Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic groupin ....Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic grouping recombination model. The project outcomes will be beneficial to applications in the nation as it incorporates new privacy constraints and utility requirements raised by emerging technologies to enable better protection of sensitive information and maximal data utility in outsourced systems. Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Intelligent Technologies for Smart Cryptography. This project aims to improve cybersecurity by automating the process of generating cryptographic software for smart devices. The expected outcomes are tools that automatically produce efficient cryptographic software that resists attacks. The main benefit of this project is to reduce the amount of expert labour required when developing secure software.
Values-oriented Defect Fixing for Mobile Software Applications. This project aims to address critical problems with mobile applications that exhibit human values-based defects, by advancing our understanding, detection and fixing of such defects. Many mobile apps do not operate according to the essential values of their human users - e.g. inclusivity, accessibility, privacy, ethical behaviour, due care, emotions, etc - making them ineffective, underused, unfit for purpose or even dangerous. Exp ....Values-oriented Defect Fixing for Mobile Software Applications. This project aims to address critical problems with mobile applications that exhibit human values-based defects, by advancing our understanding, detection and fixing of such defects. Many mobile apps do not operate according to the essential values of their human users - e.g. inclusivity, accessibility, privacy, ethical behaviour, due care, emotions, etc - making them ineffective, underused, unfit for purpose or even dangerous. Expected outcomes include new theories, techniques and prototype tools for developers and end users to detect and help fix values-based defects in mobile apps. Benefits include better, safer mobile apps for people and organisations and improved app developer productivity and competitiveness.Read moreRead less
Effective privacy protection for smart metering data on cloud. Privacy in smart metering data on cloud is at risk because analysis of such data can reveal user privacy such as daily lifestyle. Current privacy protection approaches lack effectiveness because they omit some privacy leakage cases or cannot be applied to metering data which is collected continuously. This project aims to systematically investigate significant challenges in the effectiveness and expects to establish innovative resear ....Effective privacy protection for smart metering data on cloud. Privacy in smart metering data on cloud is at risk because analysis of such data can reveal user privacy such as daily lifestyle. Current privacy protection approaches lack effectiveness because they omit some privacy leakage cases or cannot be applied to metering data which is collected continuously. This project aims to systematically investigate significant challenges in the effectiveness and expects to establish innovative research and solutions for enabling effective privacy protection in smart metering data on cloud. The project outcomes aims to safeguard Australian home community with pervasive deployment of smart meters and data on cloud, and benefit fast-growing privacy sensitive data hosting and applications on cloud.Read moreRead less
Cost-effective Edge Service Provisioning in the Last Mile of 5G. This project aims to deliver a suite of novel approaches for enabling cost-effective last-mile service provisioning in the 5G mobile edge computing (MEC). This project is the world's first attempt to systematically tackle the critical service provisioning challenges in the last mile where base stations link users to MEC applications. It offers a practical solution for provisioning software vendors' MEC services cost-effectively. Th ....Cost-effective Edge Service Provisioning in the Last Mile of 5G. This project aims to deliver a suite of novel approaches for enabling cost-effective last-mile service provisioning in the 5G mobile edge computing (MEC). This project is the world's first attempt to systematically tackle the critical service provisioning challenges in the last mile where base stations link users to MEC applications. It offers a practical solution for provisioning software vendors' MEC services cost-effectively. This project should drive Australia's 5G transition and innovations, promote its post-COVID economic recovery and resilience by enabling various real-time mobile and IoT applications, e.g., telehealth, remote learning/working, industry 4.0, and ensure its pioneering position in the global 5G research.Read moreRead less
Scalable Stream Processing in Hybrid Edge-Cloud Infrastructures. This project aims to develop a new computational paradigm to ensure low-latency services for streaming applications across heterogeneous Edge devices while satisfying high-throughput and scalability requirements. This project is of high significance for generating new knowledge in the area of real-time streaming using innovative algorithms that overcome the limitations of remote Cloud and distributed Edge computing. Expected outcom ....Scalable Stream Processing in Hybrid Edge-Cloud Infrastructures. This project aims to develop a new computational paradigm to ensure low-latency services for streaming applications across heterogeneous Edge devices while satisfying high-throughput and scalability requirements. This project is of high significance for generating new knowledge in the area of real-time streaming using innovative algorithms that overcome the limitations of remote Cloud and distributed Edge computing. Expected outcomes include novel programming abstractions, performance models, and control mechanisms to address complex problems for incremental and iterative computations in hybrid Edge-Cloud infrastructures. This should provide significant benefits, one of which is the optimised utilisation of limited computing resources.Read moreRead less