Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that ....Privacy Preservation over 5G and IoT Smart Devices. This project aims to investigate privacy preservation protocols in a 5G integrated IoT environment through an analysis of the depth of smart-device use in common smart domains. 5G’s addition to IoT-based smart devices will be effectively deployed and utilised by a large majority of individual and organisation-based users. The knowledge-based ontology and tools developed in the project will help form the new privacy preservation mechanisms that are required for the 5G enabled environment. The construction of new AI-based tools and testing facilities as well as the generation of new knowledge in the field of privacy preservation and collaboration between universities are expected outcomes of this project. Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Preventing railway suicide: An open-systems perspective. Preventing railway suicide: An open-systems perspective. This project aims to develop an automated suicide risk detection system to reduce the incidence and impact of railway suicide, which has a devastating effect on victims’ families, station staff, train drivers, emergency workers, and bystanders. This project will use open-systems theory to develop two complementary information systems for more effective detection and reporting of suic ....Preventing railway suicide: An open-systems perspective. Preventing railway suicide: An open-systems perspective. This project aims to develop an automated suicide risk detection system to reduce the incidence and impact of railway suicide, which has a devastating effect on victims’ families, station staff, train drivers, emergency workers, and bystanders. This project will use open-systems theory to develop two complementary information systems for more effective detection and reporting of suicide risk; use these systems to investigate how different situational factors interact with different combinations of service interventions to influence suicide risk; and share the findings to reduce railway suicide in Australia and overseas.Read moreRead less
Combating Fake News on Social Media: From Early Detection to Intervention. The project aims to detect fake news early to minimise the negative impact of false information. This project expects to devise novel solutions to address technical challenges for detection of fake news with scarce signals. Expected outcomes of this project include a suite of data mining and machine learning models for identification of fake news from the social media stream, prediction of user propagation of false infor ....Combating Fake News on Social Media: From Early Detection to Intervention. The project aims to detect fake news early to minimise the negative impact of false information. This project expects to devise novel solutions to address technical challenges for detection of fake news with scarce signals. Expected outcomes of this project include a suite of data mining and machine learning models for identification of fake news from the social media stream, prediction of user propagation of false information as well as recommendation of truthful news to counteract adversarial fake news. This project should generate technologies that enhance the integrity of the online echo system and benefit media providers and online population within Australia and across the world. Read moreRead less
Trusted business processes. This project aims to use conceptual design, process modelling and co-design approaches to create a structured approach for the management of trust. With a focus on business processes, it is intended to develop research- informed methods in order to (1) identify and specify trust concerns and opportunities, (2) model these within a common process modelling language and (3) propose patterns for how to mitigate trust concerns and how to benefit from opportunities. If suc ....Trusted business processes. This project aims to use conceptual design, process modelling and co-design approaches to create a structured approach for the management of trust. With a focus on business processes, it is intended to develop research- informed methods in order to (1) identify and specify trust concerns and opportunities, (2) model these within a common process modelling language and (3) propose patterns for how to mitigate trust concerns and how to benefit from opportunities. If successful, this would lead to an operational, and world first, detailed trust methodology for organisations in all sectors. As a result, Australian customers would engage with business processes with reduced trust concerns and experience increased integrity and benevolence.Read moreRead less
Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detecti ....Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detection, and 3) finding unseen vulnerabilities. We therefore propose to use a series of new techniques such as efficient in-memory fuzzing, conditional formulas, and transfer learning to solve the above challenges. The project outcomes will help Australia gain cutting edge techniques in vulnerability detection. Read moreRead less
Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysi ....Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysis a monumental task. This project will provide advanced tools to detect fake website reviews and a cybersecurity system prototype ready to be used by industry, making Australia a leader in this field and resulting in a safer internet environment for all.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE220101597
Funder
Australian Research Council
Funding Amount
$360,264.00
Summary
Empowering Users to Protect their Personal Privacy on Social Media. This Information Systems project aims to take a bold approach to finally overcome the paradoxical inertia of people who care about their privacy but do not protect it. This project integrates different psychological theories proposing a paradigm shift expecting to generate new knowledge in privacy research, which can currently neither explain nor provide means to overcome the vexing issue. Expected outcomes of the project includ ....Empowering Users to Protect their Personal Privacy on Social Media. This Information Systems project aims to take a bold approach to finally overcome the paradoxical inertia of people who care about their privacy but do not protect it. This project integrates different psychological theories proposing a paradigm shift expecting to generate new knowledge in privacy research, which can currently neither explain nor provide means to overcome the vexing issue. Expected outcomes of the project include a privacy behaviour model (PIM), privacy training program and system design solutions. This should offer substantial benefits as it integrates privacy research and guides behavioural models beyond Information Systems, provide means to solve the paradox, guide legislation and the privacy consent mechanism design.Read moreRead less
Targeted Graph Embedding for Anomaly Detection in Large-scale Networks. This project aims to tackle the challenging problem of anomaly detection in large-scale networks by leveraging graph embedding techniques. It expects to deliver a series of innovative graph embedding algorithms targeting optimised anomaly detection. By addressing under-developed research challenges, such as the versatile types of anomalies and lack of anomaly labels, the established theories and devised methodologies will ad ....Targeted Graph Embedding for Anomaly Detection in Large-scale Networks. This project aims to tackle the challenging problem of anomaly detection in large-scale networks by leveraging graph embedding techniques. It expects to deliver a series of innovative graph embedding algorithms targeting optimised anomaly detection. By addressing under-developed research challenges, such as the versatile types of anomalies and lack of anomaly labels, the established theories and devised methodologies will advance frontier technologies in both graph anomaly detection and graph representation learning. By uncovering anomalies with high efficiency and accuracy, this project will contribute to multiple real applications from fake review detection to financial fraud identification, bringing both social and economic benefits.Read moreRead less