Internet of Things and Computer Security
Our Internet of Things (IoT) and Computer Security research group explores important issues surrounding the collection and use of often-sensitive Internet-connected data virtually everywhere: its ownership, access and protection.
We regularly collaborate with software and hardware providers, such as Intel, AMD and OpenSSL. We also work closely with Australian defence agencies, including the Defence Science and Technology (DST) Group and Australian Signals Directorate.
Our research focuses on:
- using machine learning algorithms to analyse time-series data on wirelessly powered IoT devices
- realising security services in the absence of operating-system control, and under device constraints
- understanding how hardware and operating system services support confidential-information management
- analysing cryptographic algorithms to identify potential data leaks.
Our IoT and Computer Security group aims to provide solutions to fundamental problems in pervasive computing. This includes in relation to:
- devices’ battery life
- making sense of noisy, continuous and sometimes untrustworthy data streams
- authenticating familiar security services and IoT devices’ veracity-sensor measurements
- securing store keys with limited IoT hardware
- keeping sensitive information confidential.
Our research has been applied in a number of real-world settings, including to identify vulnerabilities in commonly used software and hardware, such as Spectre and Meltdown.
We have also published more papers at top-tier international security conferences than all other Australian research universities combined.
We work closely with industry on IoT deployments that include:
- machine learning with time series data
- secure firmware
- secure firmware updates.
We have expertise across a wide range of areas. Many of our researchers are available to assist with research project supervision for Master of Philosophy and Doctor of Philosophy students. To enquire about consulting services or working with us on a research project, please contact the researchers listed below.
|Dr Damith Ranasinghe|
|Dr Yuval Yarom||Computer security|