Designing Radiation-Tolerant Reconfigurable Systems for Space. The processing speed, cost and flexibility requirements of future satellite-based applications cannot be satisfied with conventional radiation-hardened processors or custom integrated circuits. This project aims to develop key technology to enable off-the-shelf hardware to be customised for this use without compromising reliability. The project aims to develop the design methods needed to implement a given set of satellite applicatio ....Designing Radiation-Tolerant Reconfigurable Systems for Space. The processing speed, cost and flexibility requirements of future satellite-based applications cannot be satisfied with conventional radiation-hardened processors or custom integrated circuits. This project aims to develop key technology to enable off-the-shelf hardware to be customised for this use without compromising reliability. The project aims to develop the design methods needed to implement a given set of satellite applications on a processing platform composed of application-specific soft processors and accelerator circuits hosted on conventional reconfigurable logic devices. Crucially, the solution architecture is expected to be sufficiently hardened against radiation-induced errors while meeting performance and circuit area constraints.Read moreRead less
Sustainability in Computing: A Holistic View. Green computing must provide sustainable processing capabilities with high energy efficiency (lower carbon footprint) and increased product longevity (reducing the need for product replacement). While advances in technology have afforded significant reduction in power requirements, they come with inherent challenges due to uncertainties in micro-scale behaviour, high complexity of quantifying/optimising energy cost or system lifetime in extreme scale ....Sustainability in Computing: A Holistic View. Green computing must provide sustainable processing capabilities with high energy efficiency (lower carbon footprint) and increased product longevity (reducing the need for product replacement). While advances in technology have afforded significant reduction in power requirements, they come with inherent challenges due to uncertainties in micro-scale behaviour, high complexity of quantifying/optimising energy cost or system lifetime in extreme scale computing, and the interaction of non-computing components with individual computing systems. This project addresses these challenges via a holistic, multi-scale paradigm for modelling, analysis, and optimisation of energy cost, carbon footprint, and product lifetime in emerging computing systems.Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170100641
Funder
Australian Research Council
Funding Amount
$305,754.00
Summary
Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new model ....Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new models, theories, techniques and PABE constructions. This research project is expected to contribute to cyber security in anonymous access control with advanced management for all Australians.Read moreRead less
Automating data placement and movement for explicitly managed memory hierarchies. Efficient management of explicitly managed memory hierarchies is essential, making a difference often by one order of magnitude in performance. Compiler-directed techniques promise to take the burden of memory management from the programmer and enable significant performance potential for a broader community, resulting in higher productivity.
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Soundness-guided security analysis for android applications. This project aims to develop a soundness-guided programme analysis to mitigate security threats caused by reflection and dynamic class loading in Android apps, without compromising precision and scalability. Both dynamic code update techniques are widely used in benign and malware apps, but state-of-the-art malware analysis tools ignore or mishandle them, missing security threats and vulnerabilities. The resulting open-source security ....Soundness-guided security analysis for android applications. This project aims to develop a soundness-guided programme analysis to mitigate security threats caused by reflection and dynamic class loading in Android apps, without compromising precision and scalability. Both dynamic code update techniques are widely used in benign and malware apps, but state-of-the-art malware analysis tools ignore or mishandle them, missing security threats and vulnerabilities. The resulting open-source security analysis tool will allow software industries and enterprises (from national security, finance, banking to healthcare, retail, telecommunications) to test their mobile software effectively for code defects or security threats early at software development time at significantly reduced cost.Read moreRead less
Micro Compilers: An Extensible Compiler Architecture for Increased Flexibility and Safety. Programming languages specialised to a particular application domain can cut software development costs and reduce programming errors. Unfortunately, most application domains cannot sustain the costly development and maintenance of the specialised compilers required to implement specialised languages. We address this problem by introducing a novel customisable compiler architecture that can be adapted to ....Micro Compilers: An Extensible Compiler Architecture for Increased Flexibility and Safety. Programming languages specialised to a particular application domain can cut software development costs and reduce programming errors. Unfortunately, most application domains cannot sustain the costly development and maintenance of the specialised compilers required to implement specialised languages. We address this problem by introducing a novel customisable compiler architecture that can be adapted to specialised languages and other special-purpose compiler requirements. Customisable compilers are especially important to a country like Australia that has only limited resources for special purpose developments. Moreover, we will train students at undergraduate and postgraduate level in the area of programming languages and compilers.Read moreRead less