MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Ultrashort pulse laser for ultra-hard machine tools processing. This project aims to develop an advanced high-precision ultrashort pulse laser technique for shaping and sharpening cutting tools. It expects to generate new knowledge and new technology in machine tool fabrication using an innovative approach for processing ultra-hard materials. The expected outcome is progressive machining capabilities with higher throughput, significantly reduced production time and costs, and increased tool accu ....Ultrashort pulse laser for ultra-hard machine tools processing. This project aims to develop an advanced high-precision ultrashort pulse laser technique for shaping and sharpening cutting tools. It expects to generate new knowledge and new technology in machine tool fabrication using an innovative approach for processing ultra-hard materials. The expected outcome is progressive machining capabilities with higher throughput, significantly reduced production time and costs, and increased tool accuracy and life. This should provide significant economic and safety benefits for the advanced manufacturing industry, enabling production of high-performance products across cutting-edge industries including defence, aerospace, medical tools, automotive, and clean-energy technologies.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Seeing Change: Science, Culture and Technology in the Antipodes from the age of Darwin - a multi-media research collaboration. To build a collaboration across the humanities, natural sciences, business technology and public culture sectors that will use new forms of digital and visual research to demonstrate the neglected importance of Australasia in the formation of nineteenth-century evolutionary thought and to suggest the relevance of these ideas to understanding contemporary issues of enviro ....Seeing Change: Science, Culture and Technology in the Antipodes from the age of Darwin - a multi-media research collaboration. To build a collaboration across the humanities, natural sciences, business technology and public culture sectors that will use new forms of digital and visual research to demonstrate the neglected importance of Australasia in the formation of nineteenth-century evolutionary thought and to suggest the relevance of these ideas to understanding contemporary issues of environmental sustainability and the development of frontier technologies within our society and region. Read moreRead less
ARC Research Network in Enterprise Information Infrastructure. EII targets consolidated research towards the comprehensive development & establishment of advanced information infrastructures. Its prime purpose is to provide a forum for intellectual exchange by diverse yet complementary research groups, to address the fundamental research problems faced by scientific & business communities when dealing with deployment of information technology to globally distributed, and data intensive environme ....ARC Research Network in Enterprise Information Infrastructure. EII targets consolidated research towards the comprehensive development & establishment of advanced information infrastructures. Its prime purpose is to provide a forum for intellectual exchange by diverse yet complementary research groups, to address the fundamental research problems faced by scientific & business communities when dealing with deployment of information technology to globally distributed, and data intensive environments. EII will address 3 tightly coupled research themes: Ability to interoperate across existing heterogenous platforms & applications; Efficient processing of very large data sets; Technology adoption & impact. Generic results will be applicable to e-science and large business information systems installations.Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Making human place knowledge digestible by computers. This project aims to develop the tools that will enable people to interact intuitively with computers about places and the relations between places. People understand their environment in a different way to computers; they think of places and their relations, while computers use coordinates and maps. People’s interaction with maps is cognitively costly and error-prone, which is becoming untenable in situations needing time-critical decision m ....Making human place knowledge digestible by computers. This project aims to develop the tools that will enable people to interact intuitively with computers about places and the relations between places. People understand their environment in a different way to computers; they think of places and their relations, while computers use coordinates and maps. People’s interaction with maps is cognitively costly and error-prone, which is becoming untenable in situations needing time-critical decision making. The project will revolutionise the design of information services where computers deal with humans and location in time-critical or stressful situations, including emergency calls, disaster response and local search queries. The uptake of this design by industry will lead to economic benefits as well as a safer society living in a smarter environment.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less