Centre for Research on Engineering Software Technologies

CREST

Helping industries, governments, and societies to build human- as well as technological-based competencies in software systems engineering.

Engineering Secure Software-intensive Systems: Principles and Practices

Engineering Secure Software-intensive Systems: Principles and Practices

At CREST researchers are leveraging existing software engineering, analytical reasoning, natural language processing and machine learning tools and techniques to develop a secure and integrated platform. Our aim is to help build a secure and integrated platform that is easy to use and evolve with the changing threat landscape and increase the operation efficiency of the cybersecurity team.

Cyber Security Analytics and Automation

Within the area of AI for cybersecurity, CREST researchers leverage the application of AI such as machine learning, deep learning and natural language processing for automated security data such as logfile, threat intelligence reports, security tool documentation analysis, phishing detection, data theft detection and so on. The aim is to design, develop and deploy AI-based automation in security to minimize and assist the human efforts. As the potential of AI is being explored to boost cyber security, it is also being used by hackers. Hence, the vision is to come up with AI-powered solutions with a mix of traditional methods and AI to stay on top of cyber security strategy with automated security data and documentation analysis.

Cyber Security Analytics and Automation
Infrastructure Security and Automation

Infrastructure Security and Automation

Researchers at CREST leverage various artificial intelligence approaches to develop tools and techniques to better understand the developers’ viewpoint on security while adopting container technologies in industry. We study a large volume of container-related data in open source software repositories (GitHub), Question/Answering Platforms (Stack Overflow, Docker Forum) as well as container image repositories (Docker Hub) to find and analyse the security issues. This research will help container developers and researchers to understand container security requirements and provide a broad view of possible security attacks and risks.

Distributed Ledger and Its Engineering

The last decade has witnessed the proliferation of data collection and artificial intelligence in our daily lives. Technological advances under the Internet of Things moniker have extended the scope of data collection beyond our interactions with the digital world to cover real-world phenomena. The next evolution would emerge when intelligent machines can coordinate to carry out complex processes with minimal human involvement.

Distributed Ledger and Its Engineering
CASE STUDIES

Proud projects make us excel

Metrics Recommendation for Cyber Common Operating Picture

Cyber Common Operating Picture (CCOP) comprises security metrics that reflect the cyber-health of an organization with respect to its…

AI Assistant for Cyber Common Operating Picture

Cyber Common Operating Picture (CCOP) comprises a set of metrics, coming from different security intelligence sources. One of the current…

Modelling Support for Security of Operational Activities of C3I System

Command, Control, Communication, and Intelligence (C3I) system is a kind of System of Systems (SoS) that is increasingly leveraging ICT…

Blockchain Network Prototyping Framework

As blockchain technology mature, private blockchain network deployment has become increasingly feasible and desirable, especially for…

Blockchain Network Design Space

Blockchain technologies have been increasingly adopted by enterprises to increase operational efficiency and enable new business models…

Blockchain - Internet of Things Integration Survey

Recent years have witnessed the emergence of the Internet of Things (IoT) systems that incorporate blockchain (BC) elements in their…

Blockchain-enabled Internet of Things Testbed

Research and development activities in the Internet of Things domain are intrinsically linked to the physical world. They rely on the…

Collaborative Cyber Common Operating Picture

Common Operational Pictures (COPs) have been used in the military domain as a powerful tool for gaining Situational Awareness (SA) and thus…

Metrics Recommendation for Cyber Common Operating Picture

Cyber Common Operating Picture (CCOP) comprises security metrics that reflect the cyber-health of an organization with respect to its…

AI Assistant for Cyber Common Operating Picture

Cyber Common Operating Picture (CCOP) comprises a set of metrics, coming from different security intelligence sources. One of the current…

Modelling Support for Security of Operational Activities of C3I System

Command, Control, Communication, and Intelligence (C3I) system is a kind of System of Systems (SoS) that is increasingly leveraging ICT…

Blockchain Network Prototyping Framework

As blockchain technology mature, private blockchain network deployment has become increasingly feasible and desirable, especially for…

Blockchain Network Design Space

Blockchain technologies have been increasingly adopted by enterprises to increase operational efficiency and enable new business models…

Blockchain - Internet of Things Integration Survey

Recent years have witnessed the emergence of the Internet of Things (IoT) systems that incorporate blockchain (BC) elements in their…

Twitter & NEWS

Interesting News From our group

    CREST has collaboration with government and industry.

    Our Key Collaborators

    Defence Industry & Innovation
    Defence Industry & Innovation
    Cyber Security CRC
    Cyber Security CRC
    CSIRO
    CSIRO
    SA
    SA
    Department of Defence
    Department of Defence
    Defence Industry & Innovation
    Defence Industry & Innovation
    Cyber Security CRC
    Cyber Security CRC
    CSIRO
    CSIRO
    SA
    SA
    Department of Defence
    Department of Defence
    Defence Industry & Innovation
    Defence Industry & Innovation
    Cyber Security CRC
    Cyber Security CRC
    CSIRO
    CSIRO
    SA
    SA
    Department of Defence
    Department of Defence