Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Reconceiving Machine Learning. The proposed research will develop a new way to consider problems to which machine learning can be applied. Machine learning is crucial enabler of the digital economy. The research will provide better opportunities for Australian industry to gain a competitive advantage with machine learning technology. The framework developed will enable better opportunities for collaborative research and will build and strengthen international linkages.
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Kernel and Margin Based Machine Learning Algorithms. Certain machine learning algorithms, such as support vector machines, utilizing
the ideas of large margins and kernels have attracted much attention lately
because of their impressive performance on real world problems such as optical
character recognition. We plan to refine and extend such algorithms to a wide
range of different machine learning problems such as gene sequence analysis,
image processing and text classification. Expected ....Kernel and Margin Based Machine Learning Algorithms. Certain machine learning algorithms, such as support vector machines, utilizing
the ideas of large margins and kernels have attracted much attention lately
because of their impressive performance on real world problems such as optical
character recognition. We plan to refine and extend such algorithms to a wide
range of different machine learning problems such as gene sequence analysis,
image processing and text classification. Expected outcomes include the
development of software that allows the solution of hitherto unsolved machine
learning problems, and the ability to solve problems larger than those solvable
by the current generation of machine learning tools.Read moreRead less
Flying networks: airborne sensing for environmental monitoring and disaster response. Airborne sensing technology is ideally suited to Australian geography and can be highly effective for monitoring disasters, surveillance, and precision agriculture. There are ample opportunities for local information technology companies and start-ups to create innovative airborne sensing applications for both the Australian and overseas markets.
Pattern Discovery of Discriminating Behaviour Associated with Hidden Communities. A sound understanding of discriminating behaviour in hidden communities, e.g. market manipulation, is essential for effective intervention and prevention. This project will deliver novel and workable algorithms and tools for modelling and pattern discovery of such behaviour. This will safeguard Australia by tackling crucial business and social issues like abnormal trading, online crime and terrorism, thereby enhanc ....Pattern Discovery of Discriminating Behaviour Associated with Hidden Communities. A sound understanding of discriminating behaviour in hidden communities, e.g. market manipulation, is essential for effective intervention and prevention. This project will deliver novel and workable algorithms and tools for modelling and pattern discovery of such behaviour. This will safeguard Australia by tackling crucial business and social issues like abnormal trading, online crime and terrorism, thereby enhancing public confidence, compliance and security in both the economy and society, by preventing and reducing economic and social impact. It will create skills and outcomes to further Australia's leadership in managing emerging data mining challenges and applications, and will deepen collaboration with eminent researchers worldwide.Read moreRead less
Software-defined provisioning of Internet of Things applications in fog computing systems. This project aims to investigate and provide solutions for the realisation of a seemingly integrated Fog Computing (FC) paradigm with cloud environments, networking devices and Internet of Things devices. Fog Computing (FC) is an emerging paradigm with great promises for advancing Information and Communications Technologies. Using interdisciplinary approaches, the project expects to generate new knowledge ....Software-defined provisioning of Internet of Things applications in fog computing systems. This project aims to investigate and provide solutions for the realisation of a seemingly integrated Fog Computing (FC) paradigm with cloud environments, networking devices and Internet of Things devices. Fog Computing (FC) is an emerging paradigm with great promises for advancing Information and Communications Technologies. Using interdisciplinary approaches, the project expects to generate new knowledge for optimising both hardware and software resources of a FC system. Outcomes of this project include practical solutions through building novel mathematical frameworks and optimisation objectives. The project is expected to provide efficient monitoring and control of intelligent spaces, management of urban and rural environments and will have applications in the areas of energy, security, transport and public health.Read moreRead less