Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal healt ....Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal health monitoring. Embedded wireless communications software, however, is difficult to test and debug owing to the complexity of the operational environment and complications arising from the interplay between software and hardware. This project will develop an effective and automatic technology to alleviate these difficulties and achieve higher quality software.Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Formal modelling and analysis of software requirements for air traffic management systems for improved integrity assurance. This project will significantly reduce the time and cost of developing software for critical applications such as aviation and air traffic management. As well as improving the trustworthiness of safety-critical computer-based systems, this project will also enable system improvements to be deployed faster and more reliably.
GriddLeS: Building Grid Applications from Legacy Software. Grid computing is emerging as a major new capability for modern, high performance technical computing. Such Grids couple geographically distributed resources such as high performance computers, workstations, clusters, and scientific instruments. Traditional methods of producing software for Grids are inefficient and error prone, and will not allow the rapid deployment of new applications. This project concerns the development of a tool t ....GriddLeS: Building Grid Applications from Legacy Software. Grid computing is emerging as a major new capability for modern, high performance technical computing. Such Grids couple geographically distributed resources such as high performance computers, workstations, clusters, and scientific instruments. Traditional methods of producing software for Grids are inefficient and error prone, and will not allow the rapid deployment of new applications. This project concerns the development of a tool that will facilitate the construction of complex Grid application using legacy software components. It will test the new ideas with a range of scientific demonstrators, including atmospheric science, geo-science and mechanical engineering.Read moreRead less
Towards Invisibly Intelligent Appliances via Experience-based Computing. As computers become more pervasive, people will inevitably interact with a wide range of networked appliances. This proposal aims to develop prototype enabling technology to allow appliances to operate cooperatively and seamlessly with minimum human input - 'invisible intelligence'. Experience-based computing is the key concept underlying the technology. A prototype 'operating experience' will be developed to sit on top of ....Towards Invisibly Intelligent Appliances via Experience-based Computing. As computers become more pervasive, people will inevitably interact with a wide range of networked appliances. This proposal aims to develop prototype enabling technology to allow appliances to operate cooperatively and seamlessly with minimum human input - 'invisible intelligence'. Experience-based computing is the key concept underlying the technology. A prototype 'operating experience' will be developed to sit on top of existing operating systems that will allow appliances to join and leave networks, and interact with other appliances. Also to be developed are a modeling framework, language and methodology for specifying appliance behaviour, and allow learning from experience.Read moreRead less
Service orientated architectures in management of IT infrastructures. Through the utilisation of the proposed framework for building rich business service registries, Australian companies will be able to take full advantage of service oriented architectures in constructing and managing their IT infrastructure in a way that is not currently possible. Such a registry will be able to provide a coherent view of an enterprise's services and resources, and an effective way to co-relate and utilise the ....Service orientated architectures in management of IT infrastructures. Through the utilisation of the proposed framework for building rich business service registries, Australian companies will be able to take full advantage of service oriented architectures in constructing and managing their IT infrastructure in a way that is not currently possible. Such a registry will be able to provide a coherent view of an enterprise's services and resources, and an effective way to co-relate and utilise them, in a changing environment. The development of the framework will also further cement Australia's leading market position in providing service registries to enterprises world-wide, enhance Australia's international research reputation and provide an excellent training environment for young researchers.Read moreRead less
Large-Scale Emulation for Enterprise Software Systems. This project will deliver a key future software technology for scalable quality assurance of highly interconnected enterprise IT systems, significantly contributing to more reliable and effective business operations in all industry sectors. It will fill a market gap and give Australian businesses a world competitive advantage. The project will generate world-leading research outcomes and further cement Australia’s leading research position i ....Large-Scale Emulation for Enterprise Software Systems. This project will deliver a key future software technology for scalable quality assurance of highly interconnected enterprise IT systems, significantly contributing to more reliable and effective business operations in all industry sectors. It will fill a market gap and give Australian businesses a world competitive advantage. The project will generate world-leading research outcomes and further cement Australia’s leading research position in enterprise software systems engineering. In particular, it will make major contributions to research into complex large-scale system interaction, system performance and scalability, and system behaviour modelling. The project also provides an excellent training environment for young researchers. Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Open Agent Architectures for Intelligent Distributed Decision Making. Sophisticated software systems are part of the essential infrastructure of our daily lives. Complex systems such as the internet, finance, or telecommunications software cannot have a centralised point of control or a single developer. The aim of this project is to develop an architecture and support infrastructure enabling intelligent agents to locate and use services in such open systems. The fundamental questions that must ....Open Agent Architectures for Intelligent Distributed Decision Making. Sophisticated software systems are part of the essential infrastructure of our daily lives. Complex systems such as the internet, finance, or telecommunications software cannot have a centralised point of control or a single developer. The aim of this project is to develop an architecture and support infrastructure enabling intelligent agents to locate and use services in such open systems. The fundamental questions that must be addressed include issues such as how agents will find and use newly added services and how services will communicate with each other, given that they are developed independently.Read moreRead less
Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop ....Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop a self-contained, reliable, compatible and verifiable crypto library; (2) we will develop security test software automatically to test and verify security of codes; and (3) we will provide intelligent decision support through argumentation to help developers to apply the library efficiently and correctly.Read moreRead less