We welcome Jack Gerrits, Sean Marciniak and David Piper who have joined DIG to work on three summer research projects. Jack is looking at ways of exploiting Google Chrome Native clients to mount side-channel attacks on the user’s machine. Sean is investigating the potential for attacking machines using malicious USB devices. David is looking at […]
Gorka Irazoqui from the Worcester Polytechnic Institute (MA, USA) visited DIG this week. During his visit, Gorka presented his recent works on LLC-based side channel attacks on AES.
Yuval Yarom recently attended the workshop on Elliptic Curves Cryptography 2014 at Chennai, India, where he was invited to present our work on cryptanalysing ECDSA Side-channel attacks on ECDSA Side-channel attacks aim to break cryptosystems by exploiting information leaked through the interaction of the Implementation of the cryptosystem with its environment. This talk presents some […]
Yuval Yarom recently attended the USENIX Security 2014 conference in San Diego to present our work in defining the Flush+Reload side-channel attack: FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, Yuval Yarom and Katrina Falkner, The University of Adelaide Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of […]
We welcome Sam Jaeschke, who has joined DIG to complete his Honours year research project. Sam work will extend our earlier work on micro-architectural side-channel attacks. Past research has demonstrated that Intel X86 processors are vulnerable to the FLUSH+RELOAD side-channel attack. The attack allows malicious virtual machine to recover secret information from a victim virtual […]
DIG has a range of projects available for students undertaking projects in Semester 2, whether you are studying the BCS(Advanced) or Masters of CS/Honours. Please review the projects page for more details!
Dr Vanea Chiprianov, formally a member of the DIG group and now at University of Pau (France), is visiting DIG this week, while attending the SOSE conference. Dr Chiprianov will be presenting a joint paper with DIG on our work in performance modelling of systems of systems.
Shannon Fehlmanm has joined the DIG group to complete his Masters of Sciences (Defence) research project looking at agile software engineering and productisation in DSTO. This project proposes an exploration of the contemporary evolution of software engineering practice, by way of a retrospective study at the Australian Defence Science and Technology Organisation (DSTO). The exploration […]
This summer, DIG will host two summer scholarship students, Matt Hart and Cathlyn Aston, who will be working on using the leap motion and a pre-release next generation Kinect as gesture-control devices to control an AR.Drone.
Research Associate School of Computer Science, University of Adelaide Job Reference Number: 9470 The School of Computer Science invites applications for the position of Research Associate within the area of performance prediction of distributed systems. This position is appointed in association with the Defence Information Group, conducting research into the challenges of building large, complex […]