Dr Douglas Stebila

This person does not currently hold a position at QUT.
Biography
Academic Appointments- Assistant Professor, Department of Computing and Software, Faculty of Engineering, McMaster University, Hamilton, Ontario, Canada (2016–)
- Senior Lecturer, School of Electrical Engineering and Computer Science and School of Mathematical Sciences, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Queensland, Australia (2013—2016)
- Lecturer, School of Electrical Engineering and Computer Science and School of Mathematical Sciences, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Queensland, Australia (2010—2013)
- Postdoctoral Research Fellow, Information Security Institute, Queensland University of Technology, Brisbane, Queensland, Australia (2009–2010)
- Lecturer, Department of Combinatorics & Optimization, University of Waterloo, Waterloo, Ontario, Canada (2006–2007)
Education
- Graduate Certificate in Academic Practice, Queensland University of Technology, Brisbane, Queensland, Australia (2011–2013)
- PhD in Combinatorics & Optimization, University of Waterloo, Waterloo, Ontario, Canada (2004–2009)
- Certificate in University Teaching, University of Waterloo, Waterloo, Ontario, Canada (2005–2008)
- MSc in Mathematics and Foundations of Computer Science, Pembroke College, University of Oxford, Oxford, United Kingdom (2003–2004)
- BMath in Honours Combinatorics & Optimization and Computer Science in Co-Operative Education, University of Waterloo, Waterloo, Ontario, Canada (1998–2003)
Personal details
Keywords
Cryptography, Key exchange, Digital signatures, Public key encryption, Client puzzles, Elliptic curve cryptography, Quantum cryptography, Network security protocols, Secure Sockets Layer (SSL), Internet security
Discipline
Data Format, Computer Software, Other Mathematical Sciences
Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Qualifications
- PhD in Combinatorics & Optimization (University of Waterloo)
Professional memberships and associations
My PGP/GPG public key has key ID 0x35A2F17C7C8B45E2 and fingerprint 2ADA 9B8D A02C 2977 D998 FFAA 35A2 F17C 7C8B 45E2.
Teaching
- CAB240 Information Security (Semester 2, 2015)
- MXB251 Number Theory and Abstract Algebra (Semester 2, 2015)
- MXB102 Abstract Mathematical Reasoning (Semester 1, 2015)
- INX271 The Web (Semester 1, 2014)
- MXB102 Abstract Mathematical Reasoning (Semester 1, 2014)
- MAB461 Discrete Mathematics (Semester 2, 2013)
- INX355 Cryptology & Protocols (Semester 2, 2013)
- INN651 Security Technologies (Semester 2, 2013)
- MAB122/127 Linear Algebra and Multi-variable Calculus (Semester 1, 2013)
- INN651 Security Technologies (Semester 2, 2012)
- MAB461 Discrete Mathematics (Semester 2, 2012)
- MAB122/127 Algebra and Analytic Geometry (Semester 1, 2012)
- MAN778 Applications of Discrete Mathematics (Semester 1, 2012)
- INN651 Security Technologies (Semester 2, 2011)
- MAB122/127 Algebra and Analytic Geometry (Semester 1, 2011)
- MAN778 Applications of Discrete Mathematics (Semester 1, 2011)
Experience
I am currently an Assistant Professor at McMaster University in Hamilton, Ontario, Canada. For up-to-date information, please see my research website at http://www.cas.mcmaster.ca/~stebilad/ My research focuses on the cryptographic security of Internet protocols.
From 2010-2016, I was a Lecturer and then Senior Lecturer at the Queensland University of Technology, jointly appointed between the school of Electrical Enginnering and Computer Science and the school of Mathematical Sciences.
From 2009-2010, I was a postdoctoral researcher at the Information Security Institute at the Queensland University of Technology, addressing cryptographic aspects of denial of service resistance.
From 2004-2009, I was a PhD student affiliated with the Institute for Quantum Computing at the University of Waterloo. I worked with Prof. Michele Mosca on a variety of problems related to quantum cryptography, including an analysis of the cryptographic case for quantum key distribution and the development of quantum coins, a new form of digital cash that makes use of the no-cloning properties of quantum money.
As a PhD student, I was also affiliated with the Centre for Applied Cryptographic Research at the University of Waterloo. My research included analyzing side-channel attacks on elliptic curve cryptography, password authenticated key exchange protocols, and denial of service resistance of key exchange protocols.
Between 2001 and 2005, I worked several times as an intern at Sun Microsystems Laboratories in the Next Generation Cryptography project, working with Sheueling Chang Shantz, Vipul Gupta, Hans Eberle, and Nils Gura. Our research focused on next generation cryptographic technologies. I worked on software implementations of elliptic curve cryptography and the ECDH and ECDSA algorithms, and integrated them into the widely used OpenSSL and NSS toolkits. Our work resulted in several publications and a technical standard.
Selected publications
- Bergsma F, Dowling B, Kohlar F, Schwenk J, Stebila D, (2014) Multi-ciphersuite security of the Secure Shell (SSH) protocol, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 369-381.
- Poettering B, Stebila D, (2014) Double-authentication-preventing signatures, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Proceedings, Part I [Lecture Notes in Computer Science, Volume 8713], pp. 436-453.
- Alawatugoda J, Stebila D, Boyd C, (2014) Modelling after-the-fact leakage for key exchange, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 207-216.
- Alawatugoda J, Boyd C, Stebila D, (2014) Continuous after-the-fact leakage-resilient key exchange, Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Proceedings [Lecture Notes in Computer Science, Volume 8544], pp. 258-273.
- Goldberg I, Stebila D, Ustaoglu B, (2013) Anonymity and one-way authentication in key exchange protocols, Designs, Codes and Cryptography, 67 (2), pp. 245-269.
- Giesen F, Kohlar F, Stebila D, (2013) On the security of TLS renegotiation, Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 387-398.
- Broadbent A, Gutoski G, Stebila D, (2013) Quantum one-time programs, Advances in Cryptology : 33rd Annual Cryptology Conference, CRYPTO 2013, Proceedings, Part II [Lecture Notes in Computer Science, Vol 8043], pp. 344-360.
- Suriadi S, Stebila D, Clark A, Liu H, (2011) Defending web services against denial of service attacks using client puzzles, Proceedings of 2011 IEEE 9th International Conference on Web Services, pp. 25-32.
- Stebila D, Kuppusamy L, Rangasamy J, Boyd C, Gonzalez Nieto J, (2011) Stronger difficulty notions for client puzzles and denial-of-service resistant protocols, Topics in Cryptology - CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, Proceedings [Lecture Notes in Computer Science, Vol 6558], pp. 284-301.
- Gupta V, Stebila D, Fung S, Chang Shantz S, Gura N, Eberle H, (2004) Speeding up secure web transactions using elliptic curve cryptography, Proceedings of the 11th Network and Distributed System Security Symposium, 2004, pp. 1-9.
QUT ePrints
For more publications by Douglas, explore their research in QUT ePrints (our digital repository).
Awards
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2015
- Details
- Program committee co-chair for ACISP 2015: Australasian Conference on Information Security and Privacy
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2015
- Details
- Program committee member for Eurocrypt 2015
- Type
- Academic Honours, Prestigious Awards or Prizes
- Reference year
- 2014
- Details
- ACM Conference on Computer and Communications Security (CCS) 2014 Best Student Paper award for the paper "Multi-ciphersuite security of the Secure Shell (SSH) protocol". Conference acceptance rate 20%. Top-ranked cryptography/security conference according to Google Scholar.
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2014
- Details
- Program committee member for LATINCRYPT 2014
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2014
- Details
- Program committee member for USEC 2014: Workshop on Usable Security
- Type
- Committee Role/Editor or Chair of an Academic Conference
- Reference year
- 2014
- Details
- Program committee member for ACISP 2014: Australasian Conference on Information Security and Privacy
- Type
- Keynote Speaker/Expert Panel Member/Invited Speaker for a Conference
- Reference year
- 2014
- Details
- Invited speaker for Real World Cryptography Workshop 2014, New York, USA
- Type
- Keynote Speaker/Expert Panel Member/Invited Speaker for a Conference
- Reference year
- 2013
- Details
- Invited speaker for 12th Annual AusCERT Information Security Conference, Gold Coast, Australia.
- Type
- Other
- Reference year
- 2013
- Details
- Program committee member for NSERC (Natural Sciences and Engineering Research Council of Canada) CREATE Training Program in Building a Workforce for the Cryptographic Infrastructure of the 21st Century (CryptoWorks21)
- Type
- Academic Honours, Prestigious Awards or Prizes
- Reference year
- 2011
- Details
- IEEE International Conference on Web Services (ICWS) 2011 Best Paper Award for paper "Defending web services against denial of service using client puzzles". Conference acceptance rate 14%.
Research projects
- Title
- Internet authentication protocols: theory and practice
- Primary fund type
- CAT 1 - Australian Competitive Grant
- Project ID
- DP130104304
- Start year
- 2013
- Keywords
- information security; cryptographic protocols