Mechanised foundations of proof calculi. Commercial program verification tools based upon special-purpose logic-based proof calculi can now guarantee that large programs are free of specific bugs. But who verifies the proof-calculi? Our research will lead to tools to automatically verify proof-calculi and will eventually help to avoid costly post-construction debugging.
Discovery Early Career Researcher Award - Grant ID: DE220100595
Funder
Australian Research Council
Funding Amount
$416,400.00
Summary
Efficient privacy-preserving proofs for secure e-government and e-voting. Electronic systems are becoming increasingly widespread and crucial to social and economic wellbeing. This project aims to ensure that e-government, e-health, e-commerce and e-voting are secure and trustworthy by inventing new ways to verify these systems without infringing privacy. This project expects to use innovative techniques from cryptography to support development of trustworthy systems. Expected outcomes of this p ....Efficient privacy-preserving proofs for secure e-government and e-voting. Electronic systems are becoming increasingly widespread and crucial to social and economic wellbeing. This project aims to ensure that e-government, e-health, e-commerce and e-voting are secure and trustworthy by inventing new ways to verify these systems without infringing privacy. This project expects to use innovative techniques from cryptography to support development of trustworthy systems. Expected outcomes of this project include better support for organisations to build trustworthy systems that will maximise benefit to Australian business and society. This should provide significant commercial, reputational, and societal benefits by avoiding disruptions to the organisations and their clients if and when they are attacked. Read moreRead less
Evidence-based frameworks for security protocol verification. Security protocols are an essential part of secure communication networks. This project aims to develop verification techniques for security protocols that produce independently verifiable formal certificates of correctness. The project's outcome will contribute to the certification processes for secure network systems at the highest level of assurance.