Top of page
Global Site Navigation

School of Computer and Security Science

Local Section Navigation
You are here:
ECU is currently converting this web content to a more mobile friendly format. If you find the content below is not formatting correctly during this transition please view on desktop browser.
Main Content

Professor Craig Valli

Director, ECU Security Research Institute

Contact Information Telephone: (61 8) 6304 5109, Mobile: 0447 853 517, Email: c.valli@ecu.edu.au, Campus: Joondalup, Room: JO23.306
Staff Member Details
Telephone: (61 8)  6304 5109  
Mobile: 0447 853 517  
Email: c.valli@ecu.edu.au   
Campus: Joondalup  
Room: JO23.306  

 

Craig is the Director of the ECU Security Research Institute and Professor (Digital Forensics) within the School of Computer and Security Science.

Background

Craig has over 25 years experience in the IT Industry and consults to industry and government on network security and digital forensics issues. His main research and consultancy is focussed on securing networks and critical infrastructures, detection of network borne threats and forensic analysis of cyber security incidents. Craig is a Fellow of the Australian Computer Society.

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association 

Awards and Recognition

National and International Awards

  • 2010 WAITTA - IT Achiever of the Year Award
  • 2010 Inventor of the Year Award Finalist

Research Areas and Interests

  • Network Security and Forensics, Honeypots, Intrusion Detection Systems, Internet Misuse, Compute Clustering (Beowulf), Computer Forensics, Wireless Security and SCADA Security

Staff Qualifications

  • Bachelor of Education, Edith Cowan University .
  • Master, Edith Cowan University .
  • Doctorate, Edith Cowan University, 2004 .
  • Diploma of Teaching, Western Australian CAE, 1985 .

Research

Recent Research Grants

  • Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582,  European Commission,  Grant - Seventh Framework Programme (FP7),  2012 - 2015,  $223,800.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $557,425.
  • Scalable Measures for Automated Recognition Technologies (SMART),  European Union,  EU Seventh Framework Program,  2010,  $389,772.
  • Small Medium Enterprise Cyber Security Engagement (SMESEC) - Project Pilot,  City of Wanneroo,  Grant,  2013 - 2014,  $21,908.
  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN),  Griffith University,  Grant - NIRAP,  2010 - 2012,  $37,139.
  • CRC for Cyber Security (CyberCRC),  Department of Commerce,  Innovation Co-investment Program,  2012 - 2013,  $707,833.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010 - 2011,  $77,154.
  • Overclocking of mechanical hard disk drives,  Attorney General's D Branch,  Attorney General's Department, D Branch Grant,  2011 - 2012,  $54,545.
  • Transceiver Array for Optical Media,  Attorney-General - Commonwealth,  Grant,  2010 - 2011,  $293,091.
  • Update on Investigation into RFID Threats and Vulnerabilities,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010,  $10,000.
  • An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector,  Defence Signals Directorate,  Grant,  2005 - 2006,  $25,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies,  Defence Signals Directorate,  Grant,  2004 - 2005,  $39,000.

Recent Publications (within the last five years)

Book Chapters

  • Valli, C., (2009), The future of Digital Forensics and Its Role in Criminal Investigations. Building a Digital Forensics Laboratory, 249-253, Burlington, MA.
  • Valli, C., (2009), Scoping the Requirement for the Laboratory. Building a Digital Forensics Laboratory, 47-58, Burlington, MA.
  • Valli, C., (2009), Understanding the role of the Digital Forensic Laboratory Manager. Building a Digital Forensics Laboratory, 181-190, Burlington, MA.
  • Valli, C., (2009), Quality Assurance. Building a Digital Forensics Laboratory, 149-157, Burlington, MA.
  • Valli, C., (2009), Management of Evidence Storage. Building a Digital Forensics Laboratory, 139-146, Burlington, MA.
  • Valli, C., (2009), Management of the Collection of Evidence. Building a Digital Forensics Laboratory, 127-137, Burlington, MA.
  • Valli, C., (2009), Education and Training. Building a Digital Forensics Laboratory, 10, Burlington, MA.
  • Valli, C., (2009), Selecting the Staff. Building a Digital Forensics Laboratory, 79-86, Burlington, MA.
  • Valli, C., (2009), Laboratory Location. Building a Digital Forensics Laboratory, 71-78, Burlington, MA.

Journal Articles

  • Valli, C., (2010), Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. Journal of Digital Forensics, Security and Law, 5(2), 35-44, United States.
  • Jones, A., Valli, C., Dardick, G., Sutherland, I., Dabibi, G., Davies, G., (2010), The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 5(4), 43-64, Virginia, USA.
  • Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42, Virginia, USA.
  • Valli, C., Sutherland, I., Davies, G., Pringle, N., Blyth, A., (2009), The Impact of Hard Disk Firmware Steganography on Computer Forensics. Journal of Digital Forensics, Security and Law, 4(2), 73-84, United States.
  • Szewczyk, P., Valli, C., (2009), Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. Journal of Digital Forensics, Security and Law, 4(3), 5-16, Farmville, Virginia .
  • Valli, C., (2009), Visualisation of Honeypot Data Using Graphviz and Afterglow. Journal of Digital Forensics, Security and Law, 4(2), 27-38, United States .
  • Jones, A., Valli, C., Dardick, G., (2009), The 2008 analysis of information remaining on disks offered for sale on the second hand market. International Journal of Liability and Scientific Enquiry, 4(3), 162-175, United Kingdom.
  • Jones, A., Dardick, G., Davies, G., Sutherland, I., Valli, C., (2009), The 2008 analysis of information remaining on disks offered for sale on the second hand market. Journal of International Commercial Law and Technology, 4(3), 162-175.

Conference Publications

  • Valli, C., Rabadia, P., Woodward, A., (2013), Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference, 141-149, Edith Cowan University.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia.
  • Valli, C., (2012), SSH -- Somewhat Secure Host. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012, 227-235, Melbourne, DOI: 10.1007/978-3-642-35362-8.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C., (2012), Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference, 54-60, Perth, Western Australia.
  • Coole, M., Woodward, A., Valli, C., (2012), Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference, 36-43, Perth, Western Australia.
  • Brand, M., Valli, C., Woodward, A., (2011), A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference, 1(1-2 August), 1-6, Perth, WA.
  • Limwiriyakul, S., Valli, C., (2011), An IT Security Investigation into the Online Payment Systems of Selected Local Government Councils in WA. Proceedings of the 2011 International Conference on Security & Management, 598-604.
  • Valli, C., Woodward, A., Hannay, P., (2011), Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011, 191-195, Richmond, Virginia, USA.
  • Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. The Proceedings of the 8th Australian Digital Forensics Conference, 39-45, Perth, Western Australia.
  • Leng, J., Valli, C., Armstrong, L., (2010), A Wrapper-based Feature Selection for Analysis of Large Data Sets. 2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010), 1(16-18 Nov), 167-170, Piscataway, N.J..
  • Jones, A., Valli, C., Dardick, G., Sutherland, I., Dabibi, G., Davies, G., (2010), The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Proceedings of the 8th Australian Digital Forensics Conference, 92-105, Perth, Western Australia.
  • Valli, C., Hannay, P., (2010), Geotagging Where Cyberspace Comes to Your Place. Proceedings of the 2010 International Conference on Security & Management (SAM '10), 2(July 12-15), 627-630, Las Vegas, USA.
  • Valli, C., Al Lawati, M., (2010), Developing VoIP Router honeypots. Proceedings of the 2010 International Conference on Security & Management (SAM '10), 2(12-15 July), 615-619, Las Vegas, USA.
  • Woodward, A., Valli, C., (2010), Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies. Proceedings of The 2010 International Cyber Resilience Conference icr 2010, 118-125, Perth, Western Australia.
  • Nur E Alam, N., Vasiliev, M., Alameh, K., Valli, C., (2010), Magneto-optical visualisation for high-resolution forensic data recovery using advanced thin film nano-materials. Proceedings of the 2010 International Cyber Resilience Conference, 78-82, Joondalup, WA.
  • Valli, C., (2010), An Analysis of Malfeasant Activity Directed at a VoIP Honeypot. Proceedings of 8th Australian Digital Forensics Conference, 169-174, Perth, WA.
  • Szewczyk, P., Valli, C., (2010), Ignorant experts: computer and network security support from internet service providers. Proceedings 2010 4th International Conference on Network and System Security (NSS), 323-327, Piscataway, N.J., DOI: 10.1109/NSS.2010.42.
  • Brand, M., Valli, C., Woodward, A., (2010), Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software. The Proceedings of the 8th Australian Digital Forensics Conference, 31-38, Perth, Western Australia.
  • Valli, C., Al-Lawati, M., (2010), Developing Robust VoIP Router Honeypots Using Device Fingerprints. Proceedings of The 2010 International Cyber Resilience Conference ICR 2010, 90-96, Perth, WA.
  • Valli, C., (2010), Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. The 2010 ADFSL Conference on Digital Forensics, Security and Law, 17-25.
  • Valli, C., (2009), The not so smart, smart grid ? potential security risks associated with the deployment of smart grid technologies. Proceedings of The 7th Australian Digital Forensics Conference, 19-23, Perth, Western Australia.
  • Jones, A., Valli, C., Dabibi, G., (2009), The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market. Proceedings of The 7th Australian Digital Forensics Conference, 8-14, Perth, Western Australia.
  • Valli, C., (2009), Snort IDS for SCADA Networks. Proceedings of the 2009 International Conference on Security and Management (SAM 2009), II(13-17th July), 618-621, United States.
  • Valli, C., Woodward, A., (2009), SCADA Security - Slowly Circling a Disaster Area. Proceedings of the 2009 International Conference on Security and Management (SAM 2009), II(13-17th July), 613-617, United States.

Research Student Supervision

Principal Supervisor

  • Doctor of Information Technology,  A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils.
  • Doctor of Philosophy,  An Investigation Into Remote Transactions..
  • Doctor of Philosophy,  The Development Of An Attack Graph Using Applied Levels Of Deception For Directing Attack Methods In A Honeynet..
  • Doctor of Information Technology,  Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks.
  • Doctor of Philosophy,  . .
  • Master of Science (Computer Science),  Audit Trails And Organisational Barriers..

Co-principal Supervisor

  • Doctor of Philosophy,  Mining Climate Data For Shire Level Wheat Yield Predictions In Western Australia.

Associate Supervisor

  • Doctor of Philosophy,  An Intelligence Model For Terrorist Incident Prevention For Australian Police: A Systemic Investigation.
  • Doctor of Philosophy,  The Information Strategy Requirements Of The Unit States Government From 2004 Onwards..
  • Doctor of Philosophy,  An Investigation Into Electronic Information Security In General Practice..
Skip to top of page