Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and dece ....Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and decentralised nature of the Web, there is a need to establish a trust framework for selecting and composing Web services. The key parameter will be based on Web service reputation in delivering services.Read moreRead less
Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident ....Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident triage. Expected outcomes of the project include a set of novel methods and tools that can facilitate incident diagnosis and resolution. This project will provide significant benefits, such as improving the availability of software-intensive systems and reducing the economic loss caused by the incidents. Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Context-aware verification and validation framework for autonomous driving. This project aims to enhance the reliability and safety of emerging self-driving vehicles, through a framework that supports the validation and verification of autonomous driving systems. This project expects to generate new knowledge in areas of software engineering, intelligent transport, and machine learning, using a multi-disciplinary research combining expertise from various fields. Expected outcomes of this project ....Context-aware verification and validation framework for autonomous driving. This project aims to enhance the reliability and safety of emerging self-driving vehicles, through a framework that supports the validation and verification of autonomous driving systems. This project expects to generate new knowledge in areas of software engineering, intelligent transport, and machine learning, using a multi-disciplinary research combining expertise from various fields. Expected outcomes of this project are a family of new context-aware techniques to verify and validate complex behaviours in autonomous driving. This should provide significant benefits, such as safe autonomous driving systems and the improved journey experience and security for road users.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less