Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is sig ....Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is significant because it is expected to automate most of the tedious and complex activities of on-line transactions. The main outcome will be a set of techniques and programs that will form the basis of the commercial software, with a significant export potential.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0667981
Funder
Australian Research Council
Funding Amount
$200,000.00
Summary
Kangaroo Genome Resource Management Facility. Increasingly, large Australian multicentre research programs in biological and medical sciences have a genomics component that involves integration of biological information with sequencing data. The success of these research programs depends on rapid internet access to the research information by all participating scientists. The universal design of the proposed information management system means that it can be easily adapted to support a broad ran ....Kangaroo Genome Resource Management Facility. Increasingly, large Australian multicentre research programs in biological and medical sciences have a genomics component that involves integration of biological information with sequencing data. The success of these research programs depends on rapid internet access to the research information by all participating scientists. The universal design of the proposed information management system means that it can be easily adapted to support a broad range of research programs. The development of this software program therefore has the potential to benefit research scientists, academics and students in many related fields, as well as the broader community, through enhancing research outcomes.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
An Integrated Infrastructure for Dynamic and Large Scale Supply Chain. Efficient and scalable middlewares are an important part of our current competitive economy. This is particularly important in Australia where production and population centres are spread over large distances. As a result, inefficiencies in web-based disparate businesses are likely to have a strong impact on the national economy. This project will provide an integrated framework and solutions to urgently needed integration ....An Integrated Infrastructure for Dynamic and Large Scale Supply Chain. Efficient and scalable middlewares are an important part of our current competitive economy. This is particularly important in Australia where production and population centres are spread over large distances. As a result, inefficiencies in web-based disparate businesses are likely to have a strong impact on the national economy. This project will provide an integrated framework and solutions to urgently needed integration problems faced by current industries. The development of a reliable and flexible infrastructure will benefit small and medium-scale enterprises, as they will be able to participate in large-scale supply chains and expand their business, without having to invest in expensive new computer systems and software.Read moreRead less
Designing an Efficient and Scalable Infrastructure for Mobile Web Services. Mobile services (M-Services) are rapidly growing due to enormous proliferation of web services and of the wireless networks. However, because of the high dynamic nature of the Internet as well as the specific requirements of mobile environments, existing M-services have limitations as they lack support for flexible transactions. The aim of this project is to design an efficient mobile transaction-based infrastructure to ....Designing an Efficient and Scalable Infrastructure for Mobile Web Services. Mobile services (M-Services) are rapidly growing due to enormous proliferation of web services and of the wireless networks. However, because of the high dynamic nature of the Internet as well as the specific requirements of mobile environments, existing M-services have limitations as they lack support for flexible transactions. The aim of this project is to design an efficient mobile transaction-based infrastructure to support highly adaptable M-Services. This infrastructure will provide robust and efficient management of business transactions across different enterprises. The outcomes of this project will include a set of advanced techniques and algorithms that will form the basis of the next generation of mobile web services.Read moreRead less
Designing a Scalable and Robust Infrastructure for Highly Dynamic Web Services. Web services are modular Internet-based applications that communicate with one another over the Internet. However, because of the high dynamic nature of the Internet, existing web services have profound limitations as they lack the support of semantic-based service discovery and dynamic service composition. This project aims at designing a robust and scalable infrastructure to support highly dynamic web services. Thi ....Designing a Scalable and Robust Infrastructure for Highly Dynamic Web Services. Web services are modular Internet-based applications that communicate with one another over the Internet. However, because of the high dynamic nature of the Internet, existing web services have profound limitations as they lack the support of semantic-based service discovery and dynamic service composition. This project aims at designing a robust and scalable infrastructure to support highly dynamic web services. This infrastructure will provide an adaptive e-business platform enabling optimal integration of enterprise' complex business processes across external systems and third party applications. The outcomes will be a set of advanced techniques and algorithms that will form the basis of the next generation of e-business solutions.Read moreRead less
Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detecti ....Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detection, and 3) finding unseen vulnerabilities. We therefore propose to use a series of new techniques such as efficient in-memory fuzzing, conditional formulas, and transfer learning to solve the above challenges. The project outcomes will help Australia gain cutting edge techniques in vulnerability detection. Read moreRead less