Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and ....Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and an industrial-strength open-source framework that can significantly raise the bar on mobile software quality and security for Android, the dominant smartphone platform accounting a current market share at 87.0% with 2.9 million apps at Google Play in December 2019.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less
Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident ....Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident triage. Expected outcomes of the project include a set of novel methods and tools that can facilitate incident diagnosis and resolution. This project will provide significant benefits, such as improving the availability of software-intensive systems and reducing the economic loss caused by the incidents. Read moreRead less
Adversarial Learning of Hybrid Representation. This project aims to design and implement a foundational deep representation learning framework for early detection, classification and defense of emerging malware by capturing their underlying behaviours via structured and unstructured heterogeneous information through hybrid representation learning, behaviour graph mining, and symbolic adversarial learning to discover and defend unknown malware families, thereby significantly boosting the accuracy ....Adversarial Learning of Hybrid Representation. This project aims to design and implement a foundational deep representation learning framework for early detection, classification and defense of emerging malware by capturing their underlying behaviours via structured and unstructured heterogeneous information through hybrid representation learning, behaviour graph mining, and symbolic adversarial learning to discover and defend unknown malware families, thereby significantly boosting the accuracy and robustness of existing classifiers and detectors. The resulting representation learning framework will enhance the national security to protect user privacy, reducing the multi-million-dollar loss caused by fraudulent transactions, and defending against cyber attacks.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory an ....Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory and informed decision-making. This provides significant benefits of not only placing Australia in the forefront of exploiting multimodal user behaviour big data in dynamic e-commerce but also transforming Australian government and businesses to intelligent and contextual services adaptive to complex situations.Read moreRead less