Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Surviving the data deluge: Scalable feature extraction, discrimination and analysis for computer vision tasks using compressed sensed data. Strategically, our pioneering solutions besides being technically and socially significant, open fresh options for sensor-agnostic data analysis. The technical significance lies through the creation of new technologies for the critical national and global security markets, currently overwhelmed by data. The social significance arises from our solutions being ....Surviving the data deluge: Scalable feature extraction, discrimination and analysis for computer vision tasks using compressed sensed data. Strategically, our pioneering solutions besides being technically and socially significant, open fresh options for sensor-agnostic data analysis. The technical significance lies through the creation of new technologies for the critical national and global security markets, currently overwhelmed by data. The social significance arises from our solutions being privacy preserving, providing new avenues for the production of novel, socially acceptable products for aged care monitoring. Our methods spearhead future advancement in diverse disciplines due to the wide applicability of the methods to other sensor networks (Square Kilometre Array) and data types, providing new frameworks for addressing crucial problems of data management. Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Industrial Transformation Research Hubs - Grant ID: IH210100001
Funder
Australian Research Council
Funding Amount
$2,062,428.00
Summary
ARC Research Hub for Nutrients in a Circular Economy (NiCE). Urban utilities are in need to design resilient wastewater infrastructure to tackle the pressures of urban intensification, waterways pollution and climate change. This Hub aims to transform the wastewater industry with an unprecedented, city-scale circular economy of nutrients based on urine separation and processing at building level, to produce safe and effective liquid fertilisers. By engaging with stakeholders across the value cha ....ARC Research Hub for Nutrients in a Circular Economy (NiCE). Urban utilities are in need to design resilient wastewater infrastructure to tackle the pressures of urban intensification, waterways pollution and climate change. This Hub aims to transform the wastewater industry with an unprecedented, city-scale circular economy of nutrients based on urine separation and processing at building level, to produce safe and effective liquid fertilisers. By engaging with stakeholders across the value chain, this Hub expects to bring two urine processing technologies to commercial readiness, and to produce new regulations and business models for the circular economy. This will add resilience to the wastewater and urban farming industries, and will create market opportunities for new Australian technologies.Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Wavelet approaches for solving nonlinear dynamic systems in process engineering. The success of the proposed project will enable us to obtain more accurate numerical solutions for the nonlinear dynamical systems arising from process engineering. This ensures the potential for understanding and optimising industrial and engineering processes. Hence, a wide range of processing industries in Australia, such as agricultural chemicals, mineral processing, food, detergents, pharmaceuticals, ceramics ....Wavelet approaches for solving nonlinear dynamic systems in process engineering. The success of the proposed project will enable us to obtain more accurate numerical solutions for the nonlinear dynamical systems arising from process engineering. This ensures the potential for understanding and optimising industrial and engineering processes. Hence, a wide range of processing industries in Australia, such as agricultural chemicals, mineral processing, food, detergents, pharmaceuticals, ceramics and specialty chemicals will benefit from the results of this project. This will ensure globally competitive production and, therefore, greater contributions to the Australian economy.Read moreRead less
A deep survey for compact structure in the nearby universe: key science for the upgraded Australian Long Baseline Array. This project uses advances in ICT to build a national and international network of facilities that includes existing telescopes primarily on the east coast of Australia, as well as planned facilities in Western Australia and New Zealand. One of these facilities, the New Technology Demonstrator, is a crucial part of Australia's roadmap to the Square Kilometre Array. The SKA-r ....A deep survey for compact structure in the nearby universe: key science for the upgraded Australian Long Baseline Array. This project uses advances in ICT to build a national and international network of facilities that includes existing telescopes primarily on the east coast of Australia, as well as planned facilities in Western Australia and New Zealand. One of these facilities, the New Technology Demonstrator, is a crucial part of Australia's roadmap to the Square Kilometre Array. The SKA-related science and technology demonstrations we will undertake as part of this project will contribute to Australia's bid to host this $US1b instrument. This project cements a significant Trans-Tasman collaboration and brings together researchers in astrophysics and ICT to give Australia a leading position in the field of eVLBI.Read moreRead less