21st Australasian Conference on Information Security and Privacy
Melbourne, Australia
| 4-6 July 2016
Professor Elisa Bertino
Purdue University
United States
The Internet of Things (IoT) paradigm refers to the network of physical objects or "things" embedded with electronics, software, sensors, and connectivity to enable objects to exchange data with servers, centralized systems, and/or other connected devices based on a variety of communication infrastructures. IoT makes it possible to sense and control objects creating opportunities for more direct integration between the physical world and computer-based systems. IoT will usher automation in a large number of application domains, ranging from manufacturing and energy management (e.g. SmartGrid), to healthcare management and urban life (e.g. SmartCity). However, because of its fine-grained, continuous and pervasive data acquisition and control capabilities, IoT raises concerns about the security and privacy of data. Deploying existing data security solutions to IoT is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. In this talk, after outlining key challenges in data security and privacy, we present initial approaches to securing IoT data, including efficient and scalable encryption protocols, software protection techniques for small devices, and fine-grained data packet loss analysis for sensor networks.
Short Bio: Elisa Bertino is professor of computer science at Purdue University, and serves as Director of Purdue Cyber Center and Research Director of the Center for Information and Research in Information Assurance and Security (CERIAS). She is also an adjunct professor of Computer Science & Info Tech at RMIT. Prior to joining Purdue in 2004, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory (now Almaden) in San Jose, at the Microelectronics and Computer Technology Corporation, at Rutgers University, at Telcordia Technologies. Her recent research focuses on data security and privacy, digital identity management, policy systems, and security for drones and embedded systems. She is a Fellow of ACM and of IEEE. She received the IEEE Computer Society 2002 Technical Achievement Award, the IEEE Computer Society 2005 Kanai Award and the 2014 ACM SIGSAC outstanding contributions award. She is currently serving as EiC of IEEE Transactions on Dependable and Secure Computing.
Professor Chris Mitchell
Royal Holloway, University of London
United Kingdom
This talk focuses on the level of security offered by 2-key triple DES, an encryption technique that remains very widely used despite recently being de-standardised by NIST. Existing attacks, including the 1990 van Oorschot-Wiener attack, will be introduced; a recent generalisation and enhancement of this attack, which constitute the first advance in cryptanalysis of 2-key triple DES since 1990, will then be described; together these results imply that the widely used estimate that 2-key triple DES provides 80 bits of security can no longer be regarded as conservative; the widely stated assertion that the scheme is secure as long as the key is changed regularly is also challenged. The main conclusion is that, whilst not completely broken, the margin of safety for 2-key triple DES is slim, and efforts to replace it, at least with its 3-key variant, should be pursued with some urgency.
Short Bio: Prof Chris Mitchell BSc PhD (London) CITP CMath FBCS FIMA received his BSc (1975) and PhD (1979) degrees in Mathematics from Westfield College, University of London. Prior to his appointment in 1990 as Professor of Computer Science at Royal Holloway, he was a Project Manager in the Networks and Communications Laboratory of Hewlett-Packard Laboratories in Bristol, which he joined in 1985. Between 1979 and 1985 he was at Racal-Comsec Ltd (Salisbury, UK), latterly as Chief Mathematician. In 1990, soon after joining Royal Holloway, he co-founded the Information Security Group, and also played a leading role in launching the MSc in Information Security in 1992. His research interests mainly relate to information security and applications of cryptography. He has played an active role in a number of major international collaborative projects, covering a range of security topics including trusted computing, mobile security and security hardware. For around 25 years he has been convenor of Technical Panel 2 of BSI IST/33, dealing with security mechanisms and providing input to ISO/IEC JTC1/SC27, on which he has served as a UK Expert since 1992. He has edited over twenty international security standards and, in recognition of his contributions to international standards, in 2011 he received the prestigious IEC 1906 award. He has published around 250 research papers. He is co-editor-in-chief of Designs, Codes and Cryptography and editor of Section D (Security in Computer Systems and Networks) of The Computer Journal. He served as a member of Microsoft's Trustworthy Computing Academic Advisory Board throughout its existence (2003-2014), and he was a member of the DoCoMo Euro-Labs Advisory Board between 2005 and 2009. He continues to act as a consultant on a variety of topics in information security.
Professor Ed Dawson
Queensland University of Technology
Australia
Our reliance on information networks to access and control both physical and information networks in critical infrastructures such as airports has increased. In such an environment an integrated approach to security across all aspects of facilities operation and management is required. In this talk a novel mechanism for physical and logical access control for smart buildings is presented which uses building information models.
Short Bio: Professor Ed Dawson has been an academic at Queensland University of Technology (QUT) since 1974. He has extensive research experience in information security publishing over 250 referred research papers and supervising 35 PhD students to completion in this area. From 1993-2007 Professor Dawson was research director of the information security research group at QUT. In 2008 he was awarded title of Emeritus Professor at QUT in recognition of his contributions. From 2005-2010 Professor Dawson was leader of the Australian wide information security node of the ARC funded network Research Network for a Secure Australia (RNSA). From 2000-2010 Professor Dawson was extensively involved with the organisation of the International Association of Cryptologic Research (IACR) serving on the board of directors from 2000-2004 and 2008-2010 (Vice President). In recognition of his research and service Professor Dawson was awarded a Fellowship by IACR in 2016.
Anonymous credential allows a user to be authenticated without revealing his identity. In an anonymous credential system, a user obtains a credential from an organisation, and then he can prove to the organisation (or any other party) that he has been given an appropriate credential. He can do this without revealing anything else about his identity. Furthermore, it can be guaranteed that if he uses his credential in the second time, no one will be able to tell that the two interactions involved the same user. Not only is it impossible to identify the user, there will be no way anyone can trace the user's transactions. The analogues of anonymous credential in paper world are: money, bus and train tickets, and game-arcade tokens. These do not have any personally identifying information and consequently can be transferred between users without the issuers or relying parties being aware of this. The original anonymous credential system proposed by David Chaum in 1985 was referred to as a pseudonym system. This stems from the fact that the credentials of such a system are obtained from and shown to organisations using different pseudonyms that cannot be linked. In this talk, we will present a survey of research literatures in anonymous credentials, in terms of solutions, security and efficiency.
Short Bio: Dr. Xun Yi is a professor with the School of Computer Science and Information Technology, RMIT University, Australia. His research interests include database security, computer and network security, mobile and wireless communication security, private information retrieval, privacy-preserving data mining, secure electronic commerce and applied cryptography. He has published more than 150 research papers in international journals, such as IEEE Trans. Knowledge and Data Engineering, IEEE Trans. Wireless Communication, IEEE Trans. Dependable and Secure Computing, IEEE Trans. Circuit and Systems, IEEE Trans. Vehicular Technologies, IEEE Communication Letters, IEE Electronic Letters, and conference proceedings. He has led several ARC projects. Currently, he serves as an Associate Editor for IEEE Transactions on Dependable and Secure Computing.
Professor Willy Susilo
University of Wollongong
Australia
The outsourcing computations in distributed environments suffer from the trust problems between the outsourcer and the workers. The rational lazy-and-partially-dishonest workers in the outsourcing computation model seems sufficient, but it still does not represent the real life situation. The notion of outsourcing computation is closely related to crowdsourcing. Crowdsourcing is an emerging and exciting technology to acquire services by soliciting contributions from a large group of community, rather than traditional employees or suppliers. With crowdsourcing, the power of people (and hence, the "crowd") will be unleashed to help solving our problem. The situation becomes complex in a commercial setting. Participants will receive payment upon their contribution, and hence, there is incentive for dishonest participants to claim credit for work they did not perform. Additionally, the job owner may not honour its obligation to pay upon the completion of participants' contribution. In this talk, we will go through the challenges that are related to the fairness for all entities, and some research questions.
Short Bio: Willy Susilo received the Ph.D. degree in computer science from the University of Wollongong, Australia. He is a Professor and the Head of School of Computing and Information Technology at the University of Wollongong in Australia. He is also the Director of Centre for Computer and Information Security Research, University of Wollongong. He has been awarded the prestigious ARC Future Fellow by the Australian Research Council. His main research interests include cloud security, cryptography and information security. He has served as a program committee member in major international conferences.
Professor Yu Yu
Shanghai Jiao Tong University
China
Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against implementations of the 2G GSM algorithms (COMP-128, A5). In this paper, we show that they remain an important issue for USIM cards implementing the AES-based MILENAGE algorithm used in 3G/4G communications. In particular, we analyze instances of cards from a variety of operators and manufacturers, and describe successful Differential Power Analysis attacks that recover encryption keys and other secrets (needed to clone the USIM cards) within a few minutes. Further, we discuss the impact of the operator-defined secret parameters in MILENAGE on the difficulty to perform Differential Power Analysis, and show that they do not improve implementation security. Our results back up the observation that physical security issues raise long-term challenges that should be solved early in the development of cryptographic implementations, with adequate countermeasures.
Short Bio: Yu Yu is currently a research professor at Shanghai Jiao Tong University. He received his B.Sc degree from Fudan University at China in 2003, and then his Ph.D from Nanyang Technological University at Singapore in 2006. After finishing his postdoctoral training at the UCL crypto group, he returned to China in 2010 and worked at the East China Normal University and later the Institute for Interdisciplinary Information Sciences (IIIS) at Tsinghua University, before joining Shanghai Jiao Tong University in 2014. His research interests include side-channel attacks and countermeasures (aka. leakage-resilient cryptography), provable security (complexity-based cryptography) and post-quantum cryptography. He has published more than 30 papers at major venues such as CRYPTO, EUROCRYPT, ASIACRYPT, CCS, TCC, CT-RSA, CHES, ACISP, ESORICS, ASIACCS with two papers invited to Journal of Cryptology. In addition, he has been serving on the board of the International Association for Cryptologic Research (IACR) as a member (observer) and a webmaster for www.iacr.org since 2014. He received the Outstanding Young Scholar Award from the Chinese Association for Cryptologic Research in 2015.
Professor Wanlei Zhou
Deakin University
Australia
RFID technologies have been widely used worldwide. However, the wide applications of RFID technologies also introduce serious security and privacy risks as the information stored in RFID tags can easily be retrieved by any malicious party with a compatible reader. In this talk we will introduce some security and privicy challenges in passive RFID technologies, and based on our research, we will outline a number of schemes for authentication, ownership transfer, secure search and grouping proof in passive mobile RFID systems. The talk will be based on our following recently published papers:
Short Bio: Professor Wanlei Zhou received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. He is currently the Alfred Deakin Professor (the highest honour the University can bestow on a member of academic staff), Chair of Information Technology, and Associate Dean (International Research Engagement) of Faculty of Science, Engineering and Built Environment, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international conferences proceedings. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.
Dr Weizhi Meng
Institute for Infocomm Research
Singapore
Charging threats are often ignored by the literature. In this talk, I introduce a new type of charging attack (called juice filming attack) based on a standard USB connector and HDMI, which can steal users' secrets through automatically video-capturing their inputs (e.g., unlock patterns, PIN code). The attack efficiency relies on the observations that users are not aware of any risk when charging their phones in public places and that most users would interact with their phone during the charging. Different from other malware and attacks, our designed juice filming attacks possess six major features: 1) be simple but quite efficient; 2) user unawareness; 3) does not need to install any apps on phone's side; 4) does not need to ask for any permissions; 5) cannot be detected by any current anti-malware software; 6) can be scalable and effective in both Android OS and iOS. To implement this attack, my work employs a VGA/RGB frame grabber and further conducts several user studies to explore the feasibility and effectiveness of such attack. Based on the understanding, additional mechanisms should be deployed to protect our mobile devices. I later introduce one potential solution: TMGuard, a touch movement security mechanism to enhance the security of Android unlock patterns, through combining it with behavioral biometrics.
Short Bio: Weizhi Meng received his B.Eng. degree in Computer Science from the Nanjing University of Posts and Telecommunications and obtained his Ph.D. degree in Computer Science from the City University of Hong Kong. He is currently a Research Scientist in Infocomm Security (ICS) Department, Institute for Infocomm Research, Singapore. His primary research interests are cyber security and intelligent technology in security including intrusion detection, mobile security and authentication, HCI security, trust computation, malware and vulnerability analysis. He also shows a strong interest in applied cryptography. He won the Outstanding Academic Performance Award during his doctoral study, and was a recipient of The HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014.
Dr Surya Nepal
CSIRO Data61
Australia
The emergence of Internet of Things (IoT) will see a large number of lightweight devices (referred to as things) connected over the Internet. Gartner estimated that 20.8 billion things will be connected by 2020. The things are usually deployed to monitor a physical environment and transmit the collected data to a backend server to store and analyse. A large number of applications are emerging in this area ranging from smart health, smart cities to smart grids. When things communicate with servers, it is critical to guarantee the authenticity of things and servers as their communication is over the open Internet.
The conventional way of authenticating Internet devices uses public-key encryption schemes, such as RSA (Rivest-Shamir- Adleman) and ECC (Elliptic curve cryptography). However, these schemes are too costly for lightweight IoT devices because they consume too much computation and memory resources. In this talk, we present a survey of the state-of- the art lightweight authentication protocols and a new lightweight public-key encryption we have developed. Based on this scheme, a corresponding mutual authentication protocol between two IoT devices, called CSIRO Light Weight Authentication Protocol (CLAP), is developed. This talk briefly discusses the CLAP and its features.
Short Bio: Dr Surya Nepal is a Principal Research Scientist at CSIRO Data61. He currently leads a distributed systems security team. His main research interest is in the development and implementation of technologies in the area of distributed systems and social networks, with a specific focus on security, privacy and trust. He obtained his BE from National Institute of Technology (NIT) Surat, India; ME from Asian Institute of Technology (AIT), Thailand; and PhD from RMIT University, Australia. He has more than 150 peer-reviewed publications to his credit; his papers are published in international journals such as IEEE Trans. Parallel and Distributed Systems, IEEE Trans. on Service Computing, ACM Trans. on Internet Technologies, and IEEE Trans. on Computers. He has co-edited three books including security, privacy and trust in cloud systems by Springer.
Ransomware is a relatively new business model being used by cybercriminals and it is still evolving. It changes the way that cybercriminals do their business; in particular on how they execute their Ransomware outbreaks. There has been an ongoing series of Ransomware outbreaks In Australia since mid 2014; these campaigns are specifically tailored for Australian victims. We do an in depth case study of these outbreaks, and ee look at how the changes in the business model affect the execution. In particular, these changes to the business model allow these campaigns to use many evasion techniques to avoid detection by security researchers, including:
Overall, the effect of these evasion techniques makes these attacks very effective since it makes research on these cyber threats difficult. This session will discuss the implications of these changes.
Short Bio: Jonathan Oliver works at Trend Micro most recently focusing on data analytics methods for identifying Ransomware outbreaks such as TorrentLocker and CryptoWall. Previous work has included machine learning and big data for the identification of BlackHole Exploit kit spam runs, and creating the antispam pattern. Prior to joining Trend Micro, Dr Oliver served as Chief Spam Fighter and Director of Research at Mailfrontier; and as a data mining consultant in the Silicon Valley for organisations such as NASA and the FAA. Jonathan Oliver holds a doctorate in information theoretic approaches to machine learning from Monash University, Melbourne. He holds more than 50 patents for technological designs.