BLOGS WEBSITE

Category: Research

Summer research projects

We welcome Jack Gerrits, Sean Marciniak and David Piper who have joined DIG to work on three summer research projects.  Jack is looking at ways of exploiting Google Chrome Native clients to mount side-channel attacks on the user’s machine. Sean is investigating the potential for attacking machines using malicious USB devices. David is looking at […]

Posted in News, Research, Security Research, Student Projects | Tagged |

Comments Off on Summer research projects

CT-RSA 2015: Just a Little Bit More

Extending our work from CHES 2014, we exploit a weakness in several standard curves to achieve an order of magnitude reduction in the number of signatures we need to observe in order to break the key. J. van de Pol, N. P. Smart and Y.Yarom, Just a Little Bit More.  accepted for CT-RSA 2015.

Posted in Publications, Research, Security Research | Tagged |

Comments Off on CT-RSA 2015: Just a Little Bit More

Visitor from the Worcester Polytechnic Institue: Gorka Irazoqui

Gorka Irazoqui from the Worcester Polytechnic Institute (MA, USA) visited DIG this week.  During his visit, Gorka presented his recent works on LLC-based side channel attacks on AES.

Posted in News, Research, Security Research | Tagged |

Comments Off on Visitor from the Worcester Polytechnic Institue: Gorka Irazoqui

Information and Software Technology: A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies

Anton Uzunov is leading work into the development of a pattern-oriented approach to the engineering of secure software methodologies. Recent work in this space, accepted for publication in the Journal of Information and Software Technology, builds upon existing method engineering ideas to form a new comprehensive approach to engineering security methodologies. Developing secure software systems […]

Posted in Publications, Research, Security Research, Student Projects | Tagged |

Comments Off on Information and Software Technology: A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies

DIG presenting at ECC 2014

Yuval Yarom recently attended  the workshop on Elliptic Curves Cryptography 2014 at Chennai, India, where he was invited to present our work on cryptanalysing ECDSA Side-channel attacks on ECDSA Side-channel attacks aim to break cryptosystems by exploiting information leaked through the interaction of the Implementation of the cryptosystem with its environment. This talk presents some […]

Posted in News, Research, Security Research | Tagged |

Comments Off on DIG presenting at ECC 2014

Research Grant: Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015)

Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015) DIG will be working with Professor Gernot Heiser’s team at NICTA/UNSW on a new collaborative project exploring timing channels and side channels on modern architectures. Led at Adelaide by Yuval Yarom, this project will explore the design and implementation […]

Posted in Research, Security Research | Tagged |

Comments Off on Research Grant: Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015)

CDIT team presenting at USENIX Security and ECSA 2014

Yuval Yarom recently attended the  USENIX Security 2014 conference in San Diego to present our work in defining the Flush+Reload side-channel attack: FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, Yuval Yarom and Katrina Falkner, The University of Adelaide Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of […]

Posted in News, Performance Modelling, Security Research | Tagged |

Comments Off on CDIT team presenting at USENIX Security and ECSA 2014

Sam Jaeschke Joins DIG

We welcome Sam Jaeschke, who has joined DIG to complete his Honours year research project. Sam work will extend our earlier work on micro-architectural side-channel attacks. Past research has demonstrated that Intel X86 processors are vulnerable to the FLUSH+RELOAD side-channel attack. The attack allows malicious virtual machine to recover secret information from a victim virtual […]

Posted in News, Security Research, Student Projects | Tagged |

Comments Off on Sam Jaeschke Joins DIG

Book Chapter: A model driven engineering method for DRE defense systems performance analysis and prediction

An extended description of our performance modelling framework has been accepted for publication as part of a forthcoming book, Industry and Research Perspectives on Embedded System Design (IGI Global). K. Falkner, V. Chiprianov, N. Falkner, C. Szabo and G. Puddy, A Model Driven Engineering Method for DRE Defence Systems Performance Analysis and Prediction. In Industry […]

Posted in Performance Modelling, Publications, Research | Tagged |

Comments Off on Book Chapter: A model driven engineering method for DRE defense systems performance analysis and prediction

Student Projects: Semester 2, 2014

DIG has a range of projects available for students undertaking projects in Semester 2, whether you are studying the BCS(Advanced) or Masters of CS/Honours. Please review the projects page for more details!

Posted in News, Student Projects | Tagged |

Comments Off on Student Projects: Semester 2, 2014