Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE160100090
Funder
Australian Research Council
Funding Amount
$250,000.00
Summary
Computational infrastructure for developing deep machine learning models. Computational infrastructure for developing deep machine learning models:
The computational infrastructure for developing deep machine learning models aims to enable new developments in machine learning of deep neural network models by providing the specialised computing necessary to train and evaluate the networks. In the last three years, deep networks have smashed previous performance ceilings for tasks such as object ....Computational infrastructure for developing deep machine learning models. Computational infrastructure for developing deep machine learning models:
The computational infrastructure for developing deep machine learning models aims to enable new developments in machine learning of deep neural network models by providing the specialised computing necessary to train and evaluate the networks. In the last three years, deep networks have smashed previous performance ceilings for tasks such as object recognition in images, speech recognition and automatic translation, bringing the prospect of machine intelligence closer than ever. Modern machine learning techniques have had huge impact in the last decade in fields such as robotics, computer vision and data analytics. The facility would enable Australian researchers to develop, learn and apply deep networks to problems of national importance in robotic vision and big data analytics. Read moreRead less
ARC Research Network for a Secure Australia. The Research Network for a Secure Australia (RNSA) is a multi-disciplinary collaboration established to strengthen Australia's research capacity for protecting critical infrastructure from natural or human-caused disasters including terrorist acts. The RNSA will facilitate a knowledge-sharing network for research organisations, government and the private sector to develop research tools and methods to mitigate emerging safety and security issues relat ....ARC Research Network for a Secure Australia. The Research Network for a Secure Australia (RNSA) is a multi-disciplinary collaboration established to strengthen Australia's research capacity for protecting critical infrastructure from natural or human-caused disasters including terrorist acts. The RNSA will facilitate a knowledge-sharing network for research organisations, government and the private sector to develop research tools and methods to mitigate emerging safety and security issues relating to critical infrastructure. World-leaders with extensive national and international linkages in relevant scientific, engineering and technological research will lead this collaboration. The RNSA will launch various activities to foster research collaboration and nurture young investigators.Read moreRead less
A theoretical framework for practical partial fingerprint identification. Fingerprints captured from a crime scene are often partial and poor quality which makes it difficult to identify the criminal suspects from large databases. This project will find mathematical models which can estimate the missing information located in the blank areas of a partial fingerprint and effectively identify it.
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.