Micro Virtual Machines: Abstraction, contained. This project will address a systemic source of inefficiency in widely used software which leads to many programs running as much as ten times slower and using considerably more energy than necessary, shortening battery life on mobile phones and increasing costs for large server farms. This inefficiency is endemic because it is due to the underlying languages rather than the particular software. This project will address this problem by developing a ....Micro Virtual Machines: Abstraction, contained. This project will address a systemic source of inefficiency in widely used software which leads to many programs running as much as ten times slower and using considerably more energy than necessary, shortening battery life on mobile phones and increasing costs for large server farms. This inefficiency is endemic because it is due to the underlying languages rather than the particular software. This project will address this problem by developing a high efficiency substrate, called a micro virtual machine, on which languages may be built.Read moreRead less
Designing Radiation-Tolerant Reconfigurable Systems for Space. The processing speed, cost and flexibility requirements of future satellite-based applications cannot be satisfied with conventional radiation-hardened processors or custom integrated circuits. This project aims to develop key technology to enable off-the-shelf hardware to be customised for this use without compromising reliability. The project aims to develop the design methods needed to implement a given set of satellite applicatio ....Designing Radiation-Tolerant Reconfigurable Systems for Space. The processing speed, cost and flexibility requirements of future satellite-based applications cannot be satisfied with conventional radiation-hardened processors or custom integrated circuits. This project aims to develop key technology to enable off-the-shelf hardware to be customised for this use without compromising reliability. The project aims to develop the design methods needed to implement a given set of satellite applications on a processing platform composed of application-specific soft processors and accelerator circuits hosted on conventional reconfigurable logic devices. Crucially, the solution architecture is expected to be sufficiently hardened against radiation-induced errors while meeting performance and circuit area constraints.Read moreRead less
Low power memory for modern embedded systems. This project will create methods and circuits to reduce power consumption of embedded systems through memory optimisations. Power efficient embedded systems, will enable smaller, more portable systems and reduce battery usage by 2.5 per cent (worth over US$1.8 billion dollars) and lower toxic waste levels (e.g., heavy metals such as mercury, cadmium etc.).
Re-engineering enterprise systems for microservices in the cloud. This project will enable automatic re-engineering of large enterprise applications to run in modern cloud environments as microservices. Microservices are the latest wave of service-based software, capable of exploiting the high performance and third-party integration opportunities made available through the cloud. The project will develop new techniques for analysing enterprise systems code and execution data, and making recommen ....Re-engineering enterprise systems for microservices in the cloud. This project will enable automatic re-engineering of large enterprise applications to run in modern cloud environments as microservices. Microservices are the latest wave of service-based software, capable of exploiting the high performance and third-party integration opportunities made available through the cloud. The project will develop new techniques for analysing enterprise systems code and execution data, and making recommendations for restructuring suitable parts as microservices. These microservices manage individual business objects via sets of lightweight distributed computational operations. The outcomes will support progressive evolution of an enterprise system, into distributed microservices running in public clouds, while still being integrated with "backend" systems.Read moreRead less
Re-engineering internet timekeeping for scalability, accuracy and trust. This project aims to define and solve problems underpinning a secure and extensible system for network timekeeping, and implement and test a prototype under realistic conditions over the Internet. All computers incorporate a software clock, essential to software applications. A network is an inexpensive and convenient way to synchronise these clocks, but the Internet currently depends on an unreliable and insecure approach. ....Re-engineering internet timekeeping for scalability, accuracy and trust. This project aims to define and solve problems underpinning a secure and extensible system for network timekeeping, and implement and test a prototype under realistic conditions over the Internet. All computers incorporate a software clock, essential to software applications. A network is an inexpensive and convenient way to synchronise these clocks, but the Internet currently depends on an unreliable and insecure approach. The expected outcome will be trusted, accurate and reliable software clocks that support applications like cloud computing, billing systems and secure communications, which could become the timekeeping system for the Internet and the Internet of Things.Read moreRead less
Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic groupin ....Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic grouping recombination model. The project outcomes will be beneficial to applications in the nation as it incorporates new privacy constraints and utility requirements raised by emerging technologies to enable better protection of sensitive information and maximal data utility in outsourced systems. Read moreRead less
Design in Context: Augmented Reality Technology to Improve the Quality and Performance of Architecture. This project will develop tools and knowledge to assess and improve the environmental performance and visual impact of design proposals prior to construction. The design simulation technology proposed here will allow stakeholders to concurrently test socio-cultural and functional performance over time, will allow more informed decision making and make a significant contribution to the social, ....Design in Context: Augmented Reality Technology to Improve the Quality and Performance of Architecture. This project will develop tools and knowledge to assess and improve the environmental performance and visual impact of design proposals prior to construction. The design simulation technology proposed here will allow stakeholders to concurrently test socio-cultural and functional performance over time, will allow more informed decision making and make a significant contribution to the social, cultural and economic life of Australia. The augmented reality technology to be developed in this project also has significant potential for applications in other domains and industries such as landscape and parks management.Read moreRead less
Recomputing the canon: using computational methods to develop an alternative understanding of the history of 20th century architecture. Because buildings are designed to last for many generations, and they represent a substantial economic investment, architecture remains one of the most tangible and persistent reflections of a culture's spiritual, social and political values. This is why it is said, to understand architecture is to understand society and its principles. This research develops an ....Recomputing the canon: using computational methods to develop an alternative understanding of the history of 20th century architecture. Because buildings are designed to last for many generations, and they represent a substantial economic investment, architecture remains one of the most tangible and persistent reflections of a culture's spiritual, social and political values. This is why it is said, to understand architecture is to understand society and its principles. This research develops an alternative history of 20th century architecture that will not only allow for a deeper understanding of, and appreciation for, our own constructed heritage, but will also inform the design and production of future buildings which are both socially and culturally responsive.Read moreRead less