Coding and information theory. Renyi entropies. Randomness testing. Sequence design with good correlation properties. Combinatorics. Cryptography and cryptanalysis. Information security. Detection of persistent insider threats. Anti-malware techniques. Biometrics. Complex networks.
Plenary talks and conference chairmanships
- Invited Lecturer, AMSI WInter School on Cryptography, Brisbane 2014.
- Invited Plenary Lecturer, IEEE International Workshop on Signal Design and Applications, Tokyo, 2013.
- Invited Keynote Speaker, IT Security and Risk Management Summit, Melbourne, 2010.
- Invited Lecturer, Summer Research School on Codes over Rings, supported by UNESCO, Ankara, 2008.
- Invited Plenary Lecturer, International Security and Cryptology Workshop, Ankara, 2007.
- General Chair: Australasian Conference on Information Security and Privacy (ACISP), Melbourne, 2011
- Program co-Chair: Applied Algebra, Algebraic Algorithms and ErrorCorrecting Codes (AAECC), Bangalore, 2007 and Melbourne, 2001.
- Co-organizer, AMSI (Australian Mathematical Sciences Institute) Workshop on Sequences and Codes and Their Applications, Melbourne, 2008.
- Program Committee Member: Sequences and Their Applications 2010 and 2004, IEEE IWSDA (International Workshop on Signal Design and Analysis) 2013, 2012, 2011 and 2007, IEEE ICCASS 2007, ISC 2011 and 2007.
Links with industry
- 1994-now: Consulted to industry in the areas of wireless telecommunications, error-correction coding, machine learning, and image compression.
- 2007-2011: Advisory Board Member, SECIA, The Victorian eSecurity Cluster
Information Theory, Cryptography and Security, Advanced Topics in Cryptography, Smartcard Cryptosystems.
Current PhD research projects
- Lightweight Encryption. PhD Started in 2013
- A Technological and Behavioural Approach for Insider Threat Detection and Prediction. PhD Started in 2012
Completed PhD and master’s research projects
- REFORM: A Framework for Malware Packer Analysis using Information Theory and Statistical Methods. PhD Completed in 2010
- Fault attacks and Countermeasures for Elliptic Curve Cryptosystems. PhD Completed in 2009
- Traitor Tracing using Generalized Reed Solomon Codes and Combinatorial Designs. PhD Completed in 2005
- Some Results on the Cryptanalysis of Block and Stream Ciphers, MSc Completed in 2005
- Bachelor of Science in Electrical Engineering, MIT, 1983
- Master of Science in Electrical Engineering, University of Southern California, 1986
- Doctor of Philosophy in Electrical Engineering, University of Southern California, 1990
- Boztas, S.,Kahraman, S.,Ozbudak, F.,Tekin, E. (2015). A generalized construction for perfect autocorrelation sequences In: 2015 International Symposium on Information Theory Proceedings, Hong Kong, China, 14-19 June 2015
- Boztas, S.,Ozbudak, F.,Tekin, E. (2015). Correlation distribution of a new sequence family In: 2015 Instiute of Electrical and Electronics Engineers International Symposium on Information Theory, Hong Kong, China, 14-19 June 2015
- Boztas, S.,Alamer, A. (2015). Statistical dependencies in the self-shrinking generator In: Proceedings of the 7th International Workshop on Signal Design and its Applications (IWSDA 2015), Benguluru, India, 13-18 September 2015
- Gamachchi, A.,Boztas, S. (2015). Web access patterns reveal insiders behavior In: Proceedings of the 7th International Workshop on Signal Design and its Applications (IWSDA 2015), Benguluru, India, 13-18 September 2015
- Liu, Z.,Parampalli, U.,Guan, Y.,Boztas, S. (2014). A new weight vector for a tighter levenshtein bound on aperiodic correlation In: IEEE Transactions on Information Theory, 60, 1356 - 1366
- Alzahrani, T.,Horadam, K.,Boztas, S. (2014). Community detection in bipartite networks using random walks In: Complex Networks V: Proceedings s of the 5th Workshop on Complex Networks CompleNet 2014, Bologna, Italy, 12-14 March 2014
- Boztas, S. (2014). On renyi entropies and their applications to guessing attacks in cryptography In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E97-A, 2542 - 2548
- Parampalli, U.,Boztas, S. (2014). A class of quaternary noncyclic Hadamard matrices In: Australasian Journal of Combinatorics, 60, 255 - 262
- Jeffers, J.,Horadam, K.,Carstens, C.,Rao, A.,Boztas, S. (2013). Influence neighbourhoods in CiteSeer: a case study In: Proceedings of the 9th International Conference on Signal-Image Technology and Internet-Based Systems (SITIS 2013), Kyoto, Japan, 2-5 December 2013
- Sun, L.,Boztas, S.,Horadam, K.,Rao, A. (2013). Guarding the source code against inside attacks: a case study of user access patterns In: Proceedings of the 22nd Australasian Software Engineering Conference 2013, Melbourne, Australia, 4-7 June 2013
- Secure User Authentication With Continuous Adaptive Risk Evaluation. Funded by: ARC Linkage Grant 2014 Round 1 from (2015 to 2018)
- A Fast and Effective Automated Insider Threat Detection and Prediction System. Funded by: ARC Linkage Project 2011 Round 2 from (2011 to 2014)
- Analysis and classification of malicious code. Funded by: ARC Linkage Project 2007 Round 2 from (2008 to 2011)
- CA Postgraduate Research Project - Li Sun. Funded by: CA Pacific Postgraduate Research Contract from (2006 to 2009)
- Optimisation of fingerprint matching algorithms. Funded by: Victorian Partnership for Advanced Computing (VPAC) Contract from (2006 to 2007)
4 PhD Completions and 1 Masters by Research Completions4 PhD Current Supervisions