Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT a ....Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT access control with machine learning based anomaly detection. This should provide significant benefits, such as preventing cyber threats on security and privacy of IoT and improving trust in IoT-enabled smart critical infrastructure of Australia.Read moreRead less
Towards a block-cipher circuit resistant to multiple side channel attacks. This project aims to design, implement and verify the first ever fully comprehensive countermeasure against simultaneous attacks on devices performing a cryptographic task, such as a smart card or a mobile phone used for an electronic payment, through a variety of side channels. Side channel attacks aim to obtain unauthorized access to secret cryptographic keys used by such devices, by collecting and statistically process ....Towards a block-cipher circuit resistant to multiple side channel attacks. This project aims to design, implement and verify the first ever fully comprehensive countermeasure against simultaneous attacks on devices performing a cryptographic task, such as a smart card or a mobile phone used for an electronic payment, through a variety of side channels. Side channel attacks aim to obtain unauthorized access to secret cryptographic keys used by such devices, by collecting and statistically processing measurements of by-products of the physical operation of these devices, such as the consumed power or electromagnetic radiation. Rapid proliferation of personal devices used for electronic payments or containing sensitive data makes such a comprehensive countermeasure urgently needed.Read moreRead less
Design automation for secure, reliable and energy efficient embedded processors. This project seeks to create a methodology to design and generate processors which are both secure, reliable and energy efficient for deployment in Internet of Things (IoT) systems, which require little on-going maintenance. In such systems, both security and reliability are paramount, particularly in medical devices, control devices in critical machinery, financial transactions and automotive electronics. The proje ....Design automation for secure, reliable and energy efficient embedded processors. This project seeks to create a methodology to design and generate processors which are both secure, reliable and energy efficient for deployment in Internet of Things (IoT) systems, which require little on-going maintenance. In such systems, both security and reliability are paramount, particularly in medical devices, control devices in critical machinery, financial transactions and automotive electronics. The project will use an open RISC-V processor which is sufficiently flexible to function as a base processor, with a myriad of tools such as compilers and debuggers available. Reliable computing machinery will enable systems to work in hostile environments and be functionally correct for longer.Read moreRead less