Learn More
Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper we demonstrate how to use the attack to extract private encryption keys from GnuPG. The high resolution and low noise of the Flush+Reload attack enables a spy program to recover over 98% of the bits of the private key in a single decryption or signing(More)
Surveillance camera technologies have reached the point whereby networks of a thousand cameras are not uncommon. Systems for collecting and storing the video generated by such networks have been deployed operationally, and sophisticated methods have been developed for interrogating individual video streams. The principal contribution of this paper is a(More)
Automated video surveillance networks are a class of sensor networks with the potential to enhance the protection of facilities such as airports and power stations from a wide range of threats. However, current systems are limited to networks of tens of cameras, not the thousands required to protect major facilities. Realising thousand camera automated(More)
Engaging first year students is a difficult problem, as students must develop independent study skills while concurrently mastering their chosen topic. At the same time, they find themselves in an alien environment, removed from their peer group and anonymised by University structures. Retention is of particular concern within ICT as across Australia, and(More)
When presented with results and evidence that clearly show how teaching and learning can be improved, it is not uncommon for such ideas to be rejected because of personal experience, inter-disciplinary suspicion or because the information seems to completely counter all previously accepted wisdom. Such behaviour in students could be classified as a reaction(More)
Rapid technological advances in recent years have precipitated a general shift towards software distribution as a central computing paradigm. This has been accompanied by a corresponding increase in the dangers of security breaches, often causing security attributes to become an inhibiting factor for use and adoption. Despite the acknowledged importance of(More)
Video surveillance is a key technology for enhanced protection of facilities such as airports and power stations from various types of threat. Networks of thousands of IP-based cameras are now possible, but current surveillance method-ologies become increasingly ineffective as the number of cameras grows. Constructing software that efficiently and reliably(More)
There is a call for change in the treatment of ICT curriculum in our schools driven by the relatively recent acknowledgement of the growing importance of ICT in industry and society, and the need to empower youth as producers, as well as consumers, of technology. ICT curriculum in previous incarnations tended to focus on ICT as a <i>tool</i>, with the(More)