for leaking cryptographic keys between co-located virtual machines and across multiple processor cores. F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R.B. Lee, Last-Level Cache Side-Channel […]
Comments Off on IEEE S&P: Last-level cache side-channel attacks are practical
Cyber security summer program at the University of Adelaide
Last week CDIT hosted 16 year 11 and 12 students for a week long program on cyber security. During the program the students learned about cyber security and explored and practice some basic techniques including password cracking, cross-site scripting and SQL injection.
Summer research projects
We welcome Jack Gerrits, Sean Marciniak and David Piper who have joined CDIT to work on three summer research projects. Jack is looking at ways of exploiting Google Chrome Native clients to mount side-channel attacks on the user’s machine. Sean is investigating the potential for attacking machines using malicious USB devices. David is looking at intercepting […]
CT-RSA 2015: Just a Little Bit More
Extending our work from CHES 2014, we exploit a weakness in several standard curves to achieve an order of magnitude reduction in the number of signatures we need to observe in order to break the key. J. van de Pol, N. P. Smart and Y.Yarom, Just a Little Bit More. accepted for CT-RSA 2015.
Comments Off on CT-RSA 2015: Just a Little Bit More
Visitor from the Worcester Polytechnic Institue: Gorka Irazoqui
Gorka Irazoqui from the Worcester Polytechnic Institute (MA, USA) visited CDIT this week. During his visit, Gorka presented his recent works on LLC-based side channel attacks on AES.