Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop ....Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop a self-contained, reliable, compatible and verifiable crypto library; (2) we will develop security test software automatically to test and verify security of codes; and (3) we will provide intelligent decision support through argumentation to help developers to apply the library efficiently and correctly.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.