¹úÃñ²ÊƱ

Dr Arash Shaghaghi

Dr Arash Shaghaghi

Senior Lecturer

Education:

  • PhD - Computer Science and Engineering, ¹úÃñ²ÊƱ Sydney, Australia.
  • MSc - Information Security, University College London (UCL), UK.
  • BSc with Distinction -Ìý Heriot-Watt University, UK.

Ìý

Certifications:

  • Create & Manage Networks Program,ÌýREALTUS, 2024.
  • Negotiation Strategies for Researchers, ¹úÃñ²ÊƱ Sydney, 2023.
  • Graduate Certificate of Higher Education (Learning and Teaching), Deakin University, Australia, 2021.
  • Essentials of Supervision (for HDRs), ¹úÃñ²ÊƱ Sydney, 2024.
  • Data: Law, Policy, and Regulation, London School of Economics (LSE), UK, 2021.
  • Oxford Blockchain Strategy Programme, The University of Oxford, UK, 2018.
  • Project Management for Researchers, RMIT University, 2022.
  • Introduction to Qualitative Research,ÌýAustralian Consortium for Social and Political Research Incorporated (ACSPRI), Australia, 2022.
Engineering
Computer Science and Engineering

Arash Shaghaghi is a Senior Lecturer in Cyber Security and Acting Director of Online Education at the School of Computer Science and Engineering (CSE) of ¹úÃñ²ÊƱ Sydney. Arash has previously been affiliated with RMIT University, Deakin University, Data61 CSIRO, The University of Melbourne, and The University of Texas at Dallas. He completed his PhD in Computer Science and Engineering at ¹úÃñ²ÊƱ Sydney, MSc in Information Security at University College London (UCL), and BSc at Heriot-Watt University.Ìý

Research Profile: Arash has received over 1.7 million AUD in fundingÌý(Lead CI and CI combined) for his cybersecurity research from various sources, including industry, government, and universities. Most recently, he has been awarded $528K as the Lead Chief Investigator from CSCRC and Cisco for the "IoT Data Security and Assurance Framework for Intelligent Transport" project. Arash has a track record of publication at the most competitive peer-reviewed conferences and journals, such as IEEE Symposium on Security and PrivacyÌý(S&P)Ìý[Core A*], Network and Distributed System Security SymposiumÌý(NDSS)Ìý[Core A*], Transactions on Dependable and Secure Computing (TDSC) [Q1, IF: 7], International World Wide Web Conference (WWW)Ìý[Core A*],ÌýAnnual IEEE/IFIP International Conference on Dependable Systems and NetworksÌý(DSN) [Core A], and ACM ASIA Conference on Computer and Communications SecurityÌý(AsiaCCS) [Core A]. He has received awards and appraisals for his research performance, including university recognitions and best paper awards. In 2024, he has been awarded the EarlyÌýCareer Academic Excellence Award (Research) from the Faculty of Engineering at ¹úÃñ²ÊƱ Sydney. In 2023, Arash was among the top 200 young computer science and mathematics scientists selected by the Heidelberg Laureate Forum (HLF) in Germany. Arash has contributed to several articles on cybersecurity incidents or about his research work for various media outlets, including the Australian Broadcasting Corporation (ABC) and The Guardian.ÌýArash serves as the Associate Editor for the Journal of Ad Hoc Networks.

Teaching Profile: Arash is an award-winning educator with multiple awards and recognitions for leading the design, development, and delivery of hands-on cybersecurity programs and courses. In 2023, he was awarded the Educational Excellence & Innovation award from the Faculty of Engineering at ¹úÃñ²ÊƱ Sydney. Before joining ¹úÃñ²ÊƱ, he led RMIT's Graduate Certificate of Cyber Security Governance and Risk Management. At Deakin University, Arash was the Deputy Academic Director (Teaching) at the School of IT and the Graduate Certificate in Information Technology Director. He was also a member of the team leading the Bachelor of Cybersecurity, which redeveloped the program with a technical and hands-on curriculum by integrating several industry-leading cybersecurity certifications as part of the degree. He has completed training in designing and teaching effective learning programs and holds the Graduate Certificate of Higher Education (Learning and Teaching) from Deakin University.

Location
School of Computer Science and Engineering (CSE), Level 4, Building K17, ¹úÃñ²ÊƱ SYDNEY 2052.
  • Book Chapters | 2025
    Reeves A; Shaghaghi A; Krebs S; Ashenden D, 2025, 'Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data', in , pp. 213 - 227,
    Book Chapters | 2019
    Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2019, 'Software-Defined Network (SDN) data plane security: Issues, solutions, and future directions', in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 341 - 387,
    Book Chapters | 2018
    Desmedt Y; Shaghaghi A, 2018, 'Function-based access control (FBAC): Towards preventing insider threats in organizations', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 143 - 165,
  • Journal articles | 2025
    Han R; Li J; Ma Z; Lo D; Shaghaghi A; Ma JF; Ma S, 2025, 'Hotpatching on the Fly - Mitigating Drone Incidents Arising from Incorrect Configuration', IEEE Transactions on Dependable and Secure Computing,
    Journal articles | 2022
    Gill SS; Xu M; Ottaviani C; Patros P; Bahsoon R; Shaghaghi A; Golec M; Stankovski V; Wu H; Abraham A; Singh M; Mehta H; Ghosh SK; Baker T; Parlikad AK; Lutfiyya H; Kanhere SS; Sakellariou R; Dustdar S; Rana O; Brandic I; Uhlig S, 2022, 'AI for next generation computing: Emerging trends and future directions', Internet of Things (Netherlands), 19,
    Journal articles | 2022
    Maroof U; Shaghaghi A; Michelin R; Jha S, 2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193,
    Journal articles | 2022
    Syed NF; Shah SW; Shaghaghi A; Anwar A; Baig Z; Doss R, 2022, 'Zero Trust Architecture (ZTA): A Comprehensive Survey', IEEE Access, 10, pp. 57143 - 57179,
    Journal articles | 2021
    Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2021, 'LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)', Computers and Security, 108,
    Journal articles | 2021
    Stephens B; Shaghaghi A; Doss R; Kanhere SS, 2021, 'Detecting Internet of Things Bots: A Comparative Study', IEEE Access, 9, pp. 160391 - 160401,
    Journal articles | 2020
    Ali Shah SW; Shaghaghi A; Kanhere SS; Zhang J; Anwar A; Doss R, 2020, 'Echo-id: Smart user identification leveraging inaudible sound signals', IEEE Access, 8, pp. 194508 - 194522,
    Journal articles | 2020
    Gill SS; Shaghaghi A, 2020, 'Security-aware autonomic allocation of cloud resources: A model, research trends, and future directions', Journal of Organizational and End User Computing, 32, pp. 15 - 22,
  • Preprints | 2025
    A CAR; Chen X; Shaghaghi A; Batista G; Kanhere S, 2025, Predicting IoT Device Vulnerability Fix Times with Survival and Failure Time Models
    Preprints | 2024
    A. CAR; Shaghaghi A; Batista G; Kanhere SS, 2024, Towards Weaknesses and Attack Patterns Prediction for IoT Devices,
    Conference Papers | 2024
    Deldari S; Goudarzi M; Joshi A; Shaghaghi A; Finn S; Salim FD; Jha S, 2024, 'AuditNet: A Conversational AI-based Security Assistant', in MobileHCI 2024 Adjunct Proceedings - Publication of the 26th International Conference on Mobile Human-Computer Interaction,
    Preprints | 2024
    Deldari S; Goudarzi M; Joshi A; Shaghaghi A; Finn S; Salim FD; Jha S, 2024, AuditNet: A Conversational AI-based Security Assistant [DEMO],
    Conference Papers | 2024
    Goudarzi M; Shaghaghi A; Finn S; Jha S, 2024, 'Lack of Systematic Approach to Security of IoT Context Sharing Platforms', in 2024 21st Annual International Conference on Privacy, Security and Trust, PST 2024,
    Conference Papers | 2024
    Maroof U; Batista G; Shaghaghi A; Jha S, 2024, 'Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification', in Proceedings - Conference on Local Computer Networks, LCN,
    Preprints | 2024
    Maroof U; Batista G; Shaghaghi A; Jha S, 2024, Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification,
    Preprints | 2024
    Reeves A; Shaghaghi A; Krebs S; Ashenden D, 2024, Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data,
    Conference Papers | 2024
    Rivera A CA; Shaghaghi A; Batista G; Kanhere SS, 2024, 'Towards Weaknesses and Attack Patterns Prediction for IoT Devices', in 2024 17th International Conference on Security of Information and Networks, SIN 2024,
    Preprints | 2022
    Gill SS; Xu M; Ottaviani C; Patros P; Bahsoon R; Shaghaghi A; Golec M; Stankovski V; Wu H; Abraham A; Singh M; Mehta H; Ghosh SK; Baker T; Parlikad AK; Lutfiyya H; Kanhere SS; Sakellariou R; Dustdar S; Rana O; Brandic I; Uhlig S, 2022, AI for Next Generation Computing: Emerging Trends and Future Directions,
    Conference Papers | 2022
    Rivera A CA; Shaghaghi A; Nguyen DD; Kanhere SS, 2022, 'Is This IoT Device Likely toÌýBe Secure? Risk Score Prediction forÌýIoT Devices Using Gradient Boosting Machines', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 115 - 127,
    Conference Papers | 2021
    Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2021, 'Health access broker: Secure, patient-controlled management of personal health records in the cloud', in Advances in Intelligent Systems and Computing, Springer Nature, pp. 111 - 121,
    Preprints | 2021
    Alvarez CAR; Shaghaghi A; Nguyen DD; Kanhere SS, 2021, Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines, ,
    Conference Papers | 2021
    Kamenski D; Shaghaghi A; Warren M; Kanhere SS, 2021, 'Attacking with bitcoin: Using bitcoin to build resilient botnet armies', in Advances in Intelligent Systems and Computing, pp. 3 - 12,
    Preprints | 2020
    Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud,
    Conference Papers | 2020
    Jha S; Zhou J; Michelin R; Ahmed N; Shaghaghi A, 2020, 'Massage from the chairs', in Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, pp. VI,
    Preprints | 2020
    Kamenski D; Shaghaghi A; Warren M; Kanhere SS, 2020, Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies, ,
    Conference Papers | 2020
    Puggioni E; Shaghaghi A; Doss R; Kanhere SS, 2020, 'Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs', in 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020,
    Preprints | 2020
    Puggioni E; Shaghaghi A; Doss R; Kanhere SS, 2020, Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs, ,
    Conference Papers | 2020
    Rivera A CA; Shaghaghi A; Kanhere SS, 2020, 'Towards a Distributed Defence Mechanism against IoT-based Bots', in Proceedings - Conference on Local Computer Networks, LCN, pp. 449 - 452,
    Conference Papers | 2020
    Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2020, 'Towards a lightweight continuous authentication protocol for device-to-device communication', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 1119 - 1126,
    Preprints | 2020
    Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2020, Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication, ,
    Conference Papers | 2019
    Maroof U; Shaghaghi A; Jha S, 2019, 'PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices', in IoT S and P 2019 - Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, Association for Computing Machinery (ACM), ENGLAND, London, pp. 50 - 56, presented at Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, ENGLAND, London, 15 November 2019,
    Preprints | 2018
    Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions,
    Conference Papers | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings - Conference on Local Computer Networks, LCN, pp. 553 - 561,
    Preprints | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations,
    Conference Papers | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018,
    Preprints | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, ,
    Conference Papers | 2017
    Shaghaghi A; Kaafar MA; Jha S, 2017, 'WedgeTail: An intrusion prevention system for the data plane of software defined networks', in ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 849 - 861, presented at 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 02 April 2017 - 06 April 2017,
    Preprints | 2017
    Shaghaghi A; Kaafar MA; Jha S, 2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, ,
    Conference Papers | 2017
    Shaghaghi A; Kaafar MA; Scott-Hayward S; Kanhere SS; Jha S, 2017, 'Towards Policy Enforcement Point as a Service (PEPS)', in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016, pp. 50 - 55,
    Conference Papers | 2016
    Desmedt Y; Shaghaghi A, 2016, 'Function-based access control (FBAC): From access control Matrix to access control tensor', in MIST 2016 - Proceedings of the International Workshop on Managing Insider Security Threats, co-located with CCS 2016, pp. 89 - 92,
    Preprints | 2016
    Shaghaghi A; Ali M; Kaafar ; Scott-Hayward S; Kanhere SS; Jha S, 2016, Towards Policy Enforcement Point as a Service (PEPS), ,
    Conference Abstracts | 2014
    Shaghaghi A; Hong J; Jha S, 2014, 'An SDN-based framework for detection of illegal rebroadcasting of channels in P2PTV', in VideoNEXT 2014 - Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming, pp. 47 - 49,

Recent grant at ¹úÃñ²ÊƱÌý[Selected]:

  • "IoT Data Security and Assurance Framework for Intelligent Transport",ÌýCyber Security Cooperative Research Centre and Cisco [2022-2024].

  • "Quantum-Safe Security Measures for IoT-based Intelligent Transport Systems", CSIRO [2024-2046].

  • "Advanced IDE for software security support",ÌýCyber Security Cooperative Research Centre [2022-2024].

  • "Quantum Methods for Securing Remote Devices", NSW Department of Industry [2024-2027].

  • "A scalable workflow for the audio sampling of biodiversity for remote Australia",ÌýDepartment of Climate Change Energy the Environment and Water [2024-2026].

Ìý

Grants before joining ¹úÃñ²ÊƱ [Selected]:

  • "Zero Trust Architectures for Australia's Critical Infrastructure Security", Australian Government, 2020.
  • "Fingerprinting Compromised IoT Devices Based on Power Consumption",ÌýCyber Security Cooperative Research Centre, 2019.
  • "Data after Death (DaD): Understanding the Risks to Australians",ÌýDeakin Cyber Research and Innovation Centre, 2020.
  • "Detecting Internet of Thing (IoT) Bots",ÌýDeakin Cyber Research and Innovation Centre, 2020.
  • "Bitcoin Meta-data and Malware C&C Servers",ÌýDeakin Cyber Research and Innovation Centre, 2019.

Ìý

Ìý

  • ¹úÃñ²ÊƱ Sydney, ¹úÃñ²ÊƱ Faculty of Engineering, Early Career Academic Network (ECAN), Early Career Academic Excellence Award (Research), 2024.
  • ¹úÃñ²ÊƱ Sydney, ¹úÃñ²ÊƱ Faculty of Engineering, Educational Excellence & Innovation, Excellence Awards, 2023.
  • Selected as one of the top 200 young computer science and mathematics scientists forÌýthe 10th (HLF), Germany, 2023.

Ìý

  • Deakin University, School of Information Technology Award - Excellence in Early Career Research Performance, 2020.
  • Best Demo Award, The 45th IEEE Conference on Local Computer Networks (LCN) [Core A-ranked], 2020.
  • Deakin University, School of Information Technology Award - Excellence in Teaching & Unit Development, 2020.
  • Deakin University, School of Information Technology Award - Successfully Embedding Industry Certifications within Cyber Security Units, 2020.
  • Deakin University, School of Information Technology Award - Excellence in International Student Engagement, 2020.
  • Deakin University, School of Information Technology - Teaching & Learning Award: Outstanding Industry Capstone Supervisor, 2019.
  • The University of New South Wales (¹úÃñ²ÊƱ Sydney), ¹úÃñ²ÊƱ ARC Research Student Award, 2018

Media Engagements:

  • "", The Guardian (23 June 2023). [Selected parts of interview published atÌý, etc. Translated versions of the article in , , , , , , etc. | ¹úÃñ²ÊƱ Archive]

  • "", Money Magazine (23 June 2023).

  • "What to do with digital data after death",ÌýABC Weekend with Jason Chong, ABC Adelaide (17 June 2023).

  • ?,ÌýBusinessThink (25 April 2023). [Re-published by ]

  • , BusinessThink (15 March 2023). [Re-published by ,Ìý, , ).

  • Ìý(20 Oct 2022) (Re-published by ,Ìý, ,Ìý, , , ). Several media interviews by Prof Jha based on our joint media release, including with , , , , , and more.

  • with RRR - topic: "Cybersecurity on Private Message Apps"

  • Radio Interview with Ìý(21 September 2022) - topic:Ìý"Encryption and Secure Messaging Apps".

  • Radio Interview with Joy Media | Ìý(15 September 2022) - topic:Ìý"Encryption and Secure Messaging Apps".

  • Ìý(Re-published by , ,Ìý, , , , , , , )

  • Ìý(Re-published by , ,Ìý, , , )

  • "From the cradle to the grave", published by Australian Information Security Association (AISA) .

  • ABC Radio National:Ìý. (interviews on the same topic with ABC Radio Sydney, ABC Statewide Drive NSW, ABC Radio Adelaide, 2NURFM Radio of New Castle).

  • "" interview with Deakin Newsroom as program lead for the School of IT, Deakin University.

My Research Supervision

Research Team:

  • PostDoc - Current: Dr Mohammad GoudarziÌý[Main, CSCRC Project]Ìý| Dr Shohreh Deldari [Main, CSCRC Project]
  • Software Developer: NimeshaÌýWickramasinghe [Main, CSCRC Project], Xinzhang Chen [Main, CSCRC Project], Chengbin Feng [Main, CSCRC Project],ÌýHarshmeetsingh Ramindersingh Chandhok [Main, CSCRC Project]
  • Research Assistant: Hassan Ali [Main, CSCRC Project]
  • PhD Students - Current: 3Ìý

Ìý

  • PostDoc - Former: 3 (Co-supervisor)
  • PhD Students - Graduated: 2 (¹úÃñ²ÊƱ)
  • Masters with Major Thesis: 3 (Completed)
  • Funded Summer Projects: 2 (Completed)
  • Masters with Minor Thesis: 10 (Completed)

My Teaching

  • Operating System Fundamentals for Security (ZZEN9217), Master of Cyber Security, ¹úÃñ²ÊƱ Online.
  • Foundations of Cyber Security (ZZEN9201), Master of Cyber Security, ¹úÃñ²ÊƱ Online.
  • Penetration Testing (ZZEN9213), Master of Cyber Security, ¹úÃñ²ÊƱ Online.