Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
User-task co-adaptation for effective interactive simulation environments. This project aims to deliver smart interactive simulation environments in which users and simulation tasks work together. This project aims to create novel adaptive algorithms to automatically discover those user and task features that vary together to smartly adapt users and simulation tasks to work together harmoniously, seamlessly and effectively. Interactive simulation environments are the backbone for evaluating conc ....User-task co-adaptation for effective interactive simulation environments. This project aims to deliver smart interactive simulation environments in which users and simulation tasks work together. This project aims to create novel adaptive algorithms to automatically discover those user and task features that vary together to smartly adapt users and simulation tasks to work together harmoniously, seamlessly and effectively. Interactive simulation environments are the backbone for evaluating concepts, designs, products and advanced training systems in industry and government organisations. By bringing the user naturally inside the simulation as a task's component, users can improve their experience while task performance is simultaneously optimised. Intended outcomes include novel dynamic user-task profiling algorithms and new adaptive algorithms for user-task co-adaptation. Practical outcomes may include robust and highly effective simulation environments.Read moreRead less
Practical Automated Deduction. This project will develop, implement and validate improved methods for automated deduction in decidable fragments of first order logic, also incorporating reasoning in special theories such as arithmetic. It will significantly extend previous work on the model evolution calculus and dynamic semantic resolution, and introduce new techniques that combine these reasoning methods. This work has direct application to reasoning about business rules and about industrial o ....Practical Automated Deduction. This project will develop, implement and validate improved methods for automated deduction in decidable fragments of first order logic, also incorporating reasoning in special theories such as arithmetic. It will significantly extend previous work on the model evolution calculus and dynamic semantic resolution, and introduce new techniques that combine these reasoning methods. This work has direct application to reasoning about business rules and about industrial optimisation problems, and it will motivate and test our systems by means of case studies from both of these areas.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance provid ....Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance providers can place on health data from wearable devices, and showcase Australian innovation in developing world-class security solutions. The outcome of this project is expected to be the development and demonstration of ultra-lightweight algorithms and mechanisms that execute in wearable devices to safeguard the integrity of the data.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the infor ....SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the information and contracts needed by IoT applications to discover, integrate, pay, and use sensors provided by another parties. These IoT advancements will provide significant economic, environmental, and social benefits via making low-cost and immediate sensing available across the world.Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Robust Preference Inference from Spatial-Temporal Interaction Networks. This project aims to develop innovative techniques for effectively and efficiently managing user preference profiles from less labelled, sparse and noisy interaction data. A unified novel learning framework along with a set of data analysis techniques are expected to be developed from this project, which will provide a non-intrusive way of conducting predictive analysis on user preference profiling via discovering human expl ....Robust Preference Inference from Spatial-Temporal Interaction Networks. This project aims to develop innovative techniques for effectively and efficiently managing user preference profiles from less labelled, sparse and noisy interaction data. A unified novel learning framework along with a set of data analysis techniques are expected to be developed from this project, which will provide a non-intrusive way of conducting predictive analysis on user preference profiling via discovering human explicit and implicit interest domains. The expected results of this application will not only maintain Australia's leadership in this frontier research area, but also support many important applications that safeguard Australian people and economy such as cyber security, healthcare, and e-Commerce.Read moreRead less