Computing & Mathematical Sciences Events
Seminar: Machine-Learning For Security Analysis: Opportunities and Challenges 8th Jan 2019
Machine learning (ML) is widely being used worldwide to solve problems in many areas including image recognition, natural language processing, anomaly detection, and more. Its success has also resulted in a lot of hype. While there is no doubt that many of ML techniques are very sophisticated, there are a number of challenges remaining.
In this talk I will summarise our work on using ML in the area of vulnerability detection using off-the-shelf ML techniques. I will compare results from the ML approach to those from static program analysis techniques. Labelled data used in this work comes from our earlier static analysis work. I will point to challenges and open questions that remain open in order for ML techniques to be useful for security analysis purposes, in a reliable way.
Seminar: Cyber Security Modeling and Analysis of Internet of Things 19th Dec 2018
A lot of Internet of Things (IoT) devices are vulnerable to cyber attacks. It is important to assess and enhance the security of IoT devices and IoT networks and service. The Cybersecurity Lab at the University of Canterbury (UC) along with other universities have received an MBIE grant on “advanced security technologies for the Internet of Things” (http://iotresearch.org/) as international collaborations between NZ universities (UC, Auckland University of Technology, Massey University, and Victoria University of Wellington) and Universities in Korea (Korea University and Sungkyunkwan University). In this talk, I will introduce on-going research topics under the MBIE grant and (1) a cybersecurity modeling and evaluation framework will be presented, (2) security assessment of IoT networks with non-patchable IoT nodes and mobile IoT nodes and (3) network level security defense techniques including moving target defenses and deception techniques. Finally, future work research revenues will be discussed.
Industry Talk: Real-world agile software development 14th Dec 2018
Agile is a work flow system that is rapidly gaining traction as a way organize and run projects within companies and organizations. Through the use of tribes, scrums, chapters, squads, sprints and missions small groups of people from differing backgrounds and skill sets collaborate to solve problems by sharing knowledge, ideas and effort. Agile breaks down barriers in traditional management structures by sharing knowledge and decision making among team members, giving the potential to greatly speed up workflows. There is no single best way to implement the Agile process as its performance and success varies based on the organization, team makeup, skill sets, project requirements and customer expectations. From my experiences as an employee in small to medium sized businesses working on various software projects I will give my thoughts and views on the challenges of real world software development, how we have applied components of the Agile Software Development process. I will describe some of the tools we use and others we have built to aid in our software development processes.
Australasian Conference on Combinatorial Mathematics and Combinatorial Computing 2018 10th Dec 2018
41ACCMCC will follow a similar format to previous conferences in the ACCMCC annual series, which is overseen by the Combinatorial Mathematics Society of Australasia (CMSA) and began in 1972. The conference programme will include keynote speakers, contributed talks in parallel sessions, a conference dinner and presentation of the CMSA student prize, and the CMSA Annual General Meeting.
David Sanger, the national security correspondent for the New York Times and author of the recent book “The Perfect Weapon: War, Sabotage and Fear in the Cyber Age” stated in a recent interview that “..in cyber conflict, the advantage goes to the least-wired society attacking the most-wired society.” In this regard governments worldwide, and at various levels, have rapidly published statements and policies related to appropriate responses to cyber-security and cyber-defence, now often referred to simply as “cyber”. Australia’s Federal Government released “Australia’s Cyber Security Strategy: Enabling Innovation, Growth & Prosperity” in 2016 with a “First Annual Update” in 2017. The strategy identified five major “themes” as requiring action over the years to 2020. These were based upon:
- A national cyber partnership;
- Strong cyber defences;
- Global responsibility and influence;
- Growth and innovation; and
- A cyber smart nation.
These need to be assessed against national military and defence policy overall, particularly in regard to funding and development as well as against similar policies and programs developing internationally, particularly in the Asia/Pacific (APAC) region. Emphasis needs to be given to necessary support for training, education and research in the area, now deemed to be of critical national security importance.
International Conference On Asia-Pacific Digital Libraries 2018 19th Nov 2018
Since its beginnings in Hong Kong in 1998, ICADL has become one of the premiere international conferences for digital library research. ICADL 2018 at the University of Waikato in New Zealand offers a valuable opportunity for researchers, educators, and practitioners to share their experiences and innovative developments. The main theme of ICADL 2018 is “Maturity and Innovation in Digital Libraries”.
Industry Talk: Statistics & Alchemy 16th Nov 2018
Imagimation is a technology start-up incubator based in Frankton, which currently houses several electricity retailers, a game development studio, and a technology solutions provider doing “affordable intelligence”. Within the umbrella of Imagimation, we work with full-stack web development, native ML/AI applications, and video games, alongside many smaller areas of interest. Being a group of technology companies, almost everything we do is tech-related at some level. Our primary technology stack uses Microsoft products at every level: VS IDE; Azure storage, hosting and compute; Razor Pages and ASP .NET Core frameworks. We also use Python, C++, Java, Julia, and Node/React/Redux in varying capacities.
I started at Imagimation as purely a machine learning developer, but quickly found myself involved in many other projects and areas. I’ve worked in almost every role I had skills in, and many I hadn’t, including project management, web development, and business strategy. Currently, I am a technology lead for one start-up and the owner/CEO of another.
The key skills needed to establish yourself in a technology start-up are adaptability and the willingness to learn, comfort with ambiguity, communication, and a positive attitude. Everything else can be learned on the job.
Cyber Security Seminar: SafeToOpen: Fighting newly made phishing website 9th Nov 2018
SafeToOpen has emerged out of a huge need to protect against phishing attacks which require its own defence strategy. Phishing attacks are not easy to detect as they grow smarter. In combination with social engineering techniques, the attack vector is very difficult to detect using conventional security controls. SafeToOpen has been designed using advanced strategies uniquely for detecting and eliminating phishing attacks. It uses security intelligence feeds as well as specially crafted algorithms to detect and respond to phishin.