Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Automation of metric temporal reasoning. A major contemporary engineering concern is to ensure the predictable and robust operation of computer systems involving software, hardware, and human users. The need for systematic and careful construction of such systems requires the development of formal methods based on a dense view of time rather than the traditional step-by-step models.
automated strategic reasoning. Formal methods are used to ensure robust correct behaviour in design and implementation of computer systems. Traditional models of computer operation involve a linear sequence of behaviour but today’s systems are complex interactions between many components including the environment of the system and human users. Thus analysis is done via a logical game between components where each is trying to meet its specified requirements regardless of what others do: formalis ....automated strategic reasoning. Formal methods are used to ensure robust correct behaviour in design and implementation of computer systems. Traditional models of computer operation involve a linear sequence of behaviour but today’s systems are complex interactions between many components including the environment of the system and human users. Thus analysis is done via a logical game between components where each is trying to meet its specified requirements regardless of what others do: formalisms include branching time and competing coalitions of agents. This project is to take early advantage of recent breakthroughs in automated logical reasoning with such models by the investigator to deliver general practical techniques of system development and verification.Read moreRead less
Formal Specification and Realisation of Dynamic Reconfiguration in FPGA-based Systems. The project aims are:
to significantly advance our understanding of the key concepts needed to successfully exploit dynamic, run-time reconfigurable computing, a technology that is now becoming increasingly available due to developments in FPGA (Field Progammable Gate Array) devices, and
the development of an innovative high-level programming environment that will include a language, associated design method ....Formal Specification and Realisation of Dynamic Reconfiguration in FPGA-based Systems. The project aims are:
to significantly advance our understanding of the key concepts needed to successfully exploit dynamic, run-time reconfigurable computing, a technology that is now becoming increasingly available due to developments in FPGA (Field Progammable Gate Array) devices, and
the development of an innovative high-level programming environment that will include a language, associated design methodologies, compilation techniques, and run-time support that will make dynamic reconfigurable computing accessible to a wide community of potential users.
Read moreRead less
Novel Bioinformatics approaches for genetics and data linkage. The research project will involve creation of novel data and communications formats to fulfil the vital task of integrating the vast heterogeneous biological resources available. We will apply this new infrastructure to a large data linkage project. In parallel, we will undertake methodological research in informatics to design high throughput research methods and tools to analyse and visualise genetic data. These will be applied to ....Novel Bioinformatics approaches for genetics and data linkage. The research project will involve creation of novel data and communications formats to fulfil the vital task of integrating the vast heterogeneous biological resources available. We will apply this new infrastructure to a large data linkage project. In parallel, we will undertake methodological research in informatics to design high throughput research methods and tools to analyse and visualise genetic data. These will be applied to linkage disequilibrium mapping and haplotyping in human, animal and plant diseases. Improving informatics integration and designing novel methods and implementations of algorithms will be beneficial to local and international researchers in a range of fields.Read moreRead less
Optimal Robust Fitting under the Framework of LP-Type Problems. The project aims to develop algorithms to support the development of robust and accurate computer vision systems. Real-world visual data (images, videos) is inherently noisy and outlier prone. To build computer vision systems that work reliably in the real world, it is necessary to ensure that the underlying algorithms are robust and efficient. The project aims to devise novel algorithms that can compute the best possible result giv ....Optimal Robust Fitting under the Framework of LP-Type Problems. The project aims to develop algorithms to support the development of robust and accurate computer vision systems. Real-world visual data (images, videos) is inherently noisy and outlier prone. To build computer vision systems that work reliably in the real world, it is necessary to ensure that the underlying algorithms are robust and efficient. The project aims to devise novel algorithms that can compute the best possible result given the input data in a short amount of time. The expected outcomes would support the construction of reliable and accurate computer vision-based systems, such as large-scale 3-D reconstruction from photo collections, self-driving cars and domestic robots.Read moreRead less
Active multispectral computer vision for defence and security. This project will develop new techniques to extract intelligent information from multispectral images in the visible and near infra-red spectrum. It will enable computers to automatically recognise objects, faces and human actions with unprecedented accuracy.
Person identification from multiple non-invasive iris and face biometrics in video. This project will undertake research to develop a prototype system for personal identification that can be used by law enforcement and security agencies to enrol people at points of entry at public places. The system will non-invasively acquire face and iris biometrics and match them against a database of known persons. The proposed system can be used in sensitive buildings for access control, eliminating the nee ....Person identification from multiple non-invasive iris and face biometrics in video. This project will undertake research to develop a prototype system for personal identification that can be used by law enforcement and security agencies to enrol people at points of entry at public places. The system will non-invasively acquire face and iris biometrics and match them against a database of known persons. The proposed system can be used in sensitive buildings for access control, eliminating the need to carry access cards or remember passwords. This research contributes to the national research priority of Safeguarding Australia. We will develop new techniques in computer vision and train new researchers in this area.Read moreRead less
WAVELET-BASED MODELLING AND MODEL PREDICTIVE CONTROL OF COMPLEX MULTIDIMENSIONAL CRYSTALLISATION PROCESSES. The results of this project will directly contribute to a better understanding of crystallisation which is an important unit operation to achieve high purity separations. Many Australian industries for example, mineral processing, sugar processing, pharmaceuticals, etc will benefit from the results in order to enhance optimal operation and control to ensure globally competitive production ....WAVELET-BASED MODELLING AND MODEL PREDICTIVE CONTROL OF COMPLEX MULTIDIMENSIONAL CRYSTALLISATION PROCESSES. The results of this project will directly contribute to a better understanding of crystallisation which is an important unit operation to achieve high purity separations. Many Australian industries for example, mineral processing, sugar processing, pharmaceuticals, etc will benefit from the results in order to enhance optimal operation and control to ensure globally competitive production which is on time, minimize wastes and raw materials and inventories. The leading edge results will increase the contributions of these industries to the Australian economy and our global competitiveness necessary to maintain our culture and the beauty of our environment. Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less