Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Re-engineering enterprise systems for microservices in the cloud. This project will enable automatic re-engineering of large enterprise applications to run in modern cloud environments as microservices. Microservices are the latest wave of service-based software, capable of exploiting the high performance and third-party integration opportunities made available through the cloud. The project will develop new techniques for analysing enterprise systems code and execution data, and making recommen ....Re-engineering enterprise systems for microservices in the cloud. This project will enable automatic re-engineering of large enterprise applications to run in modern cloud environments as microservices. Microservices are the latest wave of service-based software, capable of exploiting the high performance and third-party integration opportunities made available through the cloud. The project will develop new techniques for analysing enterprise systems code and execution data, and making recommendations for restructuring suitable parts as microservices. These microservices manage individual business objects via sets of lightweight distributed computational operations. The outcomes will support progressive evolution of an enterprise system, into distributed microservices running in public clouds, while still being integrated with "backend" systems.Read moreRead less
Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools ....Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools to facilitate government, companies, individuals, and organisations to enhance their information gathering and privacy-preserving capabilities. This is expected to enhance the credibility of the government and organisations and save the possible financial loss of companies and individuals.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detecti ....Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detection, and 3) finding unseen vulnerabilities. We therefore propose to use a series of new techniques such as efficient in-memory fuzzing, conditional formulas, and transfer learning to solve the above challenges. The project outcomes will help Australia gain cutting edge techniques in vulnerability detection. Read moreRead less
Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysi ....Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysis a monumental task. This project will provide advanced tools to detect fake website reviews and a cybersecurity system prototype ready to be used by industry, making Australia a leader in this field and resulting in a safer internet environment for all.Read moreRead less