Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
Machine learning in adversarial environments. Machine learning underpins the technologies driving the economies of both Silicon Valley and Wall Street, from web search and ad placement, to stock predictions and efforts in fighting cybercrime. This project aims to answer the question: How can machines learn from data when contributors act maliciously for personal gain?
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
Internet authentication protocols: theory and practice. Authentication is the foundation for secure electronic communication. It is the first step for many everyday online processes such as remote login or electronic banking. This project aims to make analysis of such protocols more realistic and more complete, allowing online communication to become more secure for both corporate users and individuals.
Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ ....Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ secret keys. The expected outcomes will bridge theory and practice, providing economic benefits to industry by enabling practical mechanisms to store confidential user’s information in the cloud, hence lowering the infrastructure cost for industry.Read moreRead less
Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become realit ....Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become reality, perhaps next decade. This project aims to recreate and expand the power of FE from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid crypto principles. It begs exploring, for the truly spectacular outcomes likely to ensue.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. Thi ....Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. This project will also propose a novel integrated trust enhanced cloud security architecture, enabling the design of adaptive secure systems which will be more resilient to dynamic cyber security attacks. It will demonstrate the proposed models and architecture using a practical cloud based online application.Read moreRead less
Sequential attribute-based encryption: new cryptographic framework, constructions and applications towards cloud security. The purpose of this project is to find niche and significant techniques to preserve the order of attributes in modern cryptography. Novel cryptographic techniques applicable to securing important areas, such as cloud computing and anonymous credential systems will be developed, which will lead to commercialisation.
Discovery Early Career Researcher Award - Grant ID: DE150101116
Funder
Australian Research Council
Funding Amount
$315,000.00
Summary
Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques dev ....Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques developed in this project will produce technologies essential for securing data communications in current and future computer networks, and hence directly contribute to improving cybersecurity for all Australians.Read moreRead less