Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection ....Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection mandates on both immediate protection goals and the wider goals of peacekeeping. This project aims to assess the impact of the implementation of mandates to use force to protect civilians. Through a focused comparison of six missions, it plans to identify what works, what doesn't, and the factors which determine these outcomes in order to identify ways of improving performance in the future.Read moreRead less
Foundations for Physically Unclonable nano-Security on Silicon. This project aims to develop an on-chip physical unclonable function (PUF) based on recent progress in nanotechnology to generate unprecedented number of unique signatures. This is significant because these signatures can be used for preventing fraud and counterfeiting, protecting sensitive data and securing communications. PUFs will play an extremely vital role in future security systems. The PUF in the proposed project will be sim ....Foundations for Physically Unclonable nano-Security on Silicon. This project aims to develop an on-chip physical unclonable function (PUF) based on recent progress in nanotechnology to generate unprecedented number of unique signatures. This is significant because these signatures can be used for preventing fraud and counterfeiting, protecting sensitive data and securing communications. PUFs will play an extremely vital role in future security systems. The PUF in the proposed project will be simple, fast, tiny, energy efficient and highly secure as a result of the abundant nano-fabrication variations. The outcome of this project will be a prototype of a super high secure nanoelectronic-based PUF that will be tested to evaluate the technology and its security against malicious attacks.Read moreRead less
Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT a ....Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT access control with machine learning based anomaly detection. This should provide significant benefits, such as preventing cyber threats on security and privacy of IoT and improving trust in IoT-enabled smart critical infrastructure of Australia.Read moreRead less
Drug targets in the relict plastid of malaria parasites. Malaria is a major world health problem and new drugs are needed urgently. Essential genes are potentially excellent targets for anti-malarial drugs. This project will use a novel strategy to identify genes that the parasite cannot exist without. Function and drug potential of these genes will be explored.
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic groupin ....Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic grouping recombination model. The project outcomes will be beneficial to applications in the nation as it incorporates new privacy constraints and utility requirements raised by emerging technologies to enable better protection of sensitive information and maximal data utility in outsourced systems. Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
In for the count: Maximising trust and reliability in Australian elections. This project aims to develop innovative approaches to identifying, measuring, and evaluating errors and purposeful intervention in the uniquely complex elections at the basis of Australian democracy. Such methods can underpin a world-class election auditing system, which contends with the risks that are emerging at the intersection of election digitisation, cybersecurity and foreign interference. The project’s expected o ....In for the count: Maximising trust and reliability in Australian elections. This project aims to develop innovative approaches to identifying, measuring, and evaluating errors and purposeful intervention in the uniquely complex elections at the basis of Australian democracy. Such methods can underpin a world-class election auditing system, which contends with the risks that are emerging at the intersection of election digitisation, cybersecurity and foreign interference. The project’s expected outcomes are new auditing methods, tested on real Australian election data, with their benefits quantified against global best practice. The research outputs should help reinforce the community’s trust in Australian elections, which are a foundation for our security, social cohesion, and political resilience.Read moreRead less