Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal healt ....Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal health monitoring. Embedded wireless communications software, however, is difficult to test and debug owing to the complexity of the operational environment and complications arising from the interplay between software and hardware. This project will develop an effective and automatic technology to alleviate these difficulties and achieve higher quality software.Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
THE DEVELOPMENT OF MECHANISTIC MODELS FOR BUBBLY FLOWS WITH HEAT AND MASS TRANSFER. Commercially available CFD computer codes are currently widely used in many Australian industrial sectors. It is clearly recognised that the state-of-the-art models for dealing with complex bubbly flows with/without heat and mass transfer in these computer codes require further developments and improvements. This research project will address the prevalent deficiency in many of these computer codes. It is antici ....THE DEVELOPMENT OF MECHANISTIC MODELS FOR BUBBLY FLOWS WITH HEAT AND MASS TRANSFER. Commercially available CFD computer codes are currently widely used in many Australian industrial sectors. It is clearly recognised that the state-of-the-art models for dealing with complex bubbly flows with/without heat and mass transfer in these computer codes require further developments and improvements. This research project will address the prevalent deficiency in many of these computer codes. It is anticipated that through this major development of new models capable of predicting a wide range of industrial bubbly flow problems and implementation thereafter in these computer codes, industries will experience significant benefits especially reduce time and costs in their design and production.Read moreRead less
Experimental and Numerical Modelling of Gas-Liquid Flows. Multiphase flow systems are encountered in many process industries such as chemical, petroleum, mining, energy, food and pharmaceutical, which are fundamental to the Australian economy. Commercially available computer codes for simulating such systems are currently widely used in many Australian industrial sectors. This research project will address the prevalent deficiency in many of these computer codes and develop new models capable of ....Experimental and Numerical Modelling of Gas-Liquid Flows. Multiphase flow systems are encountered in many process industries such as chemical, petroleum, mining, energy, food and pharmaceutical, which are fundamental to the Australian economy. Commercially available computer codes for simulating such systems are currently widely used in many Australian industrial sectors. This research project will address the prevalent deficiency in many of these computer codes and develop new models capable of predicting a wide range of industrial bubbly flow problems. The resultant improved computer codes will provide industries with significant benefits - especially reduced times and costs in their design and production.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE140100061
Funder
Australian Research Council
Funding Amount
$1,000,000.00
Summary
FlashLite: A High Performance Machine for Data Intensive Science. FlashLite: a high performance machine for data intensive science: The 21st century has been described as the century of data. Experts predict an exponential growth in the amount of data that will be captured, generated and archived. Australia has made significant progress towards addressing some of the opportunities and infrastructure challenges posed by such rapid increase in data volumes. However, these investments do not addre ....FlashLite: A High Performance Machine for Data Intensive Science. FlashLite: a high performance machine for data intensive science: The 21st century has been described as the century of data. Experts predict an exponential growth in the amount of data that will be captured, generated and archived. Australia has made significant progress towards addressing some of the opportunities and infrastructure challenges posed by such rapid increase in data volumes. However, these investments do not address the growing need to process data. Conventional supercomputers are unable to meet the challenges of the data explosion. The large gap in latency and bandwidth between the processor, memory and disk subsystems means that the processor is often idle waiting to fetch data. This project will build a platform focussed on data intensive science.Read moreRead less
Sociophysical Interactions: understanding the role of social and tangible technologies in maintaining good habits into old age. How can technology help us 'age well'? The project will study, design and evaluate novel information systems that integrate and support social engagement and physical activity in order to build foundational knowledge about these technologies and maintain the opportunities for social engagement and physical activity in our ageing population.
Privacy preservation for personalised smart devices. The goal of this project is to build a privacy preservation framework for personalised smart devices with both immediate and long-term applications in a range of industries. The novel theoretical contributions include a privacy-preservation mechanism that guards against attacks by intelligent tools, a model and metrics that distinguish between object detection and object recognition, and allowing users to specify their desired level of privacy ....Privacy preservation for personalised smart devices. The goal of this project is to build a privacy preservation framework for personalised smart devices with both immediate and long-term applications in a range of industries. The novel theoretical contributions include a privacy-preservation mechanism that guards against attacks by intelligent tools, a model and metrics that distinguish between object detection and object recognition, and allowing users to specify their desired level of privacy guarantee. Practically, these solutions have clear economic and public-safety benefits. The solutions will accelerate AI device development, advance smart technologies based on individual behaviours, and guarantee personal data privacy against both human attackers and adversarial algorithms. Read moreRead less
An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used b ....An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used by program analysers to identify faulty or insufficient security checks in the Java Class Library that may lead to the sandbox being bypassed.Read moreRead less