Industry collaboration to secure our power networks
Working with industry partner Powerlink Queensland, Dr Ernest Foo and collaborators conducted a detailed security analysis of the DNP3 protocol, the main protocol used to automate substations in Australia, to identify vulnerabilities and propose mechanisms to secure power networks from cyber attacks.
Protecting communications in autonomous infrastructure
Autonomous vehicles and other unsupervised systems increasingly rely on trustworthy communications. We are investigating the security of communications protocols used within and between mobile and fixed infrastructure, as used in transport, manufacturing and other essential services systems.
Secure and efficient Internet of Things data networks
Installed in a mine or a household refrigerator, microprocessors can transmit data about location, gas levels and even dust. Dr Vicky Liu’s research is focused on cyber security for IoT data with consideration to performance and cost, and can be applied to smart cities, wearable fitness trackers, or any networked objects
What is information security?
A growing demand for expertise
SCADA (Supervisory Control and Data Acquisition) cyber security laboratory
The Category 1 funded research projects we are currently leading are:
Creating a simple and strong cryptography for humans to take the front seat in real security protocols
Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies.
This project aims to create a simple and strong cryptography, so that humans can, for the first time, take front seat in real security protocols. The technical challenge is to build public-key ciphers, operable manually from a mental key in seconds, and from there remake human-powered versions of many useful information security protocols.
Recreate and expand the power of functional encryption (FE) from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid cryptography principles
Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become reality, perhaps next decade.
This project aims to recreate and expand the power of FE from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid crypto principles.
- Legacy2Service: a novel, model-driven technique for re-engineering on-demand software services out of legacy applications, 2014-2016.
- Big Data Analysis on Personal Computers, 2017-2020.
Our discipline brings together a diverse team of experts who deliver world-class education and achieve breakthroughs in research. We invite you to connect with our staff community.
Are you looking to study at a higher or more detailed level? We are currently looking for students to research topics at a variety of study levels, including PhD, Masters, Honours or the Vacation Research Experience Scheme (VRES).