国产精品

Dr Arash Shaghaghi

Dr Arash Shaghaghi

Senior Lecturer

Education:

  • PhD - Computer Science and Engineering, 国产精品 Sydney, Australia.
  • MSc - Information Security, University College London (UCL), UK.
  • BSc with Distinction -听 Heriot-Watt University, UK.

Certifications:

  • Negotiation Strategies for Researchers, 国产精品 Sydney, 2023.
  • Graduate Certificate of Higher Education (Learning and Teaching), Deakin University, Australia, 2021.
  • Essentials of Supervision (for HDRs), 国产精品 Sydney, 2024.
  • Data: Law, Policy, and Regulation, London School of Economics (LSE), UK, 2021.
  • Oxford Blockchain Strategy Programme, The University of Oxford, UK, 2018.
  • Project Management for Researchers, RMIT University, 2022.
  • Introduction to Qualitative Research,听Australian Consortium for Social and Political Research Incorporated (ACSPRI), Australia, 2022.
Engineering
Computer Science and Engineering

Arash Shaghaghi is a Senior Lecturer in Cyber Security at the School of Computer Science and Engineering (CSE) of 国产精品 Sydney. He is a member of the 国产精品 Institute for Cyber Security (IFCYBER),听国产精品听Data Science Hub (uDASH), and听Information Security and Privacy Group (IsPri).听Arash has previously been affiliated with RMIT University, Deakin University, Data61 CSIRO, The University of Melbourne, and The University of Texas at Dallas. He completed his PhD in Computer Science and Engineering at 国产精品 Sydney, MSc in Information Security at University College London (UCL), and BSc at Heriot-Watt University.听

Research Profile: Arash has received over 1.7 million AUD听funding听(Lead CI and CI combined) for his cyber security research from various sources, including industry, government, and universities. Most recently, he was awarded $528K as the Lead Chief Investigator from CSCRC and Cisco for the "IoT Data Security and Assurance Framework for Intelligent Transport" project. He has received awards and appraisals for his research performance, including university recognitions and best paper awards. In 2023, Arash was among the top 200 young computer science and mathematics scientists selected by the Heidelberg Laureate Forum (HLF) in Germany. Arash has contributed to several articles on cyber security incidents or about his research work for various media outlets, including the Australian Broadcasting Corporation (ABC) and The Guardian.听Arash serves as the Associate Editor for the Journal of Ad Hoc Networks.

Teaching Profile: Arash is an award-winning educator with multiple awards and recognitions for leading the design, development, and delivery of hands-on cybersecurity programs and courses. In 2023, he was awarded the Educational Excellence & Innovation award from the Faculty of Engineering at 国产精品 Sydney. Before joining 国产精品, he led RMIT's Graduate Certificate of Cyber Security Governance and Risk Management. At Deakin University, Arash was the Deputy Academic Director (Teaching) at the School of IT and the Graduate Certificate in Information Technology Director. He was also a member of the team leading the Bachelor of Cybersecurity, which redeveloped the program with a technical and hands-on curriculum by integrating several industry-leading cybersecurity certifications as part of the degree. He has completed training in designing and teaching effective learning programs and holds the Graduate Certificate of Higher Education (Learning and Teaching) from Deakin University.

Location
School of Computer Science and Engineering (CSE), Level 4, Building K17, 国产精品 SYDNEY 2052.
  • Book Chapters | 2019
    Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2019, 'Software-Defined Network (SDN) data plane security: Issues, solutions, and future directions', in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 341 - 387,
    Book Chapters | 2018
    Desmedt Y; Shaghaghi A, 2018, 'Function-based access control (FBAC): Towards preventing insider threats in organizations', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 143 - 165,
  • Journal articles | 2022
    Gill SS; Xu M; Ottaviani C; Patros P; Bahsoon R; Shaghaghi A; Golec M; Stankovski V; Wu H; Abraham A; Singh M; Mehta H; Ghosh SK; Baker T; Parlikad AK; Lutfiyya H; Kanhere SS; Sakellariou R; Dustdar S; Rana O; Brandic I; Uhlig S, 2022, 'AI for next generation computing: Emerging trends and future directions', Internet of Things (Netherlands), 19,
    Journal articles | 2022
    Maroof U; Shaghaghi A; Michelin R; Jha S, 2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193,
    Journal articles | 2022
    Syed NF; Shah SW; Shaghaghi A; Anwar A; Baig Z; Doss R, 2022, 'Zero Trust Architecture (ZTA): A Comprehensive Survey', IEEE Access, 10, pp. 57143 - 57179,
    Journal articles | 2021
    Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2021, 'LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)', Computers and Security, 108,
    Journal articles | 2021
    Stephens B; Shaghaghi A; Doss R; Kanhere SS, 2021, 'Detecting Internet of Things Bots: A Comparative Study', IEEE Access, 9, pp. 160391 - 160401,
    Journal articles | 2020
    Ali Shah SW; Shaghaghi A; Kanhere SS; Zhang J; Anwar A; Doss R, 2020, 'Echo-id: Smart user identification leveraging inaudible sound signals', IEEE Access, 8, pp. 194508 - 194522,
    Journal articles | 2020
    Gill SS; Shaghaghi A, 2020, 'Security-aware autonomic allocation of cloud resources: A model, research trends, and future directions', Journal of Organizational and End User Computing, 32, pp. 15 - 22,
  • Preprints | 2024
    A. CAR; Shaghaghi A; Batista G; Kanhere SS, 2024, Towards Weaknesses and Attack Patterns Prediction for IoT Devices
    Preprints | 2022
    Gill SS; Xu M; Ottaviani C; Patros P; Bahsoon R; Shaghaghi A; Golec M; Stankovski V; Wu H; Abraham A; Singh M; Mehta H; Ghosh SK; Baker T; Parlikad AK; Lutfiyya H; Kanhere SS; Sakellariou R; Dustdar S; Rana O; Brandic I; Uhlig S, 2022, AI for Next Generation Computing: Emerging Trends and Future Directions,
    Conference Papers | 2022
    Rivera A CA; Shaghaghi A; Nguyen DD; Kanhere SS, 2022, 'Is This IoT Device Likely to听Be Secure? Risk Score Prediction for听IoT Devices Using Gradient Boosting Machines', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 115 - 127,
    Conference Papers | 2021
    Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2021, 'Health access broker: Secure, patient-controlled management of personal health records in the cloud', in Advances in Intelligent Systems and Computing, Springer Nature, pp. 111 - 121,
    Preprints | 2021
    Alvarez CAR; Shaghaghi A; Nguyen DD; Kanhere SS, 2021, Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines, ,
    Conference Papers | 2021
    Kamenski D; Shaghaghi A; Warren M; Kanhere SS, 2021, 'Attacking with bitcoin: Using bitcoin to build resilient botnet armies', in Advances in Intelligent Systems and Computing, pp. 3 - 12,
    Preprints | 2020
    Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud,
    Conference Papers | 2020
    Jha S; Zhou J; Michelin R; Ahmed N; Shaghaghi A, 2020, 'Massage from the chairs', in Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, pp. VI,
    Preprints | 2020
    Kamenski D; Shaghaghi A; Warren M; Kanhere SS, 2020, Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies, ,
    Conference Papers | 2020
    Puggioni E; Shaghaghi A; Doss R; Kanhere SS, 2020, 'Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs', in 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020,
    Preprints | 2020
    Puggioni E; Shaghaghi A; Doss R; Kanhere SS, 2020, Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs, ,
    Conference Papers | 2020
    Rivera A CA; Shaghaghi A; Kanhere SS, 2020, 'Towards a Distributed Defence Mechanism against IoT-based Bots', in Proceedings - Conference on Local Computer Networks, LCN, pp. 449 - 452,
    Conference Papers | 2020
    Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2020, 'Towards a lightweight continuous authentication protocol for device-to-device communication', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 1119 - 1126,
    Preprints | 2020
    Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2020, Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication, ,
    Conference Papers | 2019
    Maroof U; Shaghaghi A; Jha S, 2019, 'PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices', in IoT S and P 2019 - Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, Association for Computing Machinery (ACM), ENGLAND, London, pp. 50 - 56, presented at Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, ENGLAND, London, 15 November 2019,
    Preprints | 2018
    Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, ,
    Conference Papers | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings - Conference on Local Computer Networks, LCN, pp. 553 - 561,
    Preprints | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, ,
    Conference Papers | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018,
    Preprints | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, ,
    Conference Papers | 2017
    Shaghaghi A; Kaafar MA; Jha S, 2017, 'WedgeTail: An intrusion prevention system for the data plane of software defined networks', in ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 849 - 861, presented at 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 02 April 2017 - 06 April 2017,
    Preprints | 2017
    Shaghaghi A; Kaafar MA; Jha S, 2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, ,
    Conference Papers | 2017
    Shaghaghi A; Kaafar MA; Scott-Hayward S; Kanhere SS; Jha S, 2017, 'Towards Policy Enforcement Point as a Service (PEPS)', in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016, pp. 50 - 55,
    Conference Papers | 2016
    Desmedt Y; Shaghaghi A, 2016, 'Function-based access control (FBAC): From access control Matrix to access control tensor', in MIST 2016 - Proceedings of the International Workshop on Managing Insider Security Threats, co-located with CCS 2016, pp. 89 - 92,
    Preprints | 2016
    Shaghaghi A; Ali M; Kaafar ; Scott-Hayward S; Kanhere SS; Jha S, 2016, Towards Policy Enforcement Point as a Service (PEPS), ,
    Conference Abstracts | 2014
    Shaghaghi A; Hong J; Jha S, 2014, 'An SDN-based framework for detection of illegal rebroadcasting of channels in P2PTV', in VideoNEXT 2014 - Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming, pp. 47 - 49,

Recent grants at 国产精品:

Title Source Year Role
A scalable workflow for the audio monitoring of biodiversity across urban and remote Australia 2024-2027

Chief Investigator.

Lead Chief Investigator: A/Prof Will Cornwell.听

Quantum-Safe Security Measures for IoT-based Intelligent Transport Systems 2024-2026

Lead Chief Investigator.

Other Chief Investigators: Prof Sanjay Jha, Dr Nazatul Sultan, Dr Raymond Zhao.听

IoT Data Security and Assurance Framework for Intelligent Transport and 2022-2024

Lead Chief Investigator.

Other Chief Investigators:听Prof Sanjay Jha, Dr Aditya Joshi, Dr Jesse Laeuchli, A/Prof Gustavo Batista, Prof Flora Salim.

International Seed Funding

Faculty of Engineering, 国产精品 Sydney 2023

Lead Chief Investigator.

Other Chief Investigators: Dr Siqi Ma, Dr Mohammad Goudarzi, Prof Salil Kanhere, Prof Sanjay Jha

International International Lectureship Travel Funding Faculty of Engineering, 国产精品 Sydney 2023 Lead Chief Investigator.
Advanced IDE for software security support 2022-2024

Chief Investigator.

Lead Chief Investigator: Dr听Helen Paik. Other Chief Investigators: Prof Sanjay Jha, Dr Siqi Ma.

ACRA Visiting Fellowship to visit the听 at the University of Melbourne School of Computer Science and Engineering (CSE) 2022 Lead Chief Investigator.
Taste of Research (ToR) student recruitment scholarship School of Computer Science and Engineering (CSE) 2023 Lead Chief Investigator.

Other grants (selected):

  • "Zero Trust Architectures for Australia's Critical Infrastructure Security", Australian Government, 2020. [Role: Co-Investigator, Principal Investigator: Prof Robin Doss]
  • "Fingerprinting Compromised IoT Devices Based on Power Consumption",听Source: Cyber Security Cooperative Research Centre (CSCRC), 2019. [Honours Project, Role: Primary Supervisor]
  • "Data after Death (DaD): Understanding the Risks to Australians", Source:听Centre for Cyber Security Research and Innovation (CSRI), Deakin University.听[Role: Primary Investigator]
  • "Detecting Internet of Thing (IoT) Bots" | Summer Research Project, Source:听Centre for Cyber Security Research and Innovation (CSRI), Deakin University.听[Role: Primary Supervisor]
  • "Bitcoin Meta-data and Malware C&C Servers" | Summer Research Project, Source: School of IT, Deakin University.听[Role: Primary Supervisor]

2018 - now:

  • 国产精品 Sydney, 国产精品 Faculty of Engineering, Educational Excellence & Innovation, Excellence Awards 2023, 2023.
  • Selected as one of the top 200 young computer science and mathematics scientists for听the 10th (HLF), Germany, 2023.
  • Deakin University, School of Information Technology Award - Excellence in Early Career Research Performance, 2020.
  • Best Demo Award, The 45th IEEE Conference on Local Computer Networks (LCN) [Core A-ranked], 2020.
  • Deakin University, School of Information Technology Award - Excellence in Teaching & Unit Development, 2020.
  • Deakin University, School of Information Technology Award - Successfully Embedding Industry Certifications within Cyber Security Units, 2020.
  • Deakin University, School of Information Technology Award - Excellence in International Student Engagement, 2020.
  • Deakin University, School of Information Technology - Teaching & Learning Award: Outstanding Industry Capstone Supervisor, 2019.
  • The University of New South Wales (国产精品 Sydney), 国产精品 ARC Research Student Award, 2018

Media Engagements:

  • "", The Guardian (23 June 2023). [Selected parts of interview published at听, etc. Translated versions of the article in , , , , , , etc. | 国产精品 Archive]

  • "", Money Magazine (23 June 2023).

  • "What to do with digital data after death",听ABC Weekend with Jason Chong, ABC Adelaide (17 June 2023).

  • ?,听BusinessThink (25 April 2023). [Re-published by ]

  • , BusinessThink (15 March 2023). [Re-published by ,听, , ).

  • 听(20 Oct 2022) (Re-published by ,听, ,听, , , ). Several media interviews by Prof Jha based on our joint media release, including with , , , , , and more.

  • with RRR - topic: "Cybersecurity on Private Message Apps"

  • Radio Interview with 听(21 September 2022) - topic:听"Encryption and Secure Messaging Apps".

  • Radio Interview with Joy Media | 听(15 September 2022) - topic:听"Encryption and Secure Messaging Apps".

  • 听(Re-published by , ,听, , , , , , , )

  • 听(Re-published by , ,听, , , )

  • "From the cradle to the grave", published by Australian Information Security Association (AISA) .

  • ABC Radio National:听. (interviews on the same topic with ABC Radio Sydney, ABC Statewide Drive NSW, ABC Radio Adelaide, 2NURFM Radio of New Castle).

  • "" interview with Deakin Newsroom as program lead for the School of IT, Deakin University.

My Research Supervision

Research Team:

  • PostDoc - Current: Dr Mohammad Goudarzi听[Main, CSCRC Project]听| Dr Shohreh Deldari [Main, CSCRC Project]
  • Software Developer: Nimesha听Wickramasinghe [Main, CSCRC Project], Xinzhang Chen [Main, CSCRC Project], Chengbin Feng [Main, CSCRC Project],听Harshmeetsingh Ramindersingh Chandhok [Main, CSCRC Project]
  • Research Assistant: Hassan Ali [Main, CSCRC Project]
  • PhD Students - Current: 3听

  • PostDoc - Former: 3 (Co-supervisor)
  • PhD Students - Graduated: 2 (国产精品)
  • Masters with Major Thesis: 3 (Completed)
  • Funded Summer Projects: 2 (Completed)
  • Masters with Minor Thesis: 10 (Completed)

My Teaching

  • Operating System Fundamentals for Security (ZZEN9217), Master of Cyber Security, 国产精品 Online. || Role: Course Developer (H5 2022), Course Convenor (H5 2022).
  • Foundations of Cyber Security (ZZEN9201), Master of Cyber Security, 国产精品 Online. || Role: Course Convenor (H2 2023).