Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and ....Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and an industrial-strength open-source framework that can significantly raise the bar on mobile software quality and security for Android, the dominant smartphone platform accounting a current market share at 87.0% with 2.9 million apps at Google Play in December 2019.Read moreRead less
Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
Resource Allocation for High-Volume Streaming Data in Data Centers. Almost all chip vendors are producing new hardware accelerators by combining several units into a single main-board, and therefore making the execution of parallel and distributed run-time primitives not efficient/scalable. This project aims to develop innovative ways to building incremental and iterative computations over massive data sets in a cluster of heterogeneous systems. This will provide a significant reduction of perfo ....Resource Allocation for High-Volume Streaming Data in Data Centers. Almost all chip vendors are producing new hardware accelerators by combining several units into a single main-board, and therefore making the execution of parallel and distributed run-time primitives not efficient/scalable. This project aims to develop innovative ways to building incremental and iterative computations over massive data sets in a cluster of heterogeneous systems. This will provide a significant reduction of performance bottlenecks when running heavily distributed data-driven applications. Expected outcomes will include resource management algorithms that optimise performance at large scale. The project will benefit many areas, including running stateful iterative stream-based data-analysis applications in data centres. Read moreRead less
Shape4D: Modelling the Spatiotemporal Deformation Patterns in 3D Shapes. This research will develop new mathematical methods and algorithms that will enable the use of population-level longitudinal studies to model the spatial and temporal deformation patterns in 3D biological objects. Using novel geometric and deep learning techniques, it will create new methods that will allow the characterization of how the 3D shape of objects deforms with ageing, disease progression and interaction with thei ....Shape4D: Modelling the Spatiotemporal Deformation Patterns in 3D Shapes. This research will develop new mathematical methods and algorithms that will enable the use of population-level longitudinal studies to model the spatial and temporal deformation patterns in 3D biological objects. Using novel geometric and deep learning techniques, it will create new methods that will allow the characterization of how the 3D shape of objects deforms with ageing, disease progression and interaction with their environment, and the simulation of spatiotemporal deformations in anatomical organs. Benefits include a better understanding of growth processes, predictive models of how degenerative diseases progress and a computational framework that will assist in designing proper mitigation and intervention strategies.Read moreRead less
Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident ....Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident triage. Expected outcomes of the project include a set of novel methods and tools that can facilitate incident diagnosis and resolution. This project will provide significant benefits, such as improving the availability of software-intensive systems and reducing the economic loss caused by the incidents. Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic groupin ....Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic grouping recombination model. The project outcomes will be beneficial to applications in the nation as it incorporates new privacy constraints and utility requirements raised by emerging technologies to enable better protection of sensitive information and maximal data utility in outsourced systems. Read moreRead less
Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory an ....Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory and informed decision-making. This provides significant benefits of not only placing Australia in the forefront of exploiting multimodal user behaviour big data in dynamic e-commerce but also transforming Australian government and businesses to intelligent and contextual services adaptive to complex situations.Read moreRead less
Adversarial Learning of Hybrid Representation. This project aims to design and implement a foundational deep representation learning framework for early detection, classification and defense of emerging malware by capturing their underlying behaviours via structured and unstructured heterogeneous information through hybrid representation learning, behaviour graph mining, and symbolic adversarial learning to discover and defend unknown malware families, thereby significantly boosting the accuracy ....Adversarial Learning of Hybrid Representation. This project aims to design and implement a foundational deep representation learning framework for early detection, classification and defense of emerging malware by capturing their underlying behaviours via structured and unstructured heterogeneous information through hybrid representation learning, behaviour graph mining, and symbolic adversarial learning to discover and defend unknown malware families, thereby significantly boosting the accuracy and robustness of existing classifiers and detectors. The resulting representation learning framework will enhance the national security to protect user privacy, reducing the multi-million-dollar loss caused by fraudulent transactions, and defending against cyber attacks.Read moreRead less