Current undergraduate students
Evaluating the Australian Government’s Legislative Response to the Encryption Debate
Adam Molnar, Deakin University
Abstract
The Australian Government released a proposed draft of legislation that would expand national security and law enforcement agencies’ access to encrypted communications on August 15, 2018. The draft, entitled the ‘Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018’ follows after several months of consultations.
Cybersecurity and Privacy Institute Launch

Join us
On Friday, September 28 we will launch the new Cybersecurity and Privacy Institute.
When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis
Aiman Erbad, Qatar University
With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user.
CrySP Speaker Series on Privacy - Finding Very Damaging Needles in Very Large Haystacks
Vern Paxson, University of California, Berkeley / Corelight, Inc. / International Computer Science Institute
Many of the most costly security compromises that enterprises suffer manifest as tiny trickles of behavior hidden within oceans of other site activity. This talk will examine the problem of developing robust detectors for particular forms of such activity. The process is in some ways a dual to that of adversaries who seek to design algorithms to identify users who employ particular approaches for keeping their network activity private.
Seminar • CrySP Speaker Series on Privacy — "Where's Waldo?" — Privacy in the Age of Internet-connected Mobile Technology
Matthew Finkel, The Tor Project
There are hundreds of millions of new "smart" mobile device users every year, but the mobile ecosystem and infrastructure are designed and built for optimizing convenience, not protecting the privacy of the user. From a design flaw in the Internet Protocol to an abundence of physical sensors, a mobile device may tell a third-party more information than the user intended or wanted.
Seminar • CrySP Speaker Series on Privacy — Where Theory Meets Practice for Privacy Enhancing Technologies
Chelsea Komlo, HashiCorp
Privacy Enhancing Technology communities rely on the research community for help designing and validating protocols, finding potential attack vectors, and applying new technological innovations to existing protocols. However, while the research community has made significant progress studying projects such as Tor, the number of research outcomes that have actually been incorporated into privacy enhancing technologies such as The Tor Project is lower than the number of feasible and useful research outcomes.
PhD Seminar • Cryptography, Security, and Privacy (CrySP) — Super-Happy Censorship-Resistant Fun Pages
Cecylia Bocovich, PhD candidate
David R. Cheriton School of Computer Science
- Previous page
- Currently on page 4 4