Micro Virtual Machines: Abstraction, contained. This project will address a systemic source of inefficiency in widely used software which leads to many programs running as much as ten times slower and using considerably more energy than necessary, shortening battery life on mobile phones and increasing costs for large server farms. This inefficiency is endemic because it is due to the underlying languages rather than the particular software. This project will address this problem by developing a ....Micro Virtual Machines: Abstraction, contained. This project will address a systemic source of inefficiency in widely used software which leads to many programs running as much as ten times slower and using considerably more energy than necessary, shortening battery life on mobile phones and increasing costs for large server farms. This inefficiency is endemic because it is due to the underlying languages rather than the particular software. This project will address this problem by developing a high efficiency substrate, called a micro virtual machine, on which languages may be built.Read moreRead less
Designing Radiation-Tolerant Reconfigurable Systems for Space. The processing speed, cost and flexibility requirements of future satellite-based applications cannot be satisfied with conventional radiation-hardened processors or custom integrated circuits. This project aims to develop key technology to enable off-the-shelf hardware to be customised for this use without compromising reliability. The project aims to develop the design methods needed to implement a given set of satellite applicatio ....Designing Radiation-Tolerant Reconfigurable Systems for Space. The processing speed, cost and flexibility requirements of future satellite-based applications cannot be satisfied with conventional radiation-hardened processors or custom integrated circuits. This project aims to develop key technology to enable off-the-shelf hardware to be customised for this use without compromising reliability. The project aims to develop the design methods needed to implement a given set of satellite applications on a processing platform composed of application-specific soft processors and accelerator circuits hosted on conventional reconfigurable logic devices. Crucially, the solution architecture is expected to be sufficiently hardened against radiation-induced errors while meeting performance and circuit area constraints.Read moreRead less
Precision timekeeping infrastructure: bridging the hardware/software divide. Accurate time is essential for critical services from telecommunications to banking, and increasingly, must be performed with software clocks within computers, using hardware clocks accessed over the Internet. This project will bridge the hardware/software divide to deliver reliable and cost effective access to precise timing.
Sustainability in Computing: A Holistic View. Green computing must provide sustainable processing capabilities with high energy efficiency (lower carbon footprint) and increased product longevity (reducing the need for product replacement). While advances in technology have afforded significant reduction in power requirements, they come with inherent challenges due to uncertainties in micro-scale behaviour, high complexity of quantifying/optimising energy cost or system lifetime in extreme scale ....Sustainability in Computing: A Holistic View. Green computing must provide sustainable processing capabilities with high energy efficiency (lower carbon footprint) and increased product longevity (reducing the need for product replacement). While advances in technology have afforded significant reduction in power requirements, they come with inherent challenges due to uncertainties in micro-scale behaviour, high complexity of quantifying/optimising energy cost or system lifetime in extreme scale computing, and the interaction of non-computing components with individual computing systems. This project addresses these challenges via a holistic, multi-scale paradigm for modelling, analysis, and optimisation of energy cost, carbon footprint, and product lifetime in emerging computing systems.Read moreRead less
Low power memory for modern embedded systems. This project will create methods and circuits to reduce power consumption of embedded systems through memory optimisations. Power efficient embedded systems, will enable smaller, more portable systems and reduce battery usage by 2.5 per cent (worth over US$1.8 billion dollars) and lower toxic waste levels (e.g., heavy metals such as mercury, cadmium etc.).
Re-engineering internet timekeeping for scalability, accuracy and trust. This project aims to define and solve problems underpinning a secure and extensible system for network timekeeping, and implement and test a prototype under realistic conditions over the Internet. All computers incorporate a software clock, essential to software applications. A network is an inexpensive and convenient way to synchronise these clocks, but the Internet currently depends on an unreliable and insecure approach. ....Re-engineering internet timekeeping for scalability, accuracy and trust. This project aims to define and solve problems underpinning a secure and extensible system for network timekeeping, and implement and test a prototype under realistic conditions over the Internet. All computers incorporate a software clock, essential to software applications. A network is an inexpensive and convenient way to synchronise these clocks, but the Internet currently depends on an unreliable and insecure approach. The expected outcome will be trusted, accurate and reliable software clocks that support applications like cloud computing, billing systems and secure communications, which could become the timekeeping system for the Internet and the Internet of Things.Read moreRead less
An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Design in Context: Augmented Reality Technology to Improve the Quality and Performance of Architecture. This project will develop tools and knowledge to assess and improve the environmental performance and visual impact of design proposals prior to construction. The design simulation technology proposed here will allow stakeholders to concurrently test socio-cultural and functional performance over time, will allow more informed decision making and make a significant contribution to the social, ....Design in Context: Augmented Reality Technology to Improve the Quality and Performance of Architecture. This project will develop tools and knowledge to assess and improve the environmental performance and visual impact of design proposals prior to construction. The design simulation technology proposed here will allow stakeholders to concurrently test socio-cultural and functional performance over time, will allow more informed decision making and make a significant contribution to the social, cultural and economic life of Australia. The augmented reality technology to be developed in this project also has significant potential for applications in other domains and industries such as landscape and parks management.Read moreRead less