Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Security for Virtual Machine based Systems. Secure information systems have become paramount importance to our society and economies, which are increasingly based on online services and Internet infrastructures. Trusted interactions are a strategic necessity for businesses, governments and individuals in this ever-increasing digital world. It is critically important for Australia to develop new technologies to anticipate and respond to security threats to its industry and society. The outcomes ....Security for Virtual Machine based Systems. Secure information systems have become paramount importance to our society and economies, which are increasingly based on online services and Internet infrastructures. Trusted interactions are a strategic necessity for businesses, governments and individuals in this ever-increasing digital world. It is critically important for Australia to develop new technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in novel policy based secure and trusted system models and new techniques for malicious attacks detection, which will help to achieve secure Internet applications and large scale systems in Grid computing and e-Science.Read moreRead less
Gaze Tracking Haptic User Interface for the Blind. It is estimated over 40 million people suffer from sever visual impairment in the modern world. Although blind people are able to use the computer with the aid of a screen reader and output devices like Braille displays, it remains difficult for the blind to use many applications with Graphical User Interfaces (GUIs) due to the need for hand-eye coordination when manipulating screen objects with the mouse. This project intends to overcome this d ....Gaze Tracking Haptic User Interface for the Blind. It is estimated over 40 million people suffer from sever visual impairment in the modern world. Although blind people are able to use the computer with the aid of a screen reader and output devices like Braille displays, it remains difficult for the blind to use many applications with Graphical User Interfaces (GUIs) due to the need for hand-eye coordination when manipulating screen objects with the mouse. This project intends to overcome this difficulty by providing a means for the blind to perceive and control the GUI of typical computer applications. This potentially could provide increased computer access, job opportunities and education for the blind.Read moreRead less
A safe and efficient multi-language component framework based on dynamic compilation. Components are a versatile mechanism for the construction of extendible systems and for improved code reusability. Emerging environments like Microsoft's .NET support the interaction of components written in different programming languages. To date, such systems do not adequately isolate components which therefore must trust each other. This is unacceptable for components loaded across the Internet. We will dev ....A safe and efficient multi-language component framework based on dynamic compilation. Components are a versatile mechanism for the construction of extendible systems and for improved code reusability. Emerging environments like Microsoft's .NET support the interaction of components written in different programming languages. To date, such systems do not adequately isolate components which therefore must trust each other. This is unacceptable for components loaded across the Internet. We will develop a framework for secure execution of component software, based on hardware-enforced protection domains. To minimize the resulting runtime overheads we will provide a component model with lightweight context switching. A novel typed intermediate language and dynamic compilation techniques will offer complementary optimisations.
Read moreRead less