BLOGS WEBSITE
Category: Research
Summer research projects
We welcome Jack Gerrits, Sean Marciniak and David Piper who have joined DIG to work on three summer research projects. Jack is looking at ways of exploiting Google Chrome Native clients to mount side-channel attacks on the user’s machine. Sean is investigating the potential for attacking machines using malicious USB devices. David is looking at […]
Comments Off on Summer research projects
CT-RSA 2015: Just a Little Bit More
Extending our work from CHES 2014, we exploit a weakness in several standard curves to achieve an order of magnitude reduction in the number of signatures we need to observe in order to break the key. J. van de Pol, N. P. Smart and Y.Yarom, Just a Little Bit More. accepted for CT-RSA 2015.
Comments Off on CT-RSA 2015: Just a Little Bit More
Visitor from the Worcester Polytechnic Institue: Gorka Irazoqui
Gorka Irazoqui from the Worcester Polytechnic Institute (MA, USA) visited DIG this week. During his visit, Gorka presented his recent works on LLC-based side channel attacks on AES.
Comments Off on Visitor from the Worcester Polytechnic Institue: Gorka Irazoqui
Information and Software Technology: A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies
Anton Uzunov is leading work into the development of a pattern-oriented approach to the engineering of secure software methodologies. Recent work in this space, accepted for publication in the Journal of Information and Software Technology, builds upon existing method engineering ideas to form a new comprehensive approach to engineering security methodologies. Developing secure software systems […]
Comments Off on Information and Software Technology: A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies
DIG presenting at ECC 2014
Yuval Yarom recently attended the workshop on Elliptic Curves Cryptography 2014 at Chennai, India, where he was invited to present our work on cryptanalysing ECDSA Side-channel attacks on ECDSA Side-channel attacks aim to break cryptosystems by exploiting information leaked through the interaction of the Implementation of the cryptosystem with its environment. This talk presents some […]
Research Grant: Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015)
Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015) DIG will be working with Professor Gernot Heiser’s team at NICTA/UNSW on a new collaborative project exploring timing channels and side channels on modern architectures. Led at Adelaide by Yuval Yarom, this project will explore the design and implementation […]
Comments Off on Research Grant: Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015)
CDIT team presenting at USENIX Security and ECSA 2014
Yuval Yarom recently attended the USENIX Security 2014 conference in San Diego to present our work in defining the Flush+Reload side-channel attack: FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, Yuval Yarom and Katrina Falkner, The University of Adelaide Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of […]
Comments Off on CDIT team presenting at USENIX Security and ECSA 2014
Sam Jaeschke Joins DIG
We welcome Sam Jaeschke, who has joined DIG to complete his Honours year research project. Sam work will extend our earlier work on micro-architectural side-channel attacks. Past research has demonstrated that Intel X86 processors are vulnerable to the FLUSH+RELOAD side-channel attack. The attack allows malicious virtual machine to recover secret information from a victim virtual […]
Book Chapter: A model driven engineering method for DRE defense systems performance analysis and prediction
An extended description of our performance modelling framework has been accepted for publication as part of a forthcoming book, Industry and Research Perspectives on Embedded System Design (IGI Global). K. Falkner, V. Chiprianov, N. Falkner, C. Szabo and G. Puddy, A Model Driven Engineering Method for DRE Defence Systems Performance Analysis and Prediction. In Industry […]
Comments Off on Book Chapter: A model driven engineering method for DRE defense systems performance analysis and prediction
Student Projects: Semester 2, 2014
DIG has a range of projects available for students undertaking projects in Semester 2, whether you are studying the BCS(Advanced) or Masters of CS/Honours. Please review the projects page for more details!