Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detecti ....Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detection, and 3) finding unseen vulnerabilities. We therefore propose to use a series of new techniques such as efficient in-memory fuzzing, conditional formulas, and transfer learning to solve the above challenges. The project outcomes will help Australia gain cutting edge techniques in vulnerability detection. Read moreRead less
Risk-aware business process management. Risk-aware business process management will revolutionise the identification and treatment of risks in business processes by integrating the latest technologies for risk management and process management. It will provide organisations with a range of new tools and techniques for designing, deploying and monitoring risk-aware business processes.
Understanding the impact of enterprise system use on system performance. To optimise organizational benefits, resource intensive enterprise systems must be appropriately used by all user cohorts. This study investigates the impact of system-use on system success. System-use patterns derived for all key user cohorts across the lifecycle phases will create management matrices to assist organizations maximise system-use.
Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and dece ....Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and decentralised nature of the Web, there is a need to establish a trust framework for selecting and composing Web services. The key parameter will be based on Web service reputation in delivering services.Read moreRead less
Cost-aware business process management. The project aims to inform business process management (BPM) with the latest insights from the field of management accounting in order to make BPM systems cost-aware. By incorporating the cost dimension, organisations can obtain an accurate and immediate overview of the true cost of their processes and make cost-informed decisions.
Modelling and defence against malware propagation. As the internet has become vital to our day-to-day working and living, we are witnessing a remarkable upsurge in the incidents of malicious software or malware on it. This project aims to develop key technologies that can precisely model the malware propagation on the internet. The technologies will help develop effective defence against malware propagation at an early stage, with limited defence resources, so as to minimise the damage and provi ....Modelling and defence against malware propagation. As the internet has become vital to our day-to-day working and living, we are witnessing a remarkable upsurge in the incidents of malicious software or malware on it. This project aims to develop key technologies that can precisely model the malware propagation on the internet. The technologies will help develop effective defence against malware propagation at an early stage, with limited defence resources, so as to minimise the damage and provide a capability to identify and control malware spreaders. This project is significant as it can secure the internet that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia by protecting our critical infrastructure.Read moreRead less
Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory an ....Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory and informed decision-making. This provides significant benefits of not only placing Australia in the forefront of exploiting multimodal user behaviour big data in dynamic e-commerce but also transforming Australian government and businesses to intelligent and contextual services adaptive to complex situations.Read moreRead less
A Theory of Innovation Systems. The goal of the project is to develop and validate a new theory for how information systems can be designed to assist organisations in becoming innovative. Technological innovation is designed to increase productivity and economic growth, but knowledge is lacking about how information systems can meaningfully support organisations in becoming innovative. The goal of this project is to develop and test a theory of ‘innovation systems’ that would describe design pri ....A Theory of Innovation Systems. The goal of the project is to develop and validate a new theory for how information systems can be designed to assist organisations in becoming innovative. Technological innovation is designed to increase productivity and economic growth, but knowledge is lacking about how information systems can meaningfully support organisations in becoming innovative. The goal of this project is to develop and test a theory of ‘innovation systems’ that would describe design principles for information systems that provide effective and efficient support to organisational innovation processes. The expected project outcomes would assist the development of new systems to support organisational innovations, the management of innovation initiatives to increase productivity and growth, and the effective assessment of technologies to support innovation.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less