Discovery Early Career Researcher Award - Grant ID: DE190100046
Funder
Australian Research Council
Funding Amount
$387,000.00
Summary
Fortifying our digital economy: advanced automated vulnerability discovery. This project aims to enable security researchers to detect critical vulnerabilities in large software systems with maximal efficiency, cost-effectively, and with known statistical accuracy. The aim is to develop advanced high-performance fuzzers that effectively thwart malware attacks, ransomware epidemics, and cyber terrorism by exposing security flaws before they can commence. The project will employ a well-established ....Fortifying our digital economy: advanced automated vulnerability discovery. This project aims to enable security researchers to detect critical vulnerabilities in large software systems with maximal efficiency, cost-effectively, and with known statistical accuracy. The aim is to develop advanced high-performance fuzzers that effectively thwart malware attacks, ransomware epidemics, and cyber terrorism by exposing security flaws before they can commence. The project will employ a well-established statistical framework utilised in ecology research to provide fundamental insights to boosting the efficiency of software vulnerability discovery, and on the trade-off between investing more resources and gaining better cyber security guarantees. As our reliance on new technologies is ever growing, this project equips Australia to curb cyber crime cost-effectively.Read moreRead less
Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Electro-Optical Primers for Safe Use and Clean Manufacturing. Conventional primers contain a mechanically-sensitive primary explosive that is used to detonate the more stable propellant in a bullet. This project aims to address the health and environmental impacts of heavy metals in current primers by replacing them with benign, electrically or optically activated silicon-based materials. Modern semiconductor fabrication techniques will be used to develop safe and clean primers through cost-effe ....Electro-Optical Primers for Safe Use and Clean Manufacturing. Conventional primers contain a mechanically-sensitive primary explosive that is used to detonate the more stable propellant in a bullet. This project aims to address the health and environmental impacts of heavy metals in current primers by replacing them with benign, electrically or optically activated silicon-based materials. Modern semiconductor fabrication techniques will be used to develop safe and clean primers through cost-effective doping and deposition protocols. The expected outcomes of the project include a sovereign primer manufacturing capability for Australia. This will provide a significant strategic advantage and health benefits for law enforcement and defence personnel during live fire training and firing range exercises.Read moreRead less
Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection ....Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection mandates on both immediate protection goals and the wider goals of peacekeeping. This project aims to assess the impact of the implementation of mandates to use force to protect civilians. Through a focused comparison of six missions, it plans to identify what works, what doesn't, and the factors which determine these outcomes in order to identify ways of improving performance in the future.Read moreRead less
Foundations for Physically Unclonable nano-Security on Silicon. This project aims to develop an on-chip physical unclonable function (PUF) based on recent progress in nanotechnology to generate unprecedented number of unique signatures. This is significant because these signatures can be used for preventing fraud and counterfeiting, protecting sensitive data and securing communications. PUFs will play an extremely vital role in future security systems. The PUF in the proposed project will be sim ....Foundations for Physically Unclonable nano-Security on Silicon. This project aims to develop an on-chip physical unclonable function (PUF) based on recent progress in nanotechnology to generate unprecedented number of unique signatures. This is significant because these signatures can be used for preventing fraud and counterfeiting, protecting sensitive data and securing communications. PUFs will play an extremely vital role in future security systems. The PUF in the proposed project will be simple, fast, tiny, energy efficient and highly secure as a result of the abundant nano-fabrication variations. The outcome of this project will be a prototype of a super high secure nanoelectronic-based PUF that will be tested to evaluate the technology and its security against malicious attacks.Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
Visualisation of latent DNA. This project aims to deliver a proof-of-concept that allows visualisation of invisible DNA (latent DNA) into a quick, inexpensive and practical DNA collection method that will lead to DNA evidence being available in more cases. It will build upon a proof-of-concept method ready for transferal to forensic casework. This will allow DNA evidence recovery technicians to improve their hit rate in recovering latent DNA from real crime items, leading to more informative DNA ....Visualisation of latent DNA. This project aims to deliver a proof-of-concept that allows visualisation of invisible DNA (latent DNA) into a quick, inexpensive and practical DNA collection method that will lead to DNA evidence being available in more cases. It will build upon a proof-of-concept method ready for transferal to forensic casework. This will allow DNA evidence recovery technicians to improve their hit rate in recovering latent DNA from real crime items, leading to more informative DNA profiles. Crime items that currently yield no genetic information will now be informative, assisting investigations of serious crimes or terrorist incidents.Read moreRead less