Industry collaboration to secure our power networks
Working with industry partner Powerlink Queensland, Dr Ernest Foo and collaborators conducted a detailed security analysis of the DNP3 protocol, the main protocol used to automate substations in Australia, to identify vulnerabilities and propose mechanisms to secure power networks from cyber attacks.
Protecting communications in autonomous infrastructure
Autonomous vehicles and other unsupervised systems increasingly rely on trustworthy communications. We are investigating the security of communications protocols used within and between mobile and fixed infrastructure, as used in transport, manufacturing and other essential services systems.
Secure and efficient Internet of Things data networks
Installed in a mine or a household refrigerator, microprocessors can transmit data about location, gas levels and even dust. Dr Vicky Liu’s research is focused on cyber security for IoT data with consideration to performance and cost, and can be applied to smart cities, wearable fitness trackers, or any networked objects
The vital importance of information systems makes them a tempting target for attacks. We need to protect critical data and the systems that use, store and transmit it.
Our discipline brings together a diverse team of experts who deliver world-class education and achieve breakthroughs in research.
Explore our staff profiles to discover the amazing work our researchers are contributing to.
Creating a simple and strong cryptography for humans to take the front seat in real security protocols
Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies.
This project aims to create a simple and strong cryptography, so that humans can, for the first time, take front seat in real security protocols. The technical challenge is to build public-key ciphers, operable manually from a mental key in seconds, and from there remake human-powered versions of many useful information security protocols.
Recreate and expand the power of functional encryption (FE) from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid cryptography principles
Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become reality, perhaps next decade.
This project aims to recreate and expand the power of FE from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid crypto principles.
- Cyber Security Cooperative Research Centre, 2018-2025.
- Re-Engineering Enterprise Systems for Microservices in the Cloud, 2019-2021.
- Big Data Analysis on Personal Computers, 2017-2020.
- Legacy2Service: a novel, model-driven technique for re-engineering on-demand software services out of legacy applications, 2014-2016.
We offer research consultancy services to industry and government bodies in our specialist fields of cryptography and secure networking.
Contact our academic staff to find out more about their research specialisations, or our Science and Engineering Industry and Engagement office to discuss partnership opportunities.