Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. Th ....Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. The success of this project will further enhance the international competitiveness of Australian research in this important field and will benefit any Australian industry and business where software systems are deeply-rooted, such as transportation, smart homes, medical devices, defence and finance.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Ownership-based Alias Analysis for Securing Unsafe Rust Programs. This project aims to develop an ownership-based alias analysis as a complement to Rust's ownership type system for improving Rust's memory safety. This project, therefore, expects to deliver an alias analysis foundation that can provide stronger memory safety guarantees than the state-of-the-art in detecting memory-safety violations and security vulnerabilities in real-world Rust programs that use unsafe language features. The exp ....Ownership-based Alias Analysis for Securing Unsafe Rust Programs. This project aims to develop an ownership-based alias analysis as a complement to Rust's ownership type system for improving Rust's memory safety. This project, therefore, expects to deliver an alias analysis foundation that can provide stronger memory safety guarantees than the state-of-the-art in detecting memory-safety violations and security vulnerabilities in real-world Rust programs that use unsafe language features. The expected outcomes are a deployable ownership-based alias analysis in the Rust compiler and an industrial-strength open-source framework. These outcomes are expected to provide significant benefits in improving software quality and security in Rust, an emerging language that offers both performance and safety.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
What Can You Trust in the Large and Noisy Web? This project will develop innovative techniques to efficiently and effectively distill truthful information from the inherently unreliable and large-scale Web environment, where misinformation has been widely regarded as a grand challenge for the next decade. The results of this project will not only maintain Australia’s leadership in this frontier research area, but also support many important applications that safeguard Australian people and econo ....What Can You Trust in the Large and Noisy Web? This project will develop innovative techniques to efficiently and effectively distill truthful information from the inherently unreliable and large-scale Web environment, where misinformation has been widely regarded as a grand challenge for the next decade. The results of this project will not only maintain Australia’s leadership in this frontier research area, but also support many important applications that safeguard Australian people and economy such as emergency and disaster management and online healthcare. This project also serves as an excellent vehicle for the education and training of Australia’s next generation of scholars and engineers.Read moreRead less
Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysi ....Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysis a monumental task. This project will provide advanced tools to detect fake website reviews and a cybersecurity system prototype ready to be used by industry, making Australia a leader in this field and resulting in a safer internet environment for all.Read moreRead less
Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and ....Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and an industrial-strength open-source framework that can significantly raise the bar on mobile software quality and security for Android, the dominant smartphone platform accounting a current market share at 87.0% with 2.9 million apps at Google Play in December 2019.Read moreRead less