The 11th annual meeting of the Australasian Information Security Conference (ACSW-AISC 2013) was held in Adelaide, at the City West Campus of the University of South Australia, as part of the Australasian Computer Science Week, January 29 - February 1, 2013. Originally, our conference was called the Australasian Information Security Workshop. In 2008, it was renamed the Australasian Information Security Conference. The main aim of the ACSW-AISC is to provide a venue for researchers to present their work on all aspects of information security, and to promote collaboration between academic and industrial researchers working in this area.
Proceeding Downloads
Slid pairs in the initialisation of the A5/1 stream cipher
A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding ...
Non-delegatable strong designated verifier signature using a trusted third party without pairings
Strong designated verifier signature (SDVS) is characterized by two properties; namely the non-transferability and the privacy of the signer's identity (PSI). Non-transferability prevents anyone else other than the designated verifier to verify the ...
Cryptanalysis of Brenner et al.'s somewhat homomorphic encryption scheme
Recently, Brenner et al. proposed a symmetric somewhat homomorphic encryption scheme and applied it to solve some practical problems, such as the Millionaires' problem, which only need to evaluate circuits of limited depth. It is claimed that the ...
An overview of the parallax BattleMind v1.5 for computer network defence
BattleMind (BM) version 1.5 is the first of a series of Artificial Intelligence systems for semi-automatically understanding, planning and conducting Computer Network Defence. It makes use of a wide range of existing techniques including classification ...
Digital camcorder forensics
Digital camcorders commonly have an in-built capability to export entire video files or a single image to storage media such as a digital versatile disc (DVD). In the event that a DVD is not properly finalised, its contents might not be easily readable. ...
Anatomy of drive-by download attack
Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques ...
Evaluation of fingerprinting techniques and a windows-based dynamic honeypot
Server honeypots are static systems, setup to monitor attacks on research and production networks. Static honeypots are unable to represent the dynamic nature of today's networks where different numbers of hardware devices and hosts running various ...
Advances in the protection of critical infrastructure by improvement in industrial control system security
This paper describes an international research effort that has been working toward identification of vulnerabilities in industrial control systems, mitigation strategies to address vulnerabilities, and development of tools to prevent intrusion on such ...
A decision and game theoretic approach to networked system security with applications to power grid
There has been a growing interest in decision and game theoretic approaches to networked system security as evidenced by the increasing number of publications and conferences such as the Conference on Decision and Game Theory for Security (GameSec). ...
Index Terms
- Proceedings of the Eleventh Australasian Information Security Conference - Volume 138