Securing Web-based Services by Policy Coherence and Proof-checking. This project aims to develop a provably correct cybersecurity system for workflows, which enables organizations to provide flexible and more secure web-based services and business communication. The project expects to generate new knowledge, theoretic advancement and result in new technologies in the areas of internet of things and cybersecurity. The expected outcomes include a software tool with documentation, which helps organ ....Securing Web-based Services by Policy Coherence and Proof-checking. This project aims to develop a provably correct cybersecurity system for workflows, which enables organizations to provide flexible and more secure web-based services and business communication. The project expects to generate new knowledge, theoretic advancement and result in new technologies in the areas of internet of things and cybersecurity. The expected outcomes include a software tool with documentation, which helps organisations achieve operational excellence and security, and maintain a trusted environment for end users. This system will provide significant economic and commercial benefits to business and end users with highly secured web-services and improved productivity through a coherent framework and proof-checked workflows.Read moreRead less
Broadband quantum networking with trapped ions. Banks and governments are now using short-range quantum communication to transmit data with secrecy guaranteed by the laws of physics. This project aims to develop the key ingredient for future broadband quantum networks: high-speed transmitters delivering quantum light pulses over present-day fibre-optic telecom infrastructure.
An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Internet authentication protocols: theory and practice. Authentication is the foundation for secure electronic communication. It is the first step for many everyday online processes such as remote login or electronic banking. This project aims to make analysis of such protocols more realistic and more complete, allowing online communication to become more secure for both corporate users and individuals.
ARC Centre of Excellence for Quantum Computation and Communication Technology. The Centre for Quantum Computation and Communication Technology will coordinate a large team of Australian researchers in an intensive mission. Our aim is to integrate a radical and uniquely powerful Australian computing technology with an ultra-secure Australian communications technology. Our success will drive global productivity gains in information processing and ensure that Australians own the pivotal underpinnin ....ARC Centre of Excellence for Quantum Computation and Communication Technology. The Centre for Quantum Computation and Communication Technology will coordinate a large team of Australian researchers in an intensive mission. Our aim is to integrate a radical and uniquely powerful Australian computing technology with an ultra-secure Australian communications technology. Our success will drive global productivity gains in information processing and ensure that Australians own the pivotal underpinning intellectual property. Our technologies will provide Australia and its allies with the world's most secure information networks. Our discoveries will place Australia unequivocally at the very forefront of global research in quantum physicsRead moreRead less
ARC Communications Research Network. Building on a strong platform of existing research excellence, the Aim of the Network is to facilitate nation-wide collaborative research, promoting four intersecting research Themes: Mobile and Wireless Communications, Rural Communications, Broadband and Optical Networks, and Fundamentals of Emerging Media. Each Theme is formulated to drive multidisciplinary, innovative research as well as inspire new collaborative initiatives. Four Programs encapsulate the ....ARC Communications Research Network. Building on a strong platform of existing research excellence, the Aim of the Network is to facilitate nation-wide collaborative research, promoting four intersecting research Themes: Mobile and Wireless Communications, Rural Communications, Broadband and Optical Networks, and Fundamentals of Emerging Media. Each Theme is formulated to drive multidisciplinary, innovative research as well as inspire new collaborative initiatives. Four Programs encapsulate the core activities of the Network: Researcher Mobility, Workshops and Conferences, Postgraduate Education, and Knowledge Management Systems. The Network is expected to add significant value to pre-existing investments and raise the profile of Australian telecommunications research.Read moreRead less
Symbolic synthesis of knowledge-based program implementations. Systems with concurrent streams of activity are ubiquitous in computer hardware and software designs, but are conceptually complex, and fraught with faults and inefficiency. The project aims to address these difficulties by automating aspects of system design, to relieve the designer of the need to reason about complex patterns of information flow.