Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal healt ....Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal health monitoring. Embedded wireless communications software, however, is difficult to test and debug owing to the complexity of the operational environment and complications arising from the interplay between software and hardware. This project will develop an effective and automatic technology to alleviate these difficulties and achieve higher quality software.Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used b ....An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used by program analysers to identify faulty or insufficient security checks in the Java Class Library that may lead to the sandbox being bypassed.Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and ....Tuning parallel applications on software-defined supercomputers. Supercomputers are used by many Australian industries and laboratories to make better products and perform critical predictions, and it is essential that codes operate efficiently. This project aims to assist programmers in identifying performance bottlenecks in their code quickly and easily. The project expects to supersede the current methods, which are often complex and time-consuming, by developing innovative software tools and techniques. The expected outcomes include novel software, verified by industry partners in real world case studies, ranging from life sciences to hypersonic transport. This should provide significant benefits, including the capacity for Australian industries to access world-class supercomputing technology.Read moreRead less
Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new metho ....Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new methods for the automatic analysis of service interaction traces and the generation of accurate executable service models, without requiring explicit knowledge of them. The automatic analysis and generation should reduce development cost for enterprise IT systems and increase system quality and reliability. The new software deployment technologies from this project aim to significantly reduce the time, effort and cost of system quality assurance activities in software development organisations, and yet produce higher-quality software leading to uninterrupted business operation in end-user organisations across all sectors.Read moreRead less
Single cell imaging of trace elements by laser ablation - inductively coupled plasma - mass spectrometry. The precise mechanism of how many diseases function on the cellular level is not well understood. Trace elements are important to normal cellular function and have the potential to cause significant damage if delicate levels are disturbed. This project will introduce a new, cost-effective alternative to the synchrotron for mapping of trace elements in single cells. This breakthrough science ....Single cell imaging of trace elements by laser ablation - inductively coupled plasma - mass spectrometry. The precise mechanism of how many diseases function on the cellular level is not well understood. Trace elements are important to normal cellular function and have the potential to cause significant damage if delicate levels are disturbed. This project will introduce a new, cost-effective alternative to the synchrotron for mapping of trace elements in single cells. This breakthrough science will transform a common analytical instrument into a powerful new tool for probing the cellular mechanisms of chronic illness. This frontier technology will help determine the role of trace metals in the development of neurodegenerative disease.Read moreRead less
C4 - Open Services Architecture. The Internet has seen tremendous growth both in terms of usage and supporting infrastructure. This has resulted in new design problems, due to the heterogeneity of applications, networks, devices and the profile of the user population. The proposed solutions only address problems in isolation, and as a result stifle usability and deployment of the services that can be provided. This project aims to design an open services architecture that will overcome the probl ....C4 - Open Services Architecture. The Internet has seen tremendous growth both in terms of usage and supporting infrastructure. This has resulted in new design problems, due to the heterogeneity of applications, networks, devices and the profile of the user population. The proposed solutions only address problems in isolation, and as a result stifle usability and deployment of the services that can be provided. This project aims to design an open services architecture that will overcome the problems in a integrated fashion and enable the creation network support functions that can be used together and can be incrementally deployed to provide service any-time anywhere seamlessly.Read moreRead less
Privacy preservation for personalised smart devices. The goal of this project is to build a privacy preservation framework for personalised smart devices with both immediate and long-term applications in a range of industries. The novel theoretical contributions include a privacy-preservation mechanism that guards against attacks by intelligent tools, a model and metrics that distinguish between object detection and object recognition, and allowing users to specify their desired level of privacy ....Privacy preservation for personalised smart devices. The goal of this project is to build a privacy preservation framework for personalised smart devices with both immediate and long-term applications in a range of industries. The novel theoretical contributions include a privacy-preservation mechanism that guards against attacks by intelligent tools, a model and metrics that distinguish between object detection and object recognition, and allowing users to specify their desired level of privacy guarantee. Practically, these solutions have clear economic and public-safety benefits. The solutions will accelerate AI device development, advance smart technologies based on individual behaviours, and guarantee personal data privacy against both human attackers and adversarial algorithms. Read moreRead less
Virtual Collaborative Logistics and Partner to Partner Information Systems. Increasingly there is a tendency around the world for logistics companies that provide transport and warehousing services to band together to share their physical resources so they can extend their reach beyond their current region of operation. When this is coupled with internet ordering and status monitoring one has an e-logistics company that is a virtual logistics provider that gives access to these shared resources ....Virtual Collaborative Logistics and Partner to Partner Information Systems. Increasingly there is a tendency around the world for logistics companies that provide transport and warehousing services to band together to share their physical resources so they can extend their reach beyond their current region of operation. When this is coupled with internet ordering and status monitoring one has an e-logistics company that is a virtual logistics provider that gives access to these shared resources. Such a virtual collaborative logistics consortium requires very strong partner-to-partner IT support and communication. This project investigates the use of XML (Extensible Mark-up Language) enabled mobile software agents to provide this support.Read moreRead less