BLOGS WEBSITE

Category: Security

Virtualisation is a key potential approach to alleviating performance issues within constrained environments. However, within defence environments, security is a constant concern, and virtualised environments must be assessed to ensure that they do not introduce additional security risks with their introduction.

In this research, we explore security issues within defence and constrained environments, including analysis of existing virtualisation environments for security concerns, identification and mitigation against security attacks, and the design and development of virtualised environments that are more resilient against security attacks.

Project Leaders: Yuval Yarom and A/Prof Katrina Falkner

Information and Software Technology: A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies

Anton Uzunov is leading work into the development of a pattern-oriented approach to the engineering of secure software methodologies. Recent work in this space, accepted for publication in the Journal of Information and Software Technology, builds upon existing method engineering ideas to form a new comprehensive approach to engineering security methodologies. Developing secure software systems […]

Posted in Publications, Research, Security, Student Projects | Tagged |

Comments Off on Information and Software Technology: A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies

CDIT presenting at ECC 2014

Yuval Yarom recently attended  the workshop on Elliptic Curves Cryptography 2014 at Chennai, India, where he was invited to present our work on cryptanalysing ECDSA Side-channel attacks on ECDSA Side-channel attacks aim to break cryptosystems by exploiting information leaked through the interaction of the Implementation of the cryptosystem with its environment. This talk presents some […]

Posted in News, Security | Tagged |

Comments Off on CDIT presenting at ECC 2014

Research Grant: Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015)

Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015) CDIT will be working with Professor Gernot Heiser’s team at NICTA/UNSW on a new collaborative project exploring timing channels and side channels on modern architectures. Led at Adelaide by Yuval Yarom, this project will explore the design and implementation […]

Posted in Research, Security | Tagged |

Comments Off on Research Grant: Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015)

CDIT team presenting at USENIX Security and ECSA 2014

Yuval Yarom recently attended the  USENIX Security 2014 conference in San Diego to present our work in defining the Flush+Reload side-channel attack: FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, Yuval Yarom and Katrina Falkner, The University of Adelaide Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of […]

Posted in Modelling and Analysis, News, Security | Tagged |

Comments Off on CDIT team presenting at USENIX Security and ECSA 2014

Sam Jaeschke Joins CDIT

We welcome Sam Jaeschke, who has joined CDIT to complete his Honours year research project. Sam work will extend our earlier work on micro-architectural side-channel attacks. Past research has demonstrated that Intel X86 processors are vulnerable to the FLUSH+RELOAD side-channel attack. The attack allows malicious virtual machine to recover secret information from a victim virtual machine […]

Posted in News, Security, Student Projects | Tagged |

Comments Off on Sam Jaeschke Joins CDIT

CHES 2014: “Ooh Aah… Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way

Working with colleagues from the University of Bristol and from our local School of Mathematical Sciences, we combine our FLUSH+RELOAD side channel with an improved lattice attack to break the Bitcoin elliptic curve. N. Benger, J. van de Pol, N. P. Smart and Y.Yarom, “Ooh, Aah… Just a Little Bit”: A Small Amount of Side […]

Posted in Publications, Research, Security | Tagged |

Comments Off on CHES 2014: “Ooh Aah… Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way

USENIX 2014: FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack

A new side-channel attack that came out of our research into security within virtualised environments has been accepted for publication at USENIX 2014: Y. Yarom and K. Falkner, FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack. Accepted for USENIX Security, August 2014.

Posted in Publications, Research, Security | Tagged |

Comments Off on USENIX 2014: FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack

Research Contract: Model Driven Systems Engineering: Security in Virtualised Environments . K. Falkner and Y. Yarom, DSTO Research Contract ($110,000) (2014)

Model Driven Systems Engineering: Security in Virtualised Environments. K. Falkner and Y. Yarom, DSTO Research Contract ($110,000) (2014) This contract will continues research between DSTO and the University of Adelaide on the research and development of security within virtualised environments.

Posted in Research, Security | Tagged |

Comments Off on Research Contract: Model Driven Systems Engineering: Security in Virtualised Environments . K. Falkner and Y. Yarom, DSTO Research Contract ($110,000) (2014)

ASWEC 2014: A Comprehensive Pattern-Driven Security Methodology for Distributed Systems

Anton Uzunov’s work on pattern-driven secure software development methodologies within distributed systems has been accepted at ASWEC. This work forms some of the final steps towards Anton’s thesis in this area. A. Uzunov, K. Falkner and E. Fernandez, A Comprehensive Pattern-Driven Security Methodology for Distributed Systems. In Proceedings of the 23rd Australasian Software Engineering Conference (ASWEC), April, […]

Posted in Publications, Research, Security, Student Projects | Tagged |

Comments Off on ASWEC 2014: A Comprehensive Pattern-Driven Security Methodology for Distributed Systems

Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack

An early result from our work with DSTO on security and virtualisation is now available from the Cryptology ePrint Archive. Our work with DSTO focusses on understanding the benefits and limitations, in terms of security, in using virtualisation in real-time and defence systems. As part of this work, we have been able to identify a […]

Posted in Publications, Research, Security | Tagged , , |

Comments Off on Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack