Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT a ....Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT access control with machine learning based anomaly detection. This should provide significant benefits, such as preventing cyber threats on security and privacy of IoT and improving trust in IoT-enabled smart critical infrastructure of Australia.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new metho ....Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new methods for the automatic analysis of service interaction traces and the generation of accurate executable service models, without requiring explicit knowledge of them. The automatic analysis and generation should reduce development cost for enterprise IT systems and increase system quality and reliability. The new software deployment technologies from this project aim to significantly reduce the time, effort and cost of system quality assurance activities in software development organisations, and yet produce higher-quality software leading to uninterrupted business operation in end-user organisations across all sectors.Read moreRead less
Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. ....Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. Evaluation will be via development of several exemplar applications. The techniques and framework will be applicable to a broad range of economically important problems in areas as diverse as health, travel, scientific publication search, product marketing and software engineering.Read moreRead less
Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. ....Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. This project tackles new and urgent challenges in edge data storage, manipulation, maintenance, and protection with optimisation, distributed consensus, graph analytics, and cryptography techniques. The outcomes should build the pillars of edge caching systems and promote Australia's 5G software innovations.Read moreRead less
Effective and efficient protection of personal privacy in big personal data. Personal privacy protection is becoming increasingly important as personal data is increasingly being hosted in cloud servers, accumulating as big personal data. This project aims to develop innovative solutions for effective and efficient to address the issue of protection of personal privacy. Current approaches are neither effective nor efficient, and lack robustness. The project is expected to enhance theoretical fou ....Effective and efficient protection of personal privacy in big personal data. Personal privacy protection is becoming increasingly important as personal data is increasingly being hosted in cloud servers, accumulating as big personal data. This project aims to develop innovative solutions for effective and efficient to address the issue of protection of personal privacy. Current approaches are neither effective nor efficient, and lack robustness. The project is expected to enhance theoretical foundation of personal privacy protection in big data and cloud, and deliver an effective and efficient personal privacy protection framework with associated algorithms and prototype. These outcomes will help to protect fast-growing privacy sensitive personal data hosting and applications on cloud servers.Read moreRead less
Constraint-based Privacy Preserving BioSignal Data Management on Blockchain. This project aims to address the issue of user privacy in Bio-Signal data analysis by utilizing the capabilities of differential privacy, smart contracts and blockchain technologies. This project expects to generate new knowledge in the area of privacy to develop an advanced privacy-preserving Bio-Signal data analytic framework. The expected outcomes of this project include increased privacy of user data, and the unifi ....Constraint-based Privacy Preserving BioSignal Data Management on Blockchain. This project aims to address the issue of user privacy in Bio-Signal data analysis by utilizing the capabilities of differential privacy, smart contracts and blockchain technologies. This project expects to generate new knowledge in the area of privacy to develop an advanced privacy-preserving Bio-Signal data analytic framework. The expected outcomes of this project include increased privacy of user data, and the unification of standards on human-specific data analysis, saving time and money spent on privacy breaches. This should provide significant benefits in preserving the quality and integrity of the healthcare services provided by the Australian government and private sector.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less