Cybersecurity ethics training simulations for values-based decision-making. This Project will investigate ways to train reflective ethical decision making in cybersecurity management through the design of interactive social simulations. The Project will advance understanding and management of human factors in cybersecurity breaches and the field of serious game design for cybersecurity training by using new techniques for building artificially intelligent virtual agents, drawing on interdiscipli ....Cybersecurity ethics training simulations for values-based decision-making. This Project will investigate ways to train reflective ethical decision making in cybersecurity management through the design of interactive social simulations. The Project will advance understanding and management of human factors in cybersecurity breaches and the field of serious game design for cybersecurity training by using new techniques for building artificially intelligent virtual agents, drawing on interdisciplinary expertise in ethics, artificial intelligence and serious game design. Expected outcomes of the Project include a new framework and technologies for cybersecurity training. This should provide significant benefits through deeper understanding of the ethical impact of new cybertechnologies and training solutions.Read moreRead less
Unleashing the potential of VR: reducing sickness in head-mounted displays. Virtual reality (VR) is a breakthrough technology with a host of applied uses. Unfortunately, many people become sick when using head-mounted displays (HMDs). Our project proposes, and aims to test, a new theory of this cybersickness. We intend to quantify the sensory conflicts produced by HMD VR for the first time and measure their effects on perception, eye-movements, balance and well-being. The project will 1) determi ....Unleashing the potential of VR: reducing sickness in head-mounted displays. Virtual reality (VR) is a breakthrough technology with a host of applied uses. Unfortunately, many people become sick when using head-mounted displays (HMDs). Our project proposes, and aims to test, a new theory of this cybersickness. We intend to quantify the sensory conflicts produced by HMD VR for the first time and measure their effects on perception, eye-movements, balance and well-being. The project will 1) determine the causes of, and conditions responsible for, cybersickness; and 2) offer practical information on how to prevent it. These outcomes are expected to directly benefit, and greatly improve HMD use in, fields ranging from defence, education, entertainment, gaming, medicine, real estate, simulation training and tourism.Read moreRead less
Mapping the Effectiveness of Automated Software Testing. This project aims to help software engineers build complex software systems in far more reliable and cost-effective ways. It takes an interdisciplinary approach by applying machine learning techniques to automatically test complex software systems. Expected outcomes include a novel methodology for assessing the strengths and weaknesses of test suites generated by automated software testing techniques and the approaches required for generat ....Mapping the Effectiveness of Automated Software Testing. This project aims to help software engineers build complex software systems in far more reliable and cost-effective ways. It takes an interdisciplinary approach by applying machine learning techniques to automatically test complex software systems. Expected outcomes include a novel methodology for assessing the strengths and weaknesses of test suites generated by automated software testing techniques and the approaches required for generating high-quality test cases. Such advances are urgently needed to avoid disasters when deploying software systems in the real world.Read moreRead less
Australian Laureate Fellowships - Grant ID: FL190100035
Funder
Australian Research Council
Funding Amount
$3,009,457.00
Summary
Human-centric Model-driven Software Engineering. This project aims to find fundamentally new ways to capture and use human-centric software requirements during model-driven software engineering and verifying that systems meet these requirements. There are major issues with misaligned software applications in terms of accessibility, usability, emotions, personality, age, gender, and culture. This project aims to address these through new conceptual foundations and modelling techniques for their s ....Human-centric Model-driven Software Engineering. This project aims to find fundamentally new ways to capture and use human-centric software requirements during model-driven software engineering and verifying that systems meet these requirements. There are major issues with misaligned software applications in terms of accessibility, usability, emotions, personality, age, gender, and culture. This project aims to address these through new conceptual foundations and modelling techniques for their support during software engineering. The intended outcomes are enhanced theory, models, tools and capability for next-generation software engineering with these critical elements. Significant benefits are expected to include greatly improved software quality, developer productivity and cost savings.Read moreRead less
Values-oriented Defect Fixing for Mobile Software Applications. This project aims to address critical problems with mobile applications that exhibit human values-based defects, by advancing our understanding, detection and fixing of such defects. Many mobile apps do not operate according to the essential values of their human users - e.g. inclusivity, accessibility, privacy, ethical behaviour, due care, emotions, etc - making them ineffective, underused, unfit for purpose or even dangerous. Exp ....Values-oriented Defect Fixing for Mobile Software Applications. This project aims to address critical problems with mobile applications that exhibit human values-based defects, by advancing our understanding, detection and fixing of such defects. Many mobile apps do not operate according to the essential values of their human users - e.g. inclusivity, accessibility, privacy, ethical behaviour, due care, emotions, etc - making them ineffective, underused, unfit for purpose or even dangerous. Expected outcomes include new theories, techniques and prototype tools for developers and end users to detect and help fix values-based defects in mobile apps. Benefits include better, safer mobile apps for people and organisations and improved app developer productivity and competitiveness.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE220101057
Funder
Australian Research Council
Funding Amount
$424,140.00
Summary
Practical Automated Software Bug Fixing via Syntactic and Semantic Analyses. This proposal aims to advance the practical adoption of automated software bug repair, which has recently been adopted by industry, e.g., Facebook. It will produce novel methods that use mining software repositories, program analysis, and human-guided search to help automated repair to scale and be accurate. Expected outcomes include a publicly available automated bug repair framework. This project will help the softwar ....Practical Automated Software Bug Fixing via Syntactic and Semantic Analyses. This proposal aims to advance the practical adoption of automated software bug repair, which has recently been adopted by industry, e.g., Facebook. It will produce novel methods that use mining software repositories, program analysis, and human-guided search to help automated repair to scale and be accurate. Expected outcomes include a publicly available automated bug repair framework. This project will help the software industry deliver to users high quality software with improved reliability and safety, and increase education quality for students learning to code via automated feedback generation.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not o ....Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not only practical solutions for protecting sensitive data recorded in blockchain but also crucial techniques to make the blockchain accountable for practical applications with enhanced security. This project provides significant benefits, such as building a trusted environment for sensitive transactions in the digital economy.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less