Cybersecurity ethics training simulations for values-based decision-making. This Project will investigate ways to train reflective ethical decision making in cybersecurity management through the design of interactive social simulations. The Project will advance understanding and management of human factors in cybersecurity breaches and the field of serious game design for cybersecurity training by using new techniques for building artificially intelligent virtual agents, drawing on interdiscipli ....Cybersecurity ethics training simulations for values-based decision-making. This Project will investigate ways to train reflective ethical decision making in cybersecurity management through the design of interactive social simulations. The Project will advance understanding and management of human factors in cybersecurity breaches and the field of serious game design for cybersecurity training by using new techniques for building artificially intelligent virtual agents, drawing on interdisciplinary expertise in ethics, artificial intelligence and serious game design. Expected outcomes of the Project include a new framework and technologies for cybersecurity training. This should provide significant benefits through deeper understanding of the ethical impact of new cybertechnologies and training solutions.Read moreRead less
Unleashing the potential of VR: reducing sickness in head-mounted displays. Virtual reality (VR) is a breakthrough technology with a host of applied uses. Unfortunately, many people become sick when using head-mounted displays (HMDs). Our project proposes, and aims to test, a new theory of this cybersickness. We intend to quantify the sensory conflicts produced by HMD VR for the first time and measure their effects on perception, eye-movements, balance and well-being. The project will 1) determi ....Unleashing the potential of VR: reducing sickness in head-mounted displays. Virtual reality (VR) is a breakthrough technology with a host of applied uses. Unfortunately, many people become sick when using head-mounted displays (HMDs). Our project proposes, and aims to test, a new theory of this cybersickness. We intend to quantify the sensory conflicts produced by HMD VR for the first time and measure their effects on perception, eye-movements, balance and well-being. The project will 1) determine the causes of, and conditions responsible for, cybersickness; and 2) offer practical information on how to prevent it. These outcomes are expected to directly benefit, and greatly improve HMD use in, fields ranging from defence, education, entertainment, gaming, medicine, real estate, simulation training and tourism.Read moreRead less
Individualisation for 3D Audio. The project aim is to allow the general listener to enjoy high-fidelity 3-D sound over headphones. Such 3-D audio is of paramount importance when inter-personal communication requires situational awareness, (eg search and rescue, fire-fighting, and air traffic control). To achieve this, the project aims to address one of the toughest problems in audio signal processing: deriving high-fidelity 3-D audio headphone filters from photos and/or 3D scans of ears. The pro ....Individualisation for 3D Audio. The project aim is to allow the general listener to enjoy high-fidelity 3-D sound over headphones. Such 3-D audio is of paramount importance when inter-personal communication requires situational awareness, (eg search and rescue, fire-fighting, and air traffic control). To achieve this, the project aims to address one of the toughest problems in audio signal processing: deriving high-fidelity 3-D audio headphone filters from photos and/or 3D scans of ears. The project plans to address fundamental research questions in statistical shape and data analysis and to perceptually evaluate the 3-D audio methods developed.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related soc ....The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related social networks. The framework will be created by identifying heterogeneous information, modelling individual behaviour patterns and designing erasure policies. The outcomes of the project can be used by the government to provide privacy guarantees to Australian cyberspace and by industry to protect their clients’ privacy.Read moreRead less
Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate ....Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate the privacy concerns of people using online tools that require providing personal information.Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and ....Detecting Asynchronous Event-Driven Order Violations in Android Apps. This project aims to develop an event-interleaving analysis for detecting asynchronous event-driven order violations in Android apps. This project therefore expects to deliver a program analysis foundation that can provide stronger security guarantees than the state of the art against advanced exploits that abuse such asynchronous vulnerabilities. The intended outcomes of this project are a new program analysis technology and an industrial-strength open-source framework that can significantly raise the bar on mobile software quality and security for Android, the dominant smartphone platform accounting a current market share at 87.0% with 2.9 million apps at Google Play in December 2019.Read moreRead less
Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Austra ....Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Australia to the front line of the research field, and protect Australia better. Read moreRead less
Dynamics and control of complex social networks. This project aims to understand the extent to which a given complex social network can be controlled and how different control mechanisms influence network structure and dynamics. There is a great interest in controlling complex networks including social networks as it might contribute to solving important societal challenges. Using gender imbalance, minority marginalisation, and criminal behaviour as case studies, this project will investigate t ....Dynamics and control of complex social networks. This project aims to understand the extent to which a given complex social network can be controlled and how different control mechanisms influence network structure and dynamics. There is a great interest in controlling complex networks including social networks as it might contribute to solving important societal challenges. Using gender imbalance, minority marginalisation, and criminal behaviour as case studies, this project will investigate the direction of networks controllability and mechanisms that would enable alteration of the network in a desired way. This project will have an impact on our current understanding of network's behaviour, and will contribute to solving a range of societal challenges.Read moreRead less