Venue
Please use the following link to submit your talk information: https://forms.office.com/r/jVhHj4xj4x
*Conference program booklet can be downloaded here.
Welcome
We extend our warm welcome to you for the second annual UQ Cyber Security Research Conference 2024.
This conference represents a notable accomplishment in the field of cyber security research & development at UQ, as we assemble to exchange insights, investigate cutting-edge technologies and methodologies, and establish new partnerships.
As we all know, the need for effective cyber security has never been greater. Our world is becoming increasingly interconnected, and as a result, we face ever more complex and sophisticated threats to our digital infrastructure. Cyber attacks can have serious consequences, ranging from financial losses to damage to our critical infrastructure, and even to threats to national security.
This is precisely why events such as this conference hold tremendous significance. By convening preeminent researchers, HDR students, practitioners, industry experts, and policymakers from UQ and worldwide, we possess an exceptional prospect to gain knowledge from each other, share ideas, and work together towards groundbreaking resolutions to the obstacles that confront us.
We have prepared various research talks in the field of cyber security research. We will explore topics such as AI for cyber security, cyber defence for industrial control systems, applied cryptography and formal methods, novel cyber defence techniques and much more. We will also have ample opportunities to network, exchange ideas, and build new relationships that will help to advance the state of the art in this critically important field.
On behalf of the organising committee, we would like to welcome to each and every one of you. Thank you for joining us at this event, and I look forward to a productive and enlightening few days ahead.
Sincerely,
Ryan Ko and Dan Kim
General chairs
General Chairs
- Prof Ryan Ko, Chair & Director, Cyber Security, The University of Queensland, Australia
- A/Prof Dan Kim, Deputy Director, Cyber Security, The University of Queensland, Australia
Program Chairs
- Dr Guowei Yang, The University of Queensland, Australia
Industry Liaison Chair
- Mr Grant Ferguson, Senior Manager (Industry & Development), The University of Queensland, Australia
Local Organisation Chair
- Mrs Kana Smith, Project Manager, UQ Cyber, The University of Queensland, Australia
- Ms Wenlu Zhang, PhD student, The University of Queensland, Australia
Web Chair
- Mr Shunyao Wang, PhD student, The University of Queensland, Australia
Keynote Speeches
Keynote 1: Dr Jonathan Pan (Home Team Science and Technology Agency (HTX), Government of Singapore & UQ Alumnus) - confirmed
Keynote 2: Dr Padmanabhan Krishnan (Oracle) - 'Intelligent Application Security'
I will present an overview of our vision for security tooling as part of DevSecOps and the progress we have made towards it. I will also outline open problems that need more research. Our approach includes a mixture of static and dynamic program analysis and the use of LLMs. These techniques are applied to protect applications from known injection attacks, address software supply chain security issues and attempt to remediate security issues in an autonomous fashion. To prevent known injection attacks, we use ideas of synthesis from programming by example to generate security monitors that are based on program-point specific allowlists. We analyse build systems and scripts (e.g., GitHub Actions, bash scripts) to ensure that third-party artifacts consumed are properly built and published. We also help developers harden their build pipelines and make their artifacts tamper resistant via associated provenances. We are exploring the role of LLMs in the process to automate the remediation.
Keynote 3: Dr David Lacey (Founder, IDCARE) - 'Brains, Bytes and Blame'
Cybercrimes rely significantly on plausibility of deceptive techniques. But little is understood about what influences a victim of cybercrime in their belief of criminals that can have catastrophic impacts for organisations, individuals and economies. This presentation unpacks research on the belief influences of online deception and questions whether we have the orientation of our cyber security practices geared towards countering instances where belief of such attacks may prevail.
Final Program
Thursday, 11 July 2024
Time (Brisbane time, UTC +10) | Session information | Session chair |
---|---|---|
8:00 - 9:00 | Registration open | |
9:00 - 9:05 | Welcome by A/Prof Dan Kim, Deputy Director of UQ Cyber | Dan Kim |
9.05 - 9.10 | Welcome remarks by Prof Michael Bruenig, Head of School of EECS | Dan Kim |
9.10 - 9.30 | Remarks by Mr Rob Champion, QLD Government Chief Information Security Officer (Confirmed) | Dan Kim |
9.30 | Guidance remarks by A/Prof Dan Kim | Dan Kim |
9:30 - 10:10 | Keynote 1 - Dr Jonathan Pan, Home Team Science and Technology Agency (HTX), Government of Singapore & UQ Alumnus (Confirmed) | Dan Kim |
10:10 - 10:40 | Morning tea break | |
10:40 - 11:20 | Keynote 2 - Dr Padmanabhan Krishnan, Oracle (Confirmed) | Mark Utting |
11.20 - 12.00 | Keynote 3 - Dr David Lacey, Founder, IDCARE (Confirmed) | Guowei Yang |
12:00 - 13:00 | Lunch | |
13:00 - 13:05 | Welcome remarks by Prof Sue Harrison, EAIT Executive Dean | Dan Kim |
13:05 - 13:10 | ASD introductions by Mrs Kyla Quinn, Technical Director Data & Analytic Services, ASD | Dan Kim |
13:10 - 15.00 | PHD research talks | Guowei Yang |
15.00 - 15.30 | Afternoon tea break | |
15.30 - 16:30 | UQ seed funding research + TinyRange | Naipeng Dong |
16:30 - 17:00 | Wrap up by AusCERT |
Talk Schedule at a Glance
Name | Title | Talk type |
---|---|---|
Taejun Choi | Cyber autonomous to protect smart grid from price attack | PhD |
Omar Jarkas | Solving End-to-end Data Processing Encryption with Confidential Computing | PhD |
Rita Lok | Justice for sexual assault and rape: Digital and legal discourses in Australia | PhD |
Hetong Jiang | Data provenance in the Era of Distributed Computing | PhD |
Shunyao Wang | Assessing the Vulnerability of Self-Supervised ML Models in CPS under Evasion Attacks | PhD |
Cheng Miao | Applying Situational Crime Prevention to Business Processes to Prevent Cybercrimes | PhD |
Wenlu Zhang | Proactive security of Industrial Control Systems via a Hybrid Honeypot Approach | PhD |
Subrat Swain | PANDA: Practical Adversarial Attacks Against Intrusion Detection Applications | PhD |
Isha Pali | Protecting Autonomous Vehicles: Safeguarding Against Modern Intrusion Detection System Attacks | PhD |
Yuexi Xu | Formal Verification Techniques for Post-Quantum Cryptography | Seed Funding |
Djamahl Etchegaray | RoadAtlas 2.0 – A Resilient and Privacy-Preserving Platform for Automated Road Defect Detection and Asset Management | Seed Funding |
Liuhuo Wan | SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation | Seed Funding |
Joshua Scarsbrook | TinyRange: Next-generation Virtualisation for Cyber and beyond | TinyRange |
Event Photos