Security and Privacy

About Us

We are working on novel and practical solutions to improve the security and privacy of large real-world systems. Our research includes both attack and defense approaches that work on different layers, from web APIs, ML models, core software libraries to micro-architecture, firmware and hardware.

    Staff

    Given name Family namePositionProfileEmail
    ChitchanokChuengsatiansupSenior LecturerProfilec.chuengsatiansup@unimelb.edu.au
    ShaananCohneyLecturerProfilecohneys@unimelb.edu.au
    TobyMurrayAssociate ProfessorProfiletoby.murray@unimelb.edu.au
    OlyaOhrimenkoAssociate ProfessorProfileolya.ohrimenko@unimelb.edu.au
    ThuanPhamArc DECRA FellowProfilethuan.pham@unimelb.edu.au
    Ben RubinsteinProfessorProfilebenjamin.rubinstein@unimelb.edu.au

    Graduate Researchers

    Given name Family nameProfile Thesis Title
    Zhiyuan ZhangProfileInvestigating and mitigating performance interference of shared execution in browsers
    Jiankai JinProfileAnalysing utility and tradeoffs of multi-party machine learning
    Lianglu PanProfileAutomated vulnerability and flaw detection in network communications
    FaxingWangProfileN/A
    WentaoGaoProfileHuman-in-the-loop fuzzing for effective vulnerability discovery
    ElisaShiojiProfileN/A

    Projects

    AUSMURI-MURI Cybersecurity Assurance for Teams of Computers and Humans

    Researchers: Olya Ohrimenko, Toby Murray, Ben Rubinstein

    Sensing Semiconductor Devices in Operando with Terahertz Waves

    The project is founded upon a unique synergy between side-channel attacks and terahertz technology. It presents opportunities in dual-use of security and non-contact circuit evaluation. This project will focus on a proof of concept in actual scenarios with those semiconductor devices operating at their GHz clock speeds. A novel terahertz system will be purposely built from off-the-shelf components.

    Researchers:  Chitchanok Chuengsatiansup

    Intelligent Technologies for Smart Cryptography

    This project aims to improve cybersecurity by automating the process of generating cryptographic software for smart devices. The expected outcomes are tools that automatically produce efficient cryptographic software that resists attacks. The main benefit of this project is to reduce the amount of expert labour required when developing secure software.

    Researchers:  Chitchanok Chuengsatiansup

    Automatic Post-Quantum Cryptographic Code Generation and Optimization

    Quantum computers will break currently deployed cryptosystems, risking our privacy in daily email communications, integrity of online business transactions, confidentiality of national secrets, and global digital security. Translating quantum-resistant cryptographic algorithms into efficient implementations requires experts and their time. This project aims at automatizing this process by developing a toolkit to automatically generate optimized post-quantum cryptographic code.

    Researchers:  Chitchanok Chuengsatiansup

    Evaluating Post-Quantum Scheme Implementations

    This project addresses an urgent need for quantum-safe and side-channel-secure cryptosystems. The project will develop a toolkit to automatically evaluate side-channel security of cryptographic software implemented in high-level languages. It will further perform an evaluation of the security of implementations of 15 post-quantum schemes in two languages, Java and C#.

    Researchers:  Chitchanok Chuengsatiansup

    Leakage-Free Cryptography: Eliminating Side-Channel Leakage Using Compiler Optimization

    This project aims to improve the state of the art of secure cryptographic implementations. We aim to provide three types of tools: (1) Cipher code generation techniques that take a mathematical representation of a cipher and produce optimized and side-channel secure code for the cipher; (2) Side-channel leakage emulators that process an implementation and assess the amount of side channel leakage from it; and (3) Code manipulation techniques, guided by the output of the leakage emulators, that modify code, preserving its semantics while eliminating side channel leakage. These tools will allow rapid development of secure cryptographic code, reducing development cost and allowing fast deployment.

    Researchers:  Chitchanok Chuengsatiansup

    EdTech Privacy

    This project investigates both the technological artifacts and governance processes that educational institutions use when deploying technology. Of specific interest are technologies with a security related function, such as exam integrity software.

    Researchers: Shaanan Cohney

    Novel Secure Protocols

    This project looks to create new cryptographic protocols that provide advanced properties, such as mixing deniability and availability, or enabling cryptographically verifiable voting under constraints.

    Researchers: Shaanan Cohney

    Selective Data Flow-Guided Fuzzing — funded by Google

    This project investigates the common blockers that prevent fuzzing from making progress (e.g., to find more vulnerabilities) and explores different solutions from selective data flow-guided fuzzing to automated fuzz driver generation to bypass those blockers.

    Researchers: Toby Murray, Van Thuan Pham, Ben Rubinstein

    Automated security for embedded systems/IoTs

    This project explores practical solutions to fuzz test embedded systems that pose several challenges compared to normal software systems. For instance, we rarely have source code, and those systems have limited computing resources.

    Researchers: Shaanan Cohney, Toby Murray, Van Thuan Pham