Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE220100595
Funder
Australian Research Council
Funding Amount
$416,400.00
Summary
Efficient privacy-preserving proofs for secure e-government and e-voting. Electronic systems are becoming increasingly widespread and crucial to social and economic wellbeing. This project aims to ensure that e-government, e-health, e-commerce and e-voting are secure and trustworthy by inventing new ways to verify these systems without infringing privacy. This project expects to use innovative techniques from cryptography to support development of trustworthy systems. Expected outcomes of this p ....Efficient privacy-preserving proofs for secure e-government and e-voting. Electronic systems are becoming increasingly widespread and crucial to social and economic wellbeing. This project aims to ensure that e-government, e-health, e-commerce and e-voting are secure and trustworthy by inventing new ways to verify these systems without infringing privacy. This project expects to use innovative techniques from cryptography to support development of trustworthy systems. Expected outcomes of this project include better support for organisations to build trustworthy systems that will maximise benefit to Australian business and society. This should provide significant commercial, reputational, and societal benefits by avoiding disruptions to the organisations and their clients if and when they are attacked. Read moreRead less