Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Clinton Fernandes is active.

Publication


Featured researches published by Clinton Fernandes.


conference on privacy security and trust | 2016

Vulnerability analysis of iPhone 6

Wencheng Yang; Jiankun Hu; Clinton Fernandes; Vijay Sivaraman; Qianhong Wu

Apple claims that iPhone 6, which is equipped with iOS 8.0 and later version, is secure enough to prevent a users private data from law enforcement or malicious intruders. In pre-iOS 8.0 operating systems, a users data were only encrypted by hardware-based keys, which can be obtained by Apple. But in iOS 8.0 and later version, the private data on the iPhone are protected by a secret key that is protected by the users passcode, which the Apple does not hold. In this paper, supported by real-life experiments, we demonstrate that several vulnerabilities of iPhone 6 with iOS 8, which are brought by ordinary user operations, can lead to the leakage of the private data. Then we conduct vulnerability analysis and give the reasons that cause these vulnerabilities from a technical perspective. Meanwhile, experiments of forging attack aiming at iPhone 6 Touch ID are conducted.


Archive | 2010

East Timor and the Struggle for Independence

Clinton Fernandes

The nation of East Timor occupies the Eastern half of the island of Timor as well as the enclave of Oecussi-Ambeno (located in West Timor) and the small islands of Atauro and Jaco. At just under 15,000 square kilometers, it is about the size of Northern Ireland or the state of Connecticut in the United States. It was invaded by Indonesia in 1975 and was occupied until 1999. This chapter provides an overview of the twenty-four-year conflict between East Timor and Indonesia. It begins by examining the historical background of the conflict, showing how Portugal’s colonial presence in the area influenced the political situation prior to the Indonesian invasion. It then describes the internal political conflict during the process of decolonization from Portugal, when Indonesia manipulated the situation through covert operations with the aim of eventual annexation. It shows how Indonesia stepped up its military incursions, captured several towns in the border regions, and then invaded the territory. It then examines the twenty-four-year occupation of East Timor by Indonesia and East Timor’s struggle for independence.


Archive | 2004

Reluctant saviour : Australia, Indonesia, and the independence of East Timor

Clinton Fernandes


Australian Journal of Telecommunications and the Digital Economy | 2015

It’s only the beginning: Metadata Retention laws and the Internet of Things

Clinton Fernandes; Vijay Sivaraman


Archive | 2006

Airpower and the Myth of Strategic Bombing as Strategy

Clinton Fernandes; Craig Stockings


Violence in between conflict and security in archipelagic Southeast Asia | 2005

Terrorism in archipelagic Southeast Asia

Damien Kingsbury; Clinton Fernandes


IEEE Technology and Society Magazine | 2018

Smart IoT Devices in the Home: Security and Privacy Implications

Vijay Sivaraman; Hassan Habibi Gharakheili; Clinton Fernandes; Narelle Clark; Tanya Karliychuk


Politics and Governance | 2015

Accomplice to Mass Atrocities: The International Community and Indonesia’s Invasion of East Timor

Clinton Fernandes


Australian Journal of Telecommunications and the Digital Economy | 2015

It?s only the beginning

Clinton Fernandes; Vijay Sivaraman


Archive | 2014

The Maxim of Thucydides: Transparency, Fact-Finding, and Accountability in East Timor

Clinton Fernandes

Collaboration


Dive into the Clinton Fernandes's collaboration.

Top Co-Authors

Avatar

Vijay Sivaraman

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Craig Stockings

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jiankun Hu

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Wencheng Yang

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge