Securing Web-based Services by Policy Coherence and Proof-checking. This project aims to develop a provably correct cybersecurity system for workflows, which enables organizations to provide flexible and more secure web-based services and business communication. The project expects to generate new knowledge, theoretic advancement and result in new technologies in the areas of internet of things and cybersecurity. The expected outcomes include a software tool with documentation, which helps organ ....Securing Web-based Services by Policy Coherence and Proof-checking. This project aims to develop a provably correct cybersecurity system for workflows, which enables organizations to provide flexible and more secure web-based services and business communication. The project expects to generate new knowledge, theoretic advancement and result in new technologies in the areas of internet of things and cybersecurity. The expected outcomes include a software tool with documentation, which helps organisations achieve operational excellence and security, and maintain a trusted environment for end users. This system will provide significant economic and commercial benefits to business and end users with highly secured web-services and improved productivity through a coherent framework and proof-checked workflows.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE230100116
Funder
Australian Research Council
Funding Amount
$419,218.00
Summary
Vulnerability Defence: From Interpretable to Trustworthy Threat Assessment. This project aims to design a novel vulnerability defence framework to automatically identify, prioritise and interpret vulnerabilities and their attack vectors from the Internet of Things (IoT). Currently, most Australian organisations can be targeted by complex cyberattacks, stealing sensitive information leading to financial loss and reputation threats. This project expects to generate new knowledge in IoT vulnerabili ....Vulnerability Defence: From Interpretable to Trustworthy Threat Assessment. This project aims to design a novel vulnerability defence framework to automatically identify, prioritise and interpret vulnerabilities and their attack vectors from the Internet of Things (IoT). Currently, most Australian organisations can be targeted by complex cyberattacks, stealing sensitive information leading to financial loss and reputation threats. This project expects to generate new knowledge in IoT vulnerability assessment using economic risk estimation and cognitive vulnerability identification methods. Expected outcomes include trusted IoT vulnerability assessment methods and vulnerability testbed. Significant benefits are expected to protect IoT networks in all defence, industry and government sectors.Read moreRead less
Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to ....Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to establish innovative research and solutions for enabling efficient and secure data integrity auditing on cloud. The project outcomes will help to safeguard Australian community in fast-growing cyber world, and benefit to fast-growing user privacy sensitive data hosting and applications on cloud.Read moreRead less