Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Art in conflict: transforming contemporary art at Australian War Memorial. This project aims to investigate conflicts and compromises arising within official schemes for commissioning Australian contemporary war art, in partnership with the Australian War Memorial (AWM). The AWM has built on its Official War Artist scheme to transform the commissioning of war art, engaging high profile contemporary artists to produce often challenging work. This project will focus on this important yet under-res ....Art in conflict: transforming contemporary art at Australian War Memorial. This project aims to investigate conflicts and compromises arising within official schemes for commissioning Australian contemporary war art, in partnership with the Australian War Memorial (AWM). The AWM has built on its Official War Artist scheme to transform the commissioning of war art, engaging high profile contemporary artists to produce often challenging work. This project will focus on this important yet under-researched national collection of art, placing it at the centre of current discussions around contemporary art and war. The project seeks to continue to transform the AWM’s curatorial approaches and build an enduring digital archive of analysis and interpretation.Read moreRead less
Ambitious and Fair: Strategies for a sustainable visual arts sector. This project aims to strengthen the visual art industry’s economic ecosystem. In a context where artists’ incomes are low and falling, commercial galleries are financially vulnerable and public galleries face funding challenges, the project addresses barriers to the sector’s economic health and the challenge of improving artists’ incomes. To address this critical gap, the project will combine an analysis of current value chains ....Ambitious and Fair: Strategies for a sustainable visual arts sector. This project aims to strengthen the visual art industry’s economic ecosystem. In a context where artists’ incomes are low and falling, commercial galleries are financially vulnerable and public galleries face funding challenges, the project addresses barriers to the sector’s economic health and the challenge of improving artists’ incomes. To address this critical gap, the project will combine an analysis of current value chains and emergent forms of economic organisation with qualitative insights into the experiences of artists and arts professionals. It will propose interventions for arts industry and government policy to improve and develop this ecosystem. Benefits include improved incomes for arts workers and a sustainable arts industry.Read moreRead less
Empowering Australia’s Visual Arts via Creative Blockchain Opportunities. This project investigates the provision of a blockchain-based solution for protecting the intellectual property and provenance of visual art, and ways to empower its economic, cultural, and social value and benefits. By exploring innovative non-fungible token (NFT) opportunities in a global cyber security context, we will co-design a user-friendly and compliant tool for expanding the creation and movement of art on existin ....Empowering Australia’s Visual Arts via Creative Blockchain Opportunities. This project investigates the provision of a blockchain-based solution for protecting the intellectual property and provenance of visual art, and ways to empower its economic, cultural, and social value and benefits. By exploring innovative non-fungible token (NFT) opportunities in a global cyber security context, we will co-design a user-friendly and compliant tool for expanding the creation and movement of art on existing virtual galleries and smart contract-enabled platforms. Building on interdisciplinary synergies between creative and IT practices, we will interrogate the efficacy, risks and governance surrounding this global technology, and produce vital new knowledge for engaging with risks and opportunities in the digital economy.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Exploiting Geometries of Learning for Fast, Adaptive and Robust AI. This project aims to uniquely exploit geometric manifolds in deep learning to advance the frontier of Artificial Intelligence (AI) research and applications in cybersecurity and general cognitive tasks. It expects to develop new theories, algorithms, tools, and technologies for machine learning systems that are fast, adaptive, lifelong and robust, even with limited supervision. Expected outcomes will enhance Australia's capabili ....Exploiting Geometries of Learning for Fast, Adaptive and Robust AI. This project aims to uniquely exploit geometric manifolds in deep learning to advance the frontier of Artificial Intelligence (AI) research and applications in cybersecurity and general cognitive tasks. It expects to develop new theories, algorithms, tools, and technologies for machine learning systems that are fast, adaptive, lifelong and robust, even with limited supervision. Expected outcomes will enhance Australia's capability and competitiveness in AI, and deliver robust and trustworthy learning technology. The project should provide significant benefits not only in advancing scientific and translational knowledge but also in accelerating AI innovations, safeguarding cyberspace, and reducing the burden on defence expenses in Australia.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the infor ....SenShaMart: A Trusted Internet of Things Marketplace for Sensor Sharing. This project aims to devise a novel Internet of Things (IoT) sensor sharing marketplace that permits IoT applications to discover, integrate, and pay for any IoT sensor data that is made available by other parties. The project will devise highly-scalable sensor classification, query processing, and transactions solutions and incorporate them in a pair of novel blockchains that work in tandem to securely manage all the information and contracts needed by IoT applications to discover, integrate, pay, and use sensors provided by another parties. These IoT advancements will provide significant economic, environmental, and social benefits via making low-cost and immediate sensing available across the world.Read moreRead less