Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and ....Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and an industrial-strength open-source framework that can significantly raise the bar on mobile software quality and security for Android, the dominant smartphone platform accounting a current market share at 87.0% with 2.9 million apps at Google Play in December 2019.Read moreRead less
Resource Allocation for High-Volume Streaming Data in Data Centers. Almost all chip vendors are producing new hardware accelerators by combining several units into a single main-board, and therefore making the execution of parallel and distributed run-time primitives not efficient/scalable. This project aims to develop innovative ways to building incremental and iterative computations over massive data sets in a cluster of heterogeneous systems. This will provide a significant reduction of perfo ....Resource Allocation for High-Volume Streaming Data in Data Centers. Almost all chip vendors are producing new hardware accelerators by combining several units into a single main-board, and therefore making the execution of parallel and distributed run-time primitives not efficient/scalable. This project aims to develop innovative ways to building incremental and iterative computations over massive data sets in a cluster of heterogeneous systems. This will provide a significant reduction of performance bottlenecks when running heavily distributed data-driven applications. Expected outcomes will include resource management algorithms that optimise performance at large scale. The project will benefit many areas, including running stateful iterative stream-based data-analysis applications in data centres. Read moreRead less
Shape4D: Modelling the Spatiotemporal Deformation Patterns in 3D Shapes. This research will develop new mathematical methods and algorithms that will enable the use of population-level longitudinal studies to model the spatial and temporal deformation patterns in 3D biological objects. Using novel geometric and deep learning techniques, it will create new methods that will allow the characterization of how the 3D shape of objects deforms with ageing, disease progression and interaction with thei ....Shape4D: Modelling the Spatiotemporal Deformation Patterns in 3D Shapes. This research will develop new mathematical methods and algorithms that will enable the use of population-level longitudinal studies to model the spatial and temporal deformation patterns in 3D biological objects. Using novel geometric and deep learning techniques, it will create new methods that will allow the characterization of how the 3D shape of objects deforms with ageing, disease progression and interaction with their environment, and the simulation of spatiotemporal deformations in anatomical organs. Benefits include a better understanding of growth processes, predictive models of how degenerative diseases progress and a computational framework that will assist in designing proper mitigation and intervention strategies.Read moreRead less
Australian Laureate Fellowships - Grant ID: FL190100035
Funder
Australian Research Council
Funding Amount
$3,009,457.00
Summary
Human-centric Model-driven Software Engineering. This project aims to find fundamentally new ways to capture and use human-centric software requirements during model-driven software engineering and verifying that systems meet these requirements. There are major issues with misaligned software applications in terms of accessibility, usability, emotions, personality, age, gender, and culture. This project aims to address these through new conceptual foundations and modelling techniques for their s ....Human-centric Model-driven Software Engineering. This project aims to find fundamentally new ways to capture and use human-centric software requirements during model-driven software engineering and verifying that systems meet these requirements. There are major issues with misaligned software applications in terms of accessibility, usability, emotions, personality, age, gender, and culture. This project aims to address these through new conceptual foundations and modelling techniques for their support during software engineering. The intended outcomes are enhanced theory, models, tools and capability for next-generation software engineering with these critical elements. Significant benefits are expected to include greatly improved software quality, developer productivity and cost savings.Read moreRead less
Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic groupin ....Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic grouping recombination model. The project outcomes will be beneficial to applications in the nation as it incorporates new privacy constraints and utility requirements raised by emerging technologies to enable better protection of sensitive information and maximal data utility in outsourced systems. Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less