An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
A Grid based platform for multi-scaled biological simulation. Heart disease currently affects over 3.5 million Australians. In 2006 it claimed the lives of almost 46,000 Australians (34% of all deaths). We will develop enabling technology that underpins cardiac disease research, offering potential for new treatments and pharmaceutical therapies. Even a small improvement in this area can translate into significant national benefit. Further, the mathematical techniques and software tools we will d ....A Grid based platform for multi-scaled biological simulation. Heart disease currently affects over 3.5 million Australians. In 2006 it claimed the lives of almost 46,000 Australians (34% of all deaths). We will develop enabling technology that underpins cardiac disease research, offering potential for new treatments and pharmaceutical therapies. Even a small improvement in this area can translate into significant national benefit. Further, the mathematical techniques and software tools we will develop, whilst focused on heart tissue, will have broader applicability, and may underpin advancements in other disciplines. Finally, we expect that the software solutions and infrastructure will have both commercial and strategic value in their own right.Read moreRead less
Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a lar ....Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a large variety of problems, but the machinery required was diverse and complicated. This research will organize the machinery into a new approach that systematically finds good algorithms by applying simplifications around a parameter of the domain of the problem. As a result, efficient algorithms are obtained for many diverse areas.Read moreRead less
Special Research Initiatives - Grant ID: SR0567393
Funder
Australian Research Council
Funding Amount
$100,000.00
Summary
Infrastructure for large-scale data resource sharing between research institutions – an environmental case study. The project creates a federated distributed data infrastructure for research, that encourages data creators to make their data available to other scientists, and encourages users to make use of data available from many sources. The vision is to establish an ICT infrastructure to facilitate a whole-of-environment approach to environmental research. The outcome is a proof-of-concept ....Infrastructure for large-scale data resource sharing between research institutions – an environmental case study. The project creates a federated distributed data infrastructure for research, that encourages data creators to make their data available to other scientists, and encourages users to make use of data available from many sources. The vision is to establish an ICT infrastructure to facilitate a whole-of-environment approach to environmental research. The outcome is a proof-of-concept application based upon a case study of Queensland Environmental Protection Agency’s databases, to gain an in-depth understanding of the complexity, scope and key technological barriers for establishing an ICT infrastructure, to identify where the latest technologies can be used and where the gaps are for these technologies to be used in environmental sciences.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Formal modelling and analysis of software requirements for air traffic management systems for improved integrity assurance. This project will significantly reduce the time and cost of developing software for critical applications such as aviation and air traffic management. As well as improving the trustworthiness of safety-critical computer-based systems, this project will also enable system improvements to be deployed faster and more reliably.
Software Quality Improvement Through Static Analysis and Annotation. Software forms the basis of critical infrastructure that supports industries such as electronic commerce. Flaws in the software can lead to failure of the overall system, or allow the security mechanisms of the software to be by-passed. This project is developing methods to improve the quality of software by finding common flaws that lead to security vulnerabilities or runtime failures. Within Australia, it is estimated that th ....Software Quality Improvement Through Static Analysis and Annotation. Software forms the basis of critical infrastructure that supports industries such as electronic commerce. Flaws in the software can lead to failure of the overall system, or allow the security mechanisms of the software to be by-passed. This project is developing methods to improve the quality of software by finding common flaws that lead to security vulnerabilities or runtime failures. Within Australia, it is estimated that there are approximately 75,000 software developers who make substantial use of C/C++ and who could benefit from the availability of better automatic static analysis tools to improve both the quality of the code they produce and their productivity.Read moreRead less
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less