Special Research Initiatives - Grant ID: SR0567533
Funder
Australian Research Council
Funding Amount
$120,000.00
Summary
Scientific Instruments as ICT Components in Building a GrEMLIN for e-Research. The proposal seeks to initiate the development of a GrEMLIN, a Grid Enabled Multi-Level Instrument Network, for e-Research. Scientific instruments, whether at conventional laboratories or at major facilities, may be regarded as specialised ICT components in a network providing remote access to such instrumentation. Collaborative remote access and data analysis brings efficiency and effectiveness dividends, that can ....Scientific Instruments as ICT Components in Building a GrEMLIN for e-Research. The proposal seeks to initiate the development of a GrEMLIN, a Grid Enabled Multi-Level Instrument Network, for e-Research. Scientific instruments, whether at conventional laboratories or at major facilities, may be regarded as specialised ICT components in a network providing remote access to such instrumentation. Collaborative remote access and data analysis brings efficiency and effectiveness dividends, that can be enhanced through the harnessing of Grid technologies. The collaborative project will leverage middleware, Web Services and e-Science software developments in the US and UK, to provide Grid enabled remote instrument access and data analysis as a powerful e-Research tool.Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not o ....Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not only practical solutions for protecting sensitive data recorded in blockchain but also crucial techniques to make the blockchain accountable for practical applications with enhanced security. This project provides significant benefits, such as building a trusted environment for sensitive transactions in the digital economy.Read moreRead less
Domain-specific visual languages for big data analytics applications. This project aims to invent domain-specific visual languages and support model-driven engineering based infrastructure so domain experts can specify, generate and apply complex data analytics and visualisation techniques. Many domains, including intelligent transport, business intelligence, and population health, need more effective “big data” analytics and visualisation. A challenge is to combine detailed domain knowledge – w ....Domain-specific visual languages for big data analytics applications. This project aims to invent domain-specific visual languages and support model-driven engineering based infrastructure so domain experts can specify, generate and apply complex data analytics and visualisation techniques. Many domains, including intelligent transport, business intelligence, and population health, need more effective “big data” analytics and visualisation. A challenge is to combine detailed domain knowledge – what the data means and what it can be used for – with sophisticated, scalable computational techniques to mine and present information from the huge volumes of raw data. This project is expected to improve productivity and quality of big data analytics and visualisation in critical domains.Read moreRead less
Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Metamorphic slices and their applications in fault localization. The main purpose of this project is to enhance the quality of software. The expected outcomes include the delivery of new cost-effective methods to debug software, and the extension of current debugging methods to be applicable in wider contexts.
Self Discovery, Self Configuration and Self Healing of Enterprise Grids. Firstly, the project will assist the elevation of grid computing into mainstream computing, and by this provide a direct response to some problems identified by the working party on the Australia's ICT research and research training. Secondly, our country is an excellent consumer of IT technology. But, it needs software artifacts that could be sold. A set of proposed services will be a saleable commodity of great commercial ....Self Discovery, Self Configuration and Self Healing of Enterprise Grids. Firstly, the project will assist the elevation of grid computing into mainstream computing, and by this provide a direct response to some problems identified by the working party on the Australia's ICT research and research training. Secondly, our country is an excellent consumer of IT technology. But, it needs software artifacts that could be sold. A set of proposed services will be a saleable commodity of great commercial value. A software company that will develop its commercial version could be set up. Thirdly, the project will help Early Career Researchers in gaining an experience necessary to carry out independent research and assist in training new researchers: Postdocs, PhDs and Masters.Read moreRead less
Integration of Metamorphic Testing and Model Checking. This project proposes an innovative approach of integrating metamorphic testing and model checking. Its main outcome will be to deliver a comprehensive testing method that will help to reduce errors and costs in software development and consequently to improve the quality of software systems. Since software is pervasive and ubiquitous, our results will improve the nation's software productivity and quality. Thus, our results will help in ra ....Integration of Metamorphic Testing and Model Checking. This project proposes an innovative approach of integrating metamorphic testing and model checking. Its main outcome will be to deliver a comprehensive testing method that will help to reduce errors and costs in software development and consequently to improve the quality of software systems. Since software is pervasive and ubiquitous, our results will improve the nation's software productivity and quality. Thus, our results will help in raising our nation's competitive advantage towards the goal of becoming a leading nation in the software industry among Asia-Pacific countries. Furthermore, this collaboration will help young Australian researchers to link to the Chinese Academy of Sciences, a leading-edge international research institute.Read moreRead less