Mapping the Effectiveness of Automated Software Testing. This project aims to help software engineers build complex software systems in far more reliable and cost-effective ways. It takes an interdisciplinary approach by applying machine learning techniques to automatically test complex software systems. Expected outcomes include a novel methodology for assessing the strengths and weaknesses of test suites generated by automated software testing techniques and the approaches required for generat ....Mapping the Effectiveness of Automated Software Testing. This project aims to help software engineers build complex software systems in far more reliable and cost-effective ways. It takes an interdisciplinary approach by applying machine learning techniques to automatically test complex software systems. Expected outcomes include a novel methodology for assessing the strengths and weaknesses of test suites generated by automated software testing techniques and the approaches required for generating high-quality test cases. Such advances are urgently needed to avoid disasters when deploying software systems in the real world.Read moreRead less
Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not o ....Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not only practical solutions for protecting sensitive data recorded in blockchain but also crucial techniques to make the blockchain accountable for practical applications with enhanced security. This project provides significant benefits, such as building a trusted environment for sensitive transactions in the digital economy.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop ....Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop a self-contained, reliable, compatible and verifiable crypto library; (2) we will develop security test software automatically to test and verify security of codes; and (3) we will provide intelligent decision support through argumentation to help developers to apply the library efficiently and correctly.Read moreRead less
Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident ....Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident triage. Expected outcomes of the project include a set of novel methods and tools that can facilitate incident diagnosis and resolution. This project will provide significant benefits, such as improving the availability of software-intensive systems and reducing the economic loss caused by the incidents. Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Ambient nature network: new technologies to connect people to nature. This project aims to reconnect people with nature through new technology. Events in nature occur at times, places and scales that are hard to witness, leading to human disconnection from nature. This project proposes to address this issue by researching and designing new low-cost devices that combine environmental sensors with new interfaces to reveal local nature in parks and gardens in calm, engaging ways within and between ....Ambient nature network: new technologies to connect people to nature. This project aims to reconnect people with nature through new technology. Events in nature occur at times, places and scales that are hard to witness, leading to human disconnection from nature. This project proposes to address this issue by researching and designing new low-cost devices that combine environmental sensors with new interfaces to reveal local nature in parks and gardens in calm, engaging ways within and between homes in medium and high density environments. Outcomes will include new connected devices, playful interfaces and social sharing mechanisms, an evaluation with local groups, and a new theory of technology supported human-nature interaction. Benefits will include better community connection to nature, engagement in local citizen science, environmental initiatives and novel monitoring services and products.Read moreRead less
Searching for near-exact protein models. This project aims to develop novel and efficient heuristic-based algorithms leading to near accurate protein tertiary structure models. Knowledge about protein structures is fundamental to our understanding of living systems. The progress on experimental determination of these structures has been extremely limited and remains an open challenge in molecular biology. Computational prediction of protein structures from sequences is emerging as a promising ap ....Searching for near-exact protein models. This project aims to develop novel and efficient heuristic-based algorithms leading to near accurate protein tertiary structure models. Knowledge about protein structures is fundamental to our understanding of living systems. The progress on experimental determination of these structures has been extremely limited and remains an open challenge in molecular biology. Computational prediction of protein structures from sequences is emerging as a promising approach, but its accuracy is far from satisfactory. The software systems developed in this project will be used in structural identification of target proteins in drug design. This will make drug design process more efficient, saving time and cost, potentially saving lives.Read moreRead less
Data-driven Approach to Resilient Online Service Systems. This project aims to develop a data-driven approach to improving the resilience of online service systems. Many software systems are now provided as online services via the Internet on a 24/7 basis. Although a lot of effort has been devoted to service quality assurance, in reality, online service systems still encounter many incidents and fail to satisfy user requests. This project expects to develop innovative data-driven methods for eff ....Data-driven Approach to Resilient Online Service Systems. This project aims to develop a data-driven approach to improving the resilience of online service systems. Many software systems are now provided as online services via the Internet on a 24/7 basis. Although a lot of effort has been devoted to service quality assurance, in reality, online service systems still encounter many incidents and fail to satisfy user requests. This project expects to develop innovative data-driven methods for effective fault identification, fault localization, and failure prediction. Expected outcomes of this project include novel techniques and tools for maintaining online service systems. This project will provide significant benefits, such as improving the resilience and reliability of our cyber infrastructure.Read moreRead less