BLOGS WEBSITE

Category: Security

Virtualisation is a key potential approach to alleviating performance issues within constrained environments. However, within defence environments, security is a constant concern, and virtualised environments must be assessed to ensure that they do not introduce additional security risks with their introduction.

In this research, we explore security issues within defence and constrained environments, including analysis of existing virtualisation environments for security concerns, identification and mitigation against security attacks, and the design and development of virtualised environments that are more resilient against security attacks.

Project Leaders: Yuval Yarom and A/Prof Katrina Falkner

Tom Allan invited to Tel-Aviv University

As part of our ongoing collaboration with the Laboratory for Experimental Information Security (LEISec), our intern, Tom Allan, was invited to an extended visit To Israel.  Tom will spend six weeks in the Tel-Aviv University, where he will work on microarchitectural side-channel attacks.

Posted in News, Security | Tagged |

Comments Off on Tom Allan invited to Tel-Aviv University

Research Contract: Computing Infrastructure Performance and Interoperability Research – Security. K. Falkner and Y. Yarom, DSTO Research Contract ($170,000) (2015)

This research agreement will be supporting research in the areas of combat system security, continuing our existing collaborative research relationship with DSTO in the areas of Security and Virtualisation within distributed environments. The areas of research for this Research Agreement will be: Research into threats applicable to Virtualisation technologies in a common pool of resources approach […]

Posted in Research, Security | Tagged |

Comments Off on Research Contract: Computing Infrastructure Performance and Interoperability Research – Security. K. Falkner and Y. Yarom, DSTO Research Contract ($170,000) (2015)

CDIT Presenting at the I-CORE Day

Yuval Yarom has recently attended the Israeli Center of Research Excellence in Algorithms (I-CORE) day, where he was invited to present  our work on last-level cache side-channel attacks. Last-Level Cahce Side-Channel Attacks are Practical System virtualisation increases hardware utilisation by sharing the hardware resources between several virtual machines. While these virtual machines are supposed to […]

Posted in News, Security | Tagged |

Comments Off on CDIT Presenting at the I-CORE Day

CDIT Welcomes Michelle McClintock, Matt Hart, Gefei Li and Tom Allan

This week we welcome four new members to the CDIT team. Michelle McClintock joins CDIT to complete her PhD research on an organisational framework for enterprise security architecture. While modern enterprise architecture frameworks have planned to capture a holistic picture of an organisation, security has been identified as a separate component which fails to have […]

Posted in News, Security, Student Projects | Tagged |

Comments Off on CDIT Welcomes Michelle McClintock, Matt Hart, Gefei Li and Tom Allan

Computer Standards & Interfaces: ASE – A Comprehensive Pattern-Driven Security Methodology for Distributed Systems

Anton Uzunov’s thesis work has been in the area of pattern-based security methodologies for distributed systems. Final work from thesis has been recently accepted for Computer Standards & Interfaces. Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to […]

Posted in Publications, Research, Security, Student Projects | Tagged |

Comments Off on Computer Standards & Interfaces: ASE – A Comprehensive Pattern-Driven Security Methodology for Distributed Systems

IEEE S&P: Last-level cache side-channel attacks are practical

Working with colleagues from Princeton University and from NICTA we demonstrate how to implement last-level cache side channels, measure their capacity and demonstrate that their resolution is sufficient for leaking cryptographic keys between co-located virtual machines and across multiple processor cores. F. Liu, Y. Yarom, Q. Ge, G. Heiser, and R.B. Lee, Last-Level Cache Side-Channel […]

Posted in Publications, Research, Security | Tagged |

Comments Off on IEEE S&P: Last-level cache side-channel attacks are practical

Cyber security summer program at the University of Adelaide

Last week CDIT hosted 16 year 11 and 12 students for a week long program on cyber security. During the program the students learned about cyber security and explored and practice some basic techniques including password cracking, cross-site scripting and SQL injection.

Posted in News, Security | Tagged |

Comments Off on Cyber security summer program at the University of Adelaide

Summer research projects

We welcome Jack Gerrits, Sean Marciniak and David Piper who have joined CDIT to work on three summer research projects.  Jack is looking at ways of exploiting Google Chrome Native clients to mount side-channel attacks on the user’s machine. Sean is investigating the potential for attacking machines using malicious USB devices. David is looking at intercepting […]

Posted in News, Security, Student Projects | Tagged |

Comments Off on Summer research projects

CT-RSA 2015: Just a Little Bit More

Extending our work from CHES 2014, we exploit a weakness in several standard curves to achieve an order of magnitude reduction in the number of signatures we need to observe in order to break the key. J. van de Pol, N. P. Smart and Y.Yarom, Just a Little Bit More.  accepted for CT-RSA 2015.

Posted in Publications, Research, Security | Tagged |

Comments Off on CT-RSA 2015: Just a Little Bit More

Visitor from the Worcester Polytechnic Institue: Gorka Irazoqui

Gorka Irazoqui from the Worcester Polytechnic Institute (MA, USA) visited CDIT this week.  During his visit, Gorka presented his recent works on LLC-based side channel attacks on AES.

Posted in News, Security | Tagged |

Comments Off on Visitor from the Worcester Polytechnic Institue: Gorka Irazoqui