Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. Th ....Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. The success of this project will further enhance the international competitiveness of Australian research in this important field and will benefit any Australian industry and business where software systems are deeply-rooted, such as transportation, smart homes, medical devices, defence and finance.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Next generation garbage collection: discovery, design, and development. This project aims to improve the performance of programming languages used by millions of Australians every day, such as Java, JavaScript and PHP by developing improved memory-management algorithms. These languages use what is referred to as “garbage collection” to ensure memory is managed without data loss, but do so conservatively and consequently cause performance challenges and energy overheads. This project expects to p ....Next generation garbage collection: discovery, design, and development. This project aims to improve the performance of programming languages used by millions of Australians every day, such as Java, JavaScript and PHP by developing improved memory-management algorithms. These languages use what is referred to as “garbage collection” to ensure memory is managed without data loss, but do so conservatively and consequently cause performance challenges and energy overheads. This project expects to provide these languages with improved memory-management algorithms, and provides researchers and industry with a framework for innovation. This project will enable safe software that is more efficient on today's hardware and able to exploit emerging hardware. This project should lead to better performance and energy savings for server applications, phones, watches, and smart appliances, while ensuring memory safety.Read moreRead less
Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and wo ....Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and worldwide to reliably identify potential privacy risks and issues on their applications. The intended outcomes should endow data controllers with the capability of evidencing their compliance of data protection legislations such as Australia Privacy Act 1988 and EU General Data Protection Regulation (GDPR).Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE220100595
Funder
Australian Research Council
Funding Amount
$416,400.00
Summary
Efficient privacy-preserving proofs for secure e-government and e-voting. Electronic systems are becoming increasingly widespread and crucial to social and economic wellbeing. This project aims to ensure that e-government, e-health, e-commerce and e-voting are secure and trustworthy by inventing new ways to verify these systems without infringing privacy. This project expects to use innovative techniques from cryptography to support development of trustworthy systems. Expected outcomes of this p ....Efficient privacy-preserving proofs for secure e-government and e-voting. Electronic systems are becoming increasingly widespread and crucial to social and economic wellbeing. This project aims to ensure that e-government, e-health, e-commerce and e-voting are secure and trustworthy by inventing new ways to verify these systems without infringing privacy. This project expects to use innovative techniques from cryptography to support development of trustworthy systems. Expected outcomes of this project include better support for organisations to build trustworthy systems that will maximise benefit to Australian business and society. This should provide significant commercial, reputational, and societal benefits by avoiding disruptions to the organisations and their clients if and when they are attacked. Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less