Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Formal modelling and analysis of software requirements for air traffic management systems for improved integrity assurance. This project will significantly reduce the time and cost of developing software for critical applications such as aviation and air traffic management. As well as improving the trustworthiness of safety-critical computer-based systems, this project will also enable system improvements to be deployed faster and more reliably.
Software Quality Improvement Through Static Analysis and Annotation. Software forms the basis of critical infrastructure that supports industries such as electronic commerce. Flaws in the software can lead to failure of the overall system, or allow the security mechanisms of the software to be by-passed. This project is developing methods to improve the quality of software by finding common flaws that lead to security vulnerabilities or runtime failures. Within Australia, it is estimated that th ....Software Quality Improvement Through Static Analysis and Annotation. Software forms the basis of critical infrastructure that supports industries such as electronic commerce. Flaws in the software can lead to failure of the overall system, or allow the security mechanisms of the software to be by-passed. This project is developing methods to improve the quality of software by finding common flaws that lead to security vulnerabilities or runtime failures. Within Australia, it is estimated that there are approximately 75,000 software developers who make substantial use of C/C++ and who could benefit from the availability of better automatic static analysis tools to improve both the quality of the code they produce and their productivity.Read moreRead less
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Software debuggers for next generation heterogeneous supercomputers. Supercomputing underpins a wide range of areas of importance to the Australian economy; mining, agriculture, engineering and medical research to name a few. It is of critical importance that software solutions in these areas behave correctly. This project will develop software tools and techniques to help locate errors in such applications.
Automatic Energy Tuning of Parallel Applications on a Hybrid Supercomputer. Energy efficiency is a critical challenge in building next-generation supercomputers. This project aims to provide a new energy-tuning tool integrated with Cray’s systems, to simplify the process of tuning hybrid applications and managing efficient energy use. Although hardware components play a dominant role in saving energy, heterogeneous systems offer the opportunity to exploit the extremely high concurrency with mode ....Automatic Energy Tuning of Parallel Applications on a Hybrid Supercomputer. Energy efficiency is a critical challenge in building next-generation supercomputers. This project aims to provide a new energy-tuning tool integrated with Cray’s systems, to simplify the process of tuning hybrid applications and managing efficient energy use. Although hardware components play a dominant role in saving energy, heterogeneous systems offer the opportunity to exploit the extremely high concurrency with modest energy consumption using accelerators. Accordingly, the future of parallel computing must consider the trade-off between obtaining the optimal performance and the allowed power budget. The project plans to design parallel programming environments that support energy analysis and tuning.Read moreRead less