Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Achieving Tailored Industrial Software Process Improvement with Experience Repositories and Electronic Process Guides. There is a well-recognised need for organisations to improve their software development processes in order to achieve higher software quality and greater efficiencies in development. The use of electronic process guides and experience repositories have been two technologies independently proposed to achieve these aims. This research will develop a framework, methods and tools ....Achieving Tailored Industrial Software Process Improvement with Experience Repositories and Electronic Process Guides. There is a well-recognised need for organisations to improve their software development processes in order to achieve higher software quality and greater efficiencies in development. The use of electronic process guides and experience repositories have been two technologies independently proposed to achieve these aims. This research will develop a framework, methods and tools to allow integration of experience repositories and electronic process guides to facilitate process tailoring, process improvement, and project management. The result will be significant improvements in software development productivity and quality.Read moreRead less
Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal healt ....Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal health monitoring. Embedded wireless communications software, however, is difficult to test and debug owing to the complexity of the operational environment and complications arising from the interplay between software and hardware. This project will develop an effective and automatic technology to alleviate these difficulties and achieve higher quality software.Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
A Generic Software Architecture for Web-Based Applications on Micro-Mobile Systems. The next generation of computers that will capture the imagination of the society are likely to be micro-mobile devices such as personal digital assistants, mobile phones, smartcards and chips embedded in home and office items. Developing applications for information processing using a wireless network of such devices is an emerging challenge. This project will develop and evaluate a generic architecture for web- ....A Generic Software Architecture for Web-Based Applications on Micro-Mobile Systems. The next generation of computers that will capture the imagination of the society are likely to be micro-mobile devices such as personal digital assistants, mobile phones, smartcards and chips embedded in home and office items. Developing applications for information processing using a wireless network of such devices is an emerging challenge. This project will develop and evaluate a generic architecture for web-based applications on micro-mobile devices. This will make it easy to design applications that can seamlessly interact with different kinds of devices. The project will be carried out in partnership with Total Internet Centre, a Newcastle based regional enterprise.Read moreRead less
Visual Analytics for Next Generation Sequencing. Next-generation sequencing technologies have brought a revolution in biology and healthcare, while taxing the ability of scientists and clinicians to identify and process relevant data, to make sense of it all and communicate it to others in a concise and meaningful way. This project aims to tackle this problem through fundamentally new approaches to data selection and visualisation at very large scale, actively encoding for insight into underlyin ....Visual Analytics for Next Generation Sequencing. Next-generation sequencing technologies have brought a revolution in biology and healthcare, while taxing the ability of scientists and clinicians to identify and process relevant data, to make sense of it all and communicate it to others in a concise and meaningful way. This project aims to tackle this problem through fundamentally new approaches to data selection and visualisation at very large scale, actively encoding for insight into underlying biological and biomedical processes, bringing sustainable discovery of new relationships and variations within the data. The project aims to support new approaches to medical diagnosis and treatment, and offer crucial lessons to address the broader challenge of understanding large, complex data sets.Read moreRead less
Privacy preservation for personalised smart devices. The goal of this project is to build a privacy preservation framework for personalised smart devices with both immediate and long-term applications in a range of industries. The novel theoretical contributions include a privacy-preservation mechanism that guards against attacks by intelligent tools, a model and metrics that distinguish between object detection and object recognition, and allowing users to specify their desired level of privacy ....Privacy preservation for personalised smart devices. The goal of this project is to build a privacy preservation framework for personalised smart devices with both immediate and long-term applications in a range of industries. The novel theoretical contributions include a privacy-preservation mechanism that guards against attacks by intelligent tools, a model and metrics that distinguish between object detection and object recognition, and allowing users to specify their desired level of privacy guarantee. Practically, these solutions have clear economic and public-safety benefits. The solutions will accelerate AI device development, advance smart technologies based on individual behaviours, and guarantee personal data privacy against both human attackers and adversarial algorithms. Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used b ....An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used by program analysers to identify faulty or insufficient security checks in the Java Class Library that may lead to the sandbox being bypassed.Read moreRead less
Design and deployment of practical anonymous access systems. This project aims to design, test and deploy a practical and highly secure anonymous access system for online businesses that offer services on a free trial basis. Currently, online businesses are unable to take advantage of feedback from customers during and after trial periods; nor do currently available mechanisms offer practical privacy protection to customers. The project expects to overcome these barriers by developing innovative ....Design and deployment of practical anonymous access systems. This project aims to design, test and deploy a practical and highly secure anonymous access system for online businesses that offer services on a free trial basis. Currently, online businesses are unable to take advantage of feedback from customers during and after trial periods; nor do currently available mechanisms offer practical privacy protection to customers. The project expects to overcome these barriers by developing innovative cryptographic solutions and security testing methods that will inform new protocol design and implementation, which will bring long-term benefits to online businesses and their customers. The project also aims to develop new, distributed ledger technology, which is a strategic technology trend. This will provide significant benefits such as a practical, reliable and highly secure anonymous access system for online businesses, in Australia and worldwide, that offer services on a free trial basis, which would enable these service providers to add value to and enhance their product offerings.Read moreRead less