News & EventsEvents and Seminars

Seminar: Why Isn't Security Easier for SMEs and Consumers?

Date: Thursday 14th August 2014

Time: 11:30 AM- 12:30 PM (1 hour)

Room: K15-145-OMB 145 (Old Main Building 145)

Presenter: Roger Clarke

Abstract: There are many facets of information and IT security, and threats and vulnerabilities change continually. Safeguards exist that provide at least a reasonable degree of protection. So, with so much accumulated knowledge around, why are SMEs and consumers hung out to dry? Why aren't consumer devices delivered with convenient security facilities?

This presentation outlines some technical solutions, and examines the market failure, regulatory failure, and industry and professional failure, that underlie this ongoing debacle.

The working paper is at:

Bio: Roger Clarke is a consultant in strategic and policy impacts of advanced information technologies.  He is Principal of Xamax Consultancy Pty Ltd, Canberra, and a Visiting Professor in the Cyberspace Law & Policy Centre at the University of N.S.W., and in the Research School of Computer Science at the Australian National University.  He has published 130 refereed papers and accumulated a Google citation count of over 4,500.  He is also Chair of the Australian Privacy Foundation (APF) and Secretary of the Internet Society of Australia (ISOC-AU).


Seminar: Internet privacy: Towards more transparency

Presenter: Dr Balachander Krishnamurthy, AT&T Labs - Research

Title: Internet privacy: Towards more transparency

Date: Tuesday 7 January 2014

Time: 3-4pm (Sydney time)

Venue: ATP Level 4 Seminar, CRL Seminar Room, VRL Room 124

Connection Details: Hosted at ATP via Video Conference to all other NICTA labs, VC dial in number - 61280934001


Internet privacy has become a hot topic recently with the radical growth of Online Social Networks (OSN) and attendant publicity about various leakages. For the last several years we have been examining aggregation of user's information by a steadily decreasing number of entities as unrelated Web sites are browsed. I will present results from several studies on leakage of personally identifiable information (PII) via Online Social Networks and popular non-OSN sites. Linkage of information gleaned from different sources presents a challenging problem to technologists, privacy advocates, government agencies, and the multi-billion dollar online advertising industry. Economics might hold the key in increasing transparency of the largely hidden exchange of data in return for access of so-called free services. I will also talk briefly about doing privacy research at scale.


Balachander Krishnamurthy is a member of technical staff at AT&T Labs--Research. His focus of research is in the areas of Internet privacy, Online Social Networks, and Internet measurements. He has authored and edited ten books, published 100 technical papers, holds forty six patents, and has given invited talks in thirty five countries.

He co-founded the successful Internet Measurement Conference in 2000 and in 2013 the Conference on Online Social Networks ( He has been on the thesis committee of several PhD students, collaborated with over seventy five researchers worldwide, and given tutorials at several industrial sites and conferences.

His most recent book “Internet Measurements: Infrastructure, Traffic and Applications” (525pp, Wiley, with Mark Crovella), was published in July 2006 and is the first book focusing on Internet Measurement. His previous book “Web Protocols and Practice: HTTP/1.1, Networking Protocols, Caching, and Traffic Measurement” (672 pp, Addison-Wesley, with Jennifer Rexford) is the first in-depth book on the technology underlying the World Wide Web, and has been translated into Portuguese, Japanese, Russian, and Chinese. Bala is homepageless and not on any OSN but many of his papers can be found at


Seminar: On Distance as a Tool for Network Understanding

Title: On Distance as a Tool for Network Understanding

Speaker: Dr Tim Strayer (BBN)

Date: Monday, October 21, 2013

Time: 11.00 - 12.00 am

Venue: K-17/113 Seminar Room, School of Computer Science and Engineering, UNSW


Understanding network behavior, especially to determine if the network is under attack, often requires making inferences based on observations without hard evidence. How do you know there is a botnet operating in your network? This talk will consider using a simple concept -- distance measures -- to gain insight from only passive observation of network traffic: who is trading packets, and when, and sometimes not even that much information. Distance measures similarity, and we consider questions about network behavior in terms of what traffic is close, and what is not.

Presenter Bio:
Dr. W. Timothy Strayer is a Principal Scientist in BBNs Advanced Networking group. He joined BBN in 1997 from Sandia National Laboratories (California). While at BBN, he has worked on many DARPA and industry sponsored projects in the areas of Active Networking, satellite packet switching, mobile IP, virtual private networks, and routing systems, and network security. He was the Principal Investigator for many projects on attack tracing and botnet detection, and has been the PI or a key contributor for many other network security activities. He has written over 30 journal and conference papers, several book chapters, and two Addison-Wesley books.

Panel Session: Cyber crime defence and Privacy: well together or growing apart?

Date: Monday, 21 October 2013

Time: 3.30 -5.30pm

Venue: Level 3 Seminar Room, NICTA Australian Technology Park Research Lab, Sydney, 13 Garden Street, EVELEIGH NSW 2015, (find it in Google maps)

(This panel session is jointly sponsored by NICTA and the School of Computer Science and Engineering at UNSW.)


Cyber crime laws attempt to bring order in the wild Interconnected world, as Cyber-threats are among the most serious economic and security challenges a nation might face. However, several controversial cyber-laws have found opposition from privacy activists who claim that these laws would override existing privacy laws, raising major transparency and accountability issues.
In this panel, five Security and Privacy experts from different areas will discuss technical and legislation aspects of the tension that exists between cyber-threats protection and citizen privacy. We will focus on the understanding of the different aspects of privacy and how legislation could be designed to fit everyone's notion of privacy. We will try to discuss whether cyber security laws are always and necessarily privacy unfriendly, from both a technical and a legislation perspective. Our experts will discuss with the audience whether today we have Draconian Crime Laws versus archaic Privacy Acts. Finally, our experts will address questions related to ways to balance Privacy and Security aspects. The panel will be organised in a very interactive structure, so audience's questions and comments are very welcome


Gene Tsudik, Chancellor's Professor of Computer Science, University of California Irvine, USA.

Tim Strayer, Principal Scientist, Advanced Network Research BBN Technologies, USA.

Malcolm Crompton, Managing Director, Information Integrity Solutions, Australia.

Richard Bergman, Director Forensic Technology, PwC Australia.

Vijay Varadharajan, Professor, Faculty of Science Macquarie University, Australia.

David Vaile, Executive Director, Cyberspace Law and Policy Centre UNSW, Australia.


Seminar: Selected Topics on Wireless Security and Localization

Title: Selected Topics on Wireless Security and Localization

Venue: CSE Seminar Room (113).

Date: Thu 4/04/2013

Time: 11:00 - 12:00


I will cover a couple of my recent contributions to secure localization and distance bounding. Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. I will show some practical examples of problems where distance bounding can provide a unique solution to problems which are otherwise difficult to solve. One such example is in the context of implantable medical devices.

One of the main obstacles for the wider deployment of distance bounding using electromagnetic (radio) waves, is the lack of hardware platforms that implement and support these protocols. I will show the first prototype system that demonstrates that radio distance bounding protocols can be implemented to match the strict requirements on processing time, that these protocols require. Our system implements a radio that is able to receive, process and transmit signals in less than 1ns.

Finally I will present an area where I see a great potential for future work. In both sensing and actuation applications there is a semantic gap between the electrical system and the physical world. In an adversarial setting this gap can be exploited to make a system believe that, e.g., a switch was activated, when in fact it wasn't. there is a plethora application domains that share this problem, from bio-medical sensors and implantable medical devices to factory control systems and security critical infrastructures.  Some of these challenges can be solved using a traditional cryptography approach, and some are highly interdisciplinary, and will best be handled in collaboration with experts from other fields.


Kasper Rasmussen received an MSc in Information Technology and Mathematics from the Technical University of Denmark in 2005. He got his Ph.D. from the Department of Computer Science at ETH Zurich in 2011. During his Ph.D. he worked on various security issues including secure time synchronization and secure localization with a particular focus on distance bounding. At the end of his Ph.D., Kasper Rasmussen received the ETH Medal for an outstanding dissertation, an award given to 8% of finishing Ph.D. students. Kasper Rasmussen is currently working as a postdoctoral researcher at University of California, Irvine. His research interests include system security and security of wireless networks; security of embedded and cyber-physical systems, including smart grid nodes and hand held devices; protocol design and applied cryptography.


Page 3 of 4