The UQ Cyber Security Research Conference (CSRC 2024)

The UQ Cyber Security Research Conference (CSRC 2024)

Thu 11 Jul 2024 8:00am5:00pm

Venue

Room C207, Hawken Engineering (50), UQ

Please use the following link to submit your talk information: https://forms.office.com/r/jVhHj4xj4x 

*Conference program booklet can be downloaded here.


Welcome

We extend our warm welcome to you for the second annual UQ Cyber Security Research Conference 2024. 

This conference represents a notable accomplishment in the field of cyber security research & development at UQ, as we assemble to exchange insights, investigate cutting-edge technologies and methodologies, and establish new partnerships. 

As we all know, the need for effective cyber security has never been greater. Our world is becoming increasingly interconnected, and as a result, we face ever more complex and sophisticated threats to our digital infrastructure. Cyber attacks can have serious consequences, ranging from financial losses to damage to our critical infrastructure, and even to threats to national security.

This is precisely why events such as this conference hold tremendous significance. By convening preeminent researchers, HDR students, practitioners, industry experts, and policymakers from UQ and worldwide, we possess an exceptional prospect to gain knowledge from each other, share ideas, and work together towards groundbreaking resolutions to the obstacles that confront us. 

We have prepared various research talks in the field of cyber security research. We will explore topics such as AI for cyber security, cyber defence for industrial control systems,  applied cryptography and formal methods, novel cyber defence techniques and much more. We will also have ample opportunities to network, exchange ideas, and build new relationships that will help to advance the state of the art in this critically important field.

On behalf of the organising committee, we would like to welcome to each and every one of you. Thank you for joining us at this event, and I look forward to a productive and enlightening few days ahead.

 

Sincerely,

Ryan Ko and Dan Kim

General chairs


General Chairs

  • Prof Ryan Ko, Chair & Director, Cyber Security, The University of Queensland, Australia
  • A/Prof Dan Kim, Deputy Director, Cyber Security, The University of Queensland, Australia

Program Chairs

Industry Liaison Chair 

  • Mr Grant Ferguson, Senior Manager (Industry & Development), The University of Queensland, Australia   

Local Organisation Chair

  • Mrs Kana Smith, Project Manager, UQ Cyber, The University of Queensland, Australia 
  • Ms Wenlu Zhang, PhD student, The University of Queensland, Australia   

Web Chair

  • Mr Shunyao Wang, PhD student, The University of Queensland, Australia   

Keynote Speeches

Keynote 1: Dr Jonathan Pan (Home Team Science and Technology Agency (HTX), Government of Singapore & UQ Alumnus) - confirmed

Keynote 2: Dr Padmanabhan Krishnan (Oracle) - 'Intelligent Application Security'

I will present an overview of our vision for security tooling as part of DevSecOps and the progress we have made towards it. I will also outline open problems that need more research. Our approach includes a mixture of static and dynamic program analysis and the use of LLMs. These techniques are applied to protect applications from known injection attacks, address software supply chain security issues and attempt to remediate security issues in an autonomous fashion. To prevent known injection attacks, we use ideas of synthesis from programming  by example to generate security monitors that are based on program-point specific allowlists. We analyse build systems and scripts (e.g., GitHub Actions, bash scripts) to ensure that third-party artifacts consumed are properly built and published. We also help developers harden their build pipelines and make their artifacts tamper resistant via associated provenances. We are exploring the role of LLMs in the process to automate the remediation.

Keynote 3: Dr David Lacey (Founder, IDCARE) - 'Brains, Bytes and Blame'

Cybercrimes rely significantly on plausibility of deceptive techniques. But little is understood about what influences a victim of cybercrime in their belief of criminals that can have catastrophic impacts for organisations, individuals and economies. This presentation unpacks research on the belief influences of online deception and questions whether we have the orientation of our cyber security practices geared towards countering instances where belief of such attacks may prevail.


Final Program

Thursday, 11 July 2024

Time (Brisbane time, UTC +10)

Session information

Session chair

8:00 - 9:00

Registration open

 

9:00 - 9:05

Welcome by A/Prof Dan Kim, Deputy Director of UQ Cyber

Dan Kim

9.05 - 9.10

Welcome remarks by Prof Michael Bruenig, Head of School of EECS

Dan Kim

9.10 - 9.30

Remarks by Mr Rob Champion, QLD Government Chief Information Security Officer (Confirmed)

Dan Kim

9.30

Guidance remarks by A/Prof Dan Kim 

Dan Kim

9:30 - 10:10

Keynote 1 - Dr Jonathan Pan, Home Team Science and Technology Agency (HTX), Government of Singapore & UQ Alumnus (Confirmed)

Dan Kim
10:10 - 10:40

Morning tea break

 

10:40 - 11:20

Keynote 2 - Dr Padmanabhan Krishnan, Oracle (Confirmed)

Mark Utting

11.20 - 12.00

Keynote 3 - Dr David Lacey, Founder, IDCARE (Confirmed)

Guowei Yang

12:00 - 13:00

Lunch 

13:00 - 13:05

Welcome remarks by Prof Sue Harrison, EAIT Executive DeanDan Kim
13:05 - 13:10

ASD introductions by Mrs Kyla Quinn, Technical Director Data & Analytic Services, ASD

Dan Kim

13:10 - 15.00

PHD research talks

Guowei Yang
15.00 - 15.30

Afternoon tea break

 

15.30 - 16:30

UQ seed funding research + TinyRange

Naipeng Dong

16:30 - 17:00

Wrap up by AusCERT

 

Talk Schedule at a Glance

NameTitleTalk type
Taejun ChoiCyber autonomous to protect smart grid from price attackPhD
Omar JarkasSolving End-to-end Data Processing Encryption with Confidential ComputingPhD
Rita LokJustice for sexual assault and rape: Digital and legal discourses in AustraliaPhD
Hetong JiangData provenance in the Era of Distributed ComputingPhD
Shunyao WangAssessing the Vulnerability of Self-Supervised ML Models in CPS under Evasion AttacksPhD
Cheng MiaoApplying Situational Crime Prevention to Business Processes to Prevent CybercrimesPhD
Wenlu ZhangProactive security of Industrial Control Systems via a Hybrid Honeypot ApproachPhD
Subrat SwainPANDA: Practical Adversarial Attacks Against Intrusion Detection ApplicationsPhD
Isha PaliProtecting Autonomous Vehicles: Safeguarding Against Modern Intrusion Detection System AttacksPhD
Yuexi XuFormal Verification Techniques for Post-Quantum CryptographySeed Funding
Djamahl EtchegarayRoadAtlas 2.0 – A Resilient and Privacy-Preserving Platform for Automated Road Defect Detection and Asset Management Seed Funding
Liuhuo WanSATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset GenerationSeed Funding
Joshua ScarsbrookTinyRange: Next-generation Virtualisation for Cyber and beyondTinyRange

Event Photos