Alana Maurushat

Learn More
'Aren't you just giving the virus writers ideas?' Research into future security threats is not always taken kindly by all members of the anti-virus community. Understanding the bounds of security research is important, however, with the increasing emphasis on proactive rather than reactive defences. We begin to examine how far security research can go in(More)
The extent of Internet censorship in countries like China is regularly tested, but the testing methods used from within a censored country can entail risk for humans. A benevolent worm can be used for testing instead: the worm's self-replication, long the bane of suggested benevolent viruses and worms, is shown to be essential here. We describe the design(More)
Using Internet Service Provider 'Big' metadata as a case study, we examine legal and ethical issues with machine learning Big Data tools developed and deployed in Australia for law enforcement intelligence purposes. In order to do this, we outline the benefits, limitations and risks of these tools, analyze current methods for de-identification and(More)
  • 1