Cyber Security Winter School

Deakin University Melbourne Burwood Campus
7-8 July 2016


About CSWS 2016

In the information era, it has become increasingly vital and challenging to secure the cyber space. Advanced technologies and tools to perpetrate cyber attacks with critical impact have become readily available for use by anybody. It is no longer necessary to be an IT expert to infiltrate or cripple information systems, steal sensitive information on them, and disrupt the services they provide. This great challenge also pushes the advancement of cyber security technologies. Researchers and practitioners from both academia and industry have achieved significant progress in a range of related areas, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of information systems. CSWS 2016 will bring together prominent cyber security experts from academia and industry to address a set of diverse topics, discuss future trends, share their insight, present their own rich experiences, and provide focused knowledge on cutting edge cyber security technologies.

CSWS 2016 will be held at Deakin University Melbourne Burwood Campus on 7-8 July 2016. Registration is FREE. Class materials, morning tea, lunch, and afternoon tea will be provided to all attendees. Attendees are expected to cover their travel and accommodation costs.

Co-located Event

CSWS 2016 is co-located with the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), which will be held at Deakin University Melbourne City Centre on 4-6 July 2016.

Visit ACISP 2016 Website

Why attend CSWS 2016?

We will reflect and elaborate on how to best go from research and innovation to solving real-world problems. Prominent experts from academia and industry will address a set of diverse topics, present their own rich experiences, offer their wisdom, and provide focused state-of-the-art knowledge on key cyber security technologies. Networking opportunities will allow you to build relationships with these experts.

Each attendee will receive an attendance certificate, attesting to the fact that she/he actively participated.

Who should attend CSWS 2016?

We welcome a wide range of attendees who are interested in cyber security. For example, if you are a student with already some good related coursework or a research degree; an engineer or practitioner who works on securing your company's information systems and develops security solutions; a teacher of cyber security courses; or a researcher whose field is cyber security or related, then CSWS 2016 is certainly for you!



Yang Xiang, Deakin University, Australia
Matthew Warren, Deakin University, Australia

Local Arrangement Chairs

Joseph K. Liu, Monash University, Australia
Yu Wang, Deakin University, Australia

Publicity Chairs

Iqbal Gondal, Federation University, Australia
Kaitai Liang, Aalto University, Finland


Deakin University
Melbourne Burwood Campus
221 Burwood Highway
Burwood, VIC 3125 Australia


In case of any questions, please feel free to contact us at

NOTE: The registration is based on Google Forms. If you see a blank page above, please make sure you can access Google. Otherwise, you may download and fill the offline form and send it back to


Big Forensic Data Management and Reduction

Assoc Professor Raymond Choo
University of South Australia

Visis Raymond's Homepage


The growth in the data volume and number of evidential data, including from heterogeneous distributed systems such as cloud and fog computing systems and Internet-of-Things devices (e.g. IP-based CCTVs), has led to increased collection, processing and analysis times, potentially resulting in vulnerable persons (e.g. victims of terrorism incidents) being at risk. In the tutorial, we will examine how data reduction can be realistically implemented to reduce collection and processing times, as well as reducing the time to undertake analysis, and providing investigators with evidence or actionable intelligence in a timely manner. Findings from a case study using real world data from an Australian Police agency will also be discussed.

Short Bio: Kim-Kwang Raymond Choo is an Associate Professor of Cyber Security and Forensics at the University of South Australia, a Visiting Scholar at INTERPOL Global Complex for Innovation, and a Guest Professor at China University of Geosciences, Wuhan, China. His publications include two authored books (Springer 2008; Elsevier 2014 - Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group), seven Australian Government refereed monographs, and six parliamentary submissions. He has been a Keynote/Plenary Speaker at conferences such as SERENE-RISC Spring 2016 Workshop , IEEE International Conference on Data Science and Data Intensive Systems (DSDIS2015), and those organized by Infocomm Development Authority of Singapore (2015), CSO Australia and Trend Micro (2015), Cloud Security Alliance New Zealand (2015), Anti-Phishing Working Group (2014), National Taiwan University of Science and Technology (2014), Asia Pacific University of Technology & Innovation (2014), Nanyang Technological University (2011), and National Chiayi University (2010); and more recently in 2015, an Invited Expert at events organized by UNAFEI, INTERPOL, Taiwan Ministry of Justice Investigation Bureau, and at the World Internet Conference (Wuzhen Summit) in 2014, jointly organized by the Cyberspace Administration of China and the People's Government of Zhejiang Province. He was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine / Microsoft's Next 100 series in 2009, and is the recipient of ESORICS 2015 Best Research Paper Award, 2015 Winning Team of Germany's University of Erlangen-Nuremberg Digital Forensics Research Challenge, 2014 Australia New Zealand Policing Advisory Agency's Highly Commended Award, 2010 Australian Capital Territory Pearcey Award, Fulbright Scholarship in 2009, 2008 Australia Day Achievement Medallion, and British Computer Society's Wilkes Award. He is an IEEE Senior Member, and a Fellow of the Australian Computer Society.

Data Security, Integrity and Deduplication in Cloud Computing

Professor Yi Mu
University of Wollongong

Visis Yi's Homepage


Cloud computing offers many new types of computing services to end users via computer networks. It has become a trend that individuals and enterprises store their data remotely in cloud storage systems for flexible access and reduction of cost. Cloud computing has significantly reduced the burden of data storage management and maintenance on hardware and software. Despite the great benefits from cloud computing, data security and integrity are still challenging problems in cloud storage systems. Using cryptography as a tool, in this talk we will address data security and integrity issues and discuss their solutions. As an equally important topic in cloud computing, data deduplication is a popular technique widely used to save storage spaces in the cloud. However, it is not easy to deduplicate encrypted data. To achieve secure deduplication of encrypted files, some latest encryption and deduplication technologies will be introduced in this talk.

Short Bio: Professor Yi Mu is currently a full professor and co-director of Centre for Computer and Information Security Research at University of Wollongong, Australia. He was the Head of School of Computer Science and Software Engineering during 2011-2015. Prior to joining University of Wollongong, he was a senior lecturer in the Department of Computing, Macquarie University. He also worked in the Department of Computing and IT, University of Western Sydney as a lecturer. He has been with the University of Wollongong since 2003. His current research interest includes cryptography, network security, information security, and quantum cryptography. Professor Mu has published 400 research papers, including over 150 journal papers. He has served as program chair and member of program committee over 200 conferences including ACM CCS, ESORICS, ACISP, AisaCCS, etc. and is currently a member of the steering committees of AsiaCCS, CANS and ProvSec. Professor Yi Mu is the editor-in-chief of International Journal of Applied Cryptography and serves as associate editor for nine other international journals. He is a senior member of the IEEE.

Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity

Professor Shouhuai Xu
University of Texas at San Antonio
United States

Visis Shouhuai's Homepage


For decades, Computer and Information Security research has been driven by fundamental concepts such as Confidentiality, Integrity, and Availability. What will drive the study for the emerging Science of Cybersecurity? In this talk, I will describe the innovative concept of Cybersecurity Dynamics, which naturally leads to a multidisciplinary framework that cuts across Computer Science (including Security), Applied Mathematics (broadly defined, including Stochastic Processes, Dynamical Systems, Control Theory, Game Theory), Statistics, Statistical Physics, Complexity Science, and Network Science. The framework offers a systematic x-y-z-t "coordinate system" (or roadmap) for exploring cybersecurity, where the x-axis represents first-principle modeling, the y-axis represents data analytics, the z-axis represents metrics, and the t-axis represents time (meaning that everything evolves over time). I will briefly review some recent results in these directions (with emphasis on high-level ideas). I will outline some inherent technical barriers that must be tackled before achieving the ultimate goal. Please refer to for more information about this exciting research endeavor.

Short Bio: Shouhuai Xu is a Full Professor in the Department of Computer Science, University of Texas at San Antonio. He is Director of the Laboratory for Cybersecurity Dynamics ( His research is primarily in making cyberspace secure and trustworthy. He is especially interested in both theoretical modeling/analysis of cybersecurity and devising practical cyber defense techniques (e.g., provably-secure cryptographic protocols and other advanced cyber defense mechanisms). His research has been funded by AFOSR, ARO, NSF and ONR. He was a Program Committee co-chair of NSS'15 and Inscrypt'13. He co-initiated the ACM Scalable Trusted Computing Workshop (ACM STC). He has served on the Program Committees of numerous international conferences/workshops. He is currently an Associate Editor of IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) and IEEE Transactions on Information Forensics and Security (IEEE T-IFS). He earned his PhD in Computer Science from Fudan University.