Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. Th ....Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. The success of this project will further enhance the international competitiveness of Australian research in this important field and will benefit any Australian industry and business where software systems are deeply-rooted, such as transportation, smart homes, medical devices, defence and finance.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Industrial Transformation Research Hubs - Grant ID: IH170100013
Funder
Australian Research Council
Funding Amount
$2,962,655.00
Summary
ARC Research Hub for Digital Enhanced Living. The ARC Research Hub for Digital Enhanced Living aims to address the growing challenges of aging people living in their own home or residential care. This will be through inventing new personalised medical technologies through an innovative approach, with a multi-disciplinary team leveraging diverse expertise. An enhanced capacity to create and deploy fit-for-purpose personalised health solutions will result in revenues from new and repurposed device ....ARC Research Hub for Digital Enhanced Living. The ARC Research Hub for Digital Enhanced Living aims to address the growing challenges of aging people living in their own home or residential care. This will be through inventing new personalised medical technologies through an innovative approach, with a multi-disciplinary team leveraging diverse expertise. An enhanced capacity to create and deploy fit-for-purpose personalised health solutions will result in revenues from new and repurposed devices, analytics and integration platforms. New jobs and improved care will see cost reductions, better use of resources and enhanced mental, physical and social well-being.Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Photogrammetric Reconstruction for Underwater Virtual Heritage Experiences. This project aims to enable significant underwater cultural heritage sites such as shipwrecks to be recreated in immersive underwater virtual heritage experiences. Photogrammetric 3D reconstruction techniques will be used to generate complex digital 3D models of shipwreck sites from hundreds of thousands of underwater images. This will allow vivid experiences to be created which explain the stories of these wrecks. The p ....Photogrammetric Reconstruction for Underwater Virtual Heritage Experiences. This project aims to enable significant underwater cultural heritage sites such as shipwrecks to be recreated in immersive underwater virtual heritage experiences. Photogrammetric 3D reconstruction techniques will be used to generate complex digital 3D models of shipwreck sites from hundreds of thousands of underwater images. This will allow vivid experiences to be created which explain the stories of these wrecks. The project will conduct audience engagement studies to recommend the most appropriate methods to implement underwater virtual heritage experiences for Australian audiences. The sites which will be used as test datasets are some of the most significant Australian shipwreck sites, including HMAS Sydney (II) and HMAS AE1.Read moreRead less
Mathematical and computational models for agrichemical retention on plants. Mathematical and computational models for agrichemical retention on plants. This project aims to build interactive software that simulates agrichemical spraying for multiple virtual plants reconstructed from scanned data. Mathematical modelling and computer simulation could offer an alternative to expensive experimental programs for agrichemical spraying of plants. This project will use contemporary fluid mechanics to bu ....Mathematical and computational models for agrichemical retention on plants. Mathematical and computational models for agrichemical retention on plants. This project aims to build interactive software that simulates agrichemical spraying for multiple virtual plants reconstructed from scanned data. Mathematical modelling and computer simulation could offer an alternative to expensive experimental programs for agrichemical spraying of plants. This project will use contemporary fluid mechanics to build practical mathematical models for droplet impaction, spreading and evaporation on leaf surfaces, and experimentally calibrate and validate the models. The software is expected to drive the development of agrichemical products that increase retention, minimise environmental impacts, and reduce costs for end-users.Read moreRead less
Complexity of group algorithms and statistical fingerprints of groups. This project aims to shape the next generation of efficient randomised algorithms in the field of group theory, the mathematics of symmetry. Fundamental mathematics underpins modern technological tasks such as web searches, sorting and data compression. This project aims to determine characteristic statistical fingerprints of key building-block groups. These group statistics lead to much faster procedures to essentially facto ....Complexity of group algorithms and statistical fingerprints of groups. This project aims to shape the next generation of efficient randomised algorithms in the field of group theory, the mathematics of symmetry. Fundamental mathematics underpins modern technological tasks such as web searches, sorting and data compression. This project aims to determine characteristic statistical fingerprints of key building-block groups. These group statistics lead to much faster procedures to essentially factor huge groups into smaller building-block groups in a manner akin to factoring an integer into its prime factors. The anticipated goal is to include the outcomes in publicly available symbolic algebra computer packages. As the theory of symmetry has broad applications in the mathematical and physical sciences, there is the potential for far reaching benefits.Read moreRead less