Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in bu ....Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in building trusted computer applications. Process calculi and logic represent two promising disciplines in which the principles of analysis and design of secure systems can be studied systematically, out of which formal verification tools can be constructed.Read moreRead less
Expressive power and complexity of temporal logics for model-checking. Hardware verification based upon mathematical logic is now routinely
used in industry to verify the correctness of large digital circuits
using a technique called model-checking. Such discrete systems move
from one state to another according to the regular ticks of a clock.
The challenge now is to find tractable methods for reasoning about
real-time systems and hybrid systems that move in a continuous manner
with respec ....Expressive power and complexity of temporal logics for model-checking. Hardware verification based upon mathematical logic is now routinely
used in industry to verify the correctness of large digital circuits
using a technique called model-checking. Such discrete systems move
from one state to another according to the regular ticks of a clock.
The challenge now is to find tractable methods for reasoning about
real-time systems and hybrid systems that move in a continuous manner
with respect to time: examples include aeroplanes flying according to
the laws of physics and a moving robot arm. We shall invent new logics
which are specifically tailored for tractable reasoning about
real-time and hybrid systems.Read moreRead less
Economical and practical design and analysis of probabilistic distributed systems. Complex computing systems composed of communicating processes are
distributed over networks, and interact with embedded hardware
components. They routinely operate in probabilistic environments:
hardware components fail randomly, but at known rates; and tactical
randomisation resolves competition for resources. Effective
specification, development and analysis methods for these systems
is crucial, and probab ....Economical and practical design and analysis of probabilistic distributed systems. Complex computing systems composed of communicating processes are
distributed over networks, and interact with embedded hardware
components. They routinely operate in probabilistic environments:
hardware components fail randomly, but at known rates; and tactical
randomisation resolves competition for resources. Effective
specification, development and analysis methods for these systems
is crucial, and probability makes that particularly difficult.
The focus of this project is to develop new formal methods that are
economical and practical in use. Exploiting our recent advances in
probabilistic program semantics, we will add probability in a new
way to proven techniques in concurrency theory, including
refinement and hierarchical design.Read moreRead less
Algebraic reasoning for serialisability in probabilistic transaction systems. The ability to analyse complex systems is a vital part of the development of large-scale computer applications; a method that improves the quality of the analysis task would increase the competitiveness of the software industry, would attract future development work (in complex and intelligent systems) to Australia, and could contribute to national security.
The results of this project will have a direct influence ....Algebraic reasoning for serialisability in probabilistic transaction systems. The ability to analyse complex systems is a vital part of the development of large-scale computer applications; a method that improves the quality of the analysis task would increase the competitiveness of the software industry, would attract future development work (in complex and intelligent systems) to Australia, and could contribute to national security.
The results of this project will have a direct influence on currently available design tools; the fact that Australian institutions will be responsible for key theoretical results in this growing field will strengthen Australia's position worldwide as an international centre for computer science.Read moreRead less
Hidden-state modelling for modular analysis of information flow, protection and risk evaluation. Automation is increasing explosively, and the cliche is no longer that there is a cpu chip in your washing machine, television or automobile. Nowadays they are potentially in our cash cards, passports and soon on every item in our shopping baskets. Australia is a leader in adopting and developing such technology.
Security and privacy, hard enough for PCs, thus concerns smaller, more numerous devi ....Hidden-state modelling for modular analysis of information flow, protection and risk evaluation. Automation is increasing explosively, and the cliche is no longer that there is a cpu chip in your washing machine, television or automobile. Nowadays they are potentially in our cash cards, passports and soon on every item in our shopping baskets. Australia is a leader in adopting and developing such technology.
Security and privacy, hard enough for PCs, thus concerns smaller, more numerous devices that we might not even realise we are using.
Our research aims to make it easier and more effective to describe and then successfully build-in features that enforce security without adverse impact on usability.Read moreRead less
Building correct-by-construction distributed systems from specifications stating how agents' knowledge evolves over time. Many distributed computer system implementations fail to comply with their original informal requirement specification. These requirements typically refer to the migration of information through the system over time, but current specification languages are not rich enough to express such requirements on a sufficiently abstract level. This results in a huge error-provoking gap ....Building correct-by-construction distributed systems from specifications stating how agents' knowledge evolves over time. Many distributed computer system implementations fail to comply with their original informal requirement specification. These requirements typically refer to the migration of information through the system over time, but current specification languages are not rich enough to express such requirements on a sufficiently abstract level. This results in a huge error-provoking gap between the informal requirements and the starting point of formally verifiable development. To minimise this gap, we develop a particularly expressive specification language, a calculus for stepwise refinement from such specifications down to distributed systems, and an automated tool for checking and supporting refinement steps in the calculus.Read moreRead less
Designing software for secrecy: Security-enabled program algebra. Ensuring security and privacy, hard enough for PCs, is a critical problem in computer engineering; the frequency with which software security breaches are reported in smartcards and web applications means that new software-design techniques are urgently needed. This project aims to improve the quality of computer software by creating smart technology which will make it easier for designers to describe and then successfully build ....Designing software for secrecy: Security-enabled program algebra. Ensuring security and privacy, hard enough for PCs, is a critical problem in computer engineering; the frequency with which software security breaches are reported in smartcards and web applications means that new software-design techniques are urgently needed. This project aims to improve the quality of computer software by creating smart technology which will make it easier for designers to describe and then successfully build-in features that enforce security in software without adverse impact on usability. This research addresses National Security Priority 3, Smart technology, and will build on Australia's world-leading position in pioneering uptake of innovative technology.Read moreRead less