Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less
Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed ....Mathematical Foundations of Distributed Radar. Conventional military threats to Australia are large or fast moving objects such as ships and aircraft and conventional radar systems are designed to handle such threats. Recent global political shifts have changed the threats to include objects that are small and slowly moving, such as people, small vehicles and boats. Advances in radar hardware make feasible small, low-powered, devices with inherently reduced performance in comparison to deployed systems. Methods for information integration over a dispersed system of such small devices, design of suitable waveform suites and clever local signal processing algorithms will be developed to achieve the performance improvements the hardware offers, to handle the new threats.Read moreRead less