Professor Craig Valli

Director, ECU Security Research Institute

Telephone: (61 8)  6304 5109  
Mobile: 0447 853 517  
Email: c.valli@ecu.edu.au   
Campus: Joondalup  
Room: JO23.306  

 

Background

Craig has over 20 years experience in the IT Industry and consults to industry and government on network security and digital forensics issues. His main consultancy focus is on securing networks and critical infrastructures, detection of network borne threats and forensic analysis of cyber security incidents.

Professional Memberships

  • Australian Computer Society
  • Australian Information Security Association 

Awards and Recognition

National and International Awards

  • 2010 WAITTA - IT Achiever of the Year Award
  • 2010 Inventor of the Year Award Finalist

Research Areas and Interests

  • Network Security and Forensics, Honeypots, Intrusion Detection Systems, Internet Misuse, Compute Clustering (Beowulf), Computer Forensics, Wireless Security and SCADA Security

Staff Qualifications

  • Master, Edith Cowan University .
  • Bachelor of Education, Edith Cowan University .
  • Doctorate, Edith Cowan University, 2004 .
  • Diploma of Teaching, Western Australian CAE, 1985 .

Research

Recent Research Grants

  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN),  Griffith University,  Grant - NIRAP,  2011,  $3,184.
  • Update on Investigation into RFID Threats and Vulnerabilities,  Dept of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2011,  $9,091.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Dept of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2011,  $27,273.
  • Transceiver Array for Optical Media,  Attorney-General - Commonwealth,  Grant,  2011,  $18,182.
  • Overclocking of mechanical hard disk drives,  Attorney General's D Branch,  Attorney General's Department, D Branch Grant,  2011,  $18,182.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Dept of the Prime Minister and Cabinet,  Grant - Research Support For National Security(**),  2010,  $30,000.
  • Transceiver Array for Optical Media,  Attorney-General - Commonwealth,  Grant(**),  2010,  $72,727.
  • An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector,  The Defence Signals Directorate of the Department of Defence,  Grant,  2005,  $25,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies,  The Defence Signals Directorate of the Department of Defence,  Grant,  2005,  $10,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies,  The Defence Signals Directorate of the Department of Defence,  Grant,  2004,  $29,000.

Recent Publications (within the last five years)

Book Chapters

  • Valli, C., (2009), Management of the Collection of Evidence. Building a Digital Forensics Laboratory, 127-137, Burlington, MA.
  • Valli, C., (2009), Understanding the role of the Digital Forensic Laboratory Manager. Building a Digital Forensics Laboratory, 181-190, Burlington, MA.
  • Valli, C., (2009), Quality Assurance. Building a Digital Forensics Laboratory, 149-157, Burlington, MA.
  • Valli, C., (2009), Selecting the Staff. Building a Digital Forensics Laboratory, 79-86, Burlington, MA.
  • Valli, C., (2009), Laboratory Location. Building a Digital Forensics Laboratory, 71-78, Burlington, MA.
  • Valli, C., (2009), Scoping the Requirement for the Laboratory. Building a Digital Forensics Laboratory, 47-58, Burlington, MA.
  • Valli, C., (2009), Education and Training. Building a Digital Forensics Laboratory, 10, Burlington, MA.
  • Valli, C., (2009), The future of Digital Forensics and Its Role in Criminal Investigations. Building a Digital Forensics Laboratory, 249-253, Burlington, MA.
  • Valli, C., (2009), Management of Evidence Storage. Building a Digital Forensics Laboratory, 139-146, Burlington, MA.

Journal Articles

  • Jones, A., Valli, C., Dardick, G., Sutherland, I., Dabibi, G., Davies, G., (2010), The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 5(4), 43-64, Virginia, USA.
  • Valli, C., (2010), Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. Journal of Digital Forensics, Security and Law, 5(2), 35-44, United States.
  • Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42, Virginia, USA.
  • Valli, C., Sutherland, I., Davies, G., Pringle, N., Blyth, A., (2009), The Impact of Hard Disk Firmware Steganography on Computer Forensics. Journal of Digital Forensics, Security and Law, 4(2), 73-84, United States.
  • Szewczyk, P., Valli, C., (2009), Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. Journal of Digital Forensics, Security and Law, 4(3), 5-16, Farmville, Virginia .
  • Valli, C., (2009), Visualisation of Honeypot Data Using Graphviz and Afterglow. Journal of Digital Forensics, Security and Law, 4(2), 27-38, United States .
  • Jones, A., Valli, C., Dardick, G., (2009), The 2008 analysis of information remaining on disks offered for sale on the second hand market. International Journal of Liability and Scientific Enquiry, 4(3), 162-175, United Kingdom.
  • Jones, A., Dardick, G., Davies, G., Sutherland, I., Valli, C., (2009), The 2008 analysis of information remaining on disks offered for sale on the second hand market. Journal of International Commercial Law and Technology, 4(3), 162-175.
  • Jones, A., Valli, C., Dardick, G., Sutherland, I., (2008), The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market. Journal of Digital Forensics, Security and Law, 3(1), 5-24, Farmville, Virginia .
  • Jones, A., Valli, C., Sutherland, I., (2008), Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 3(2), 55-70, United States.

Conference Publications

  • Valli, C., (2012), SSH -- Somewhat Secure Host. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012, 227-235, Melbourne, DOI: 10.1007/978-3-642-35362-8.
  • Brand, M., Valli, C., Woodward, A., (2011), A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference, 1(1-2 August), 1-6, Perth, WA.
  • Limwiriyakul, S., Valli, C., (2011), An IT Security Investigation into the Online Payment Systems of Selected Local Government Councils in WA. Proceedings of the 2011 International Conference on Security & Management, 598-604.
  • Valli, C., Woodward, A., Hannay, P., (2011), Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011, 191-195, Richmond, Virginia, USA.
  • Valli, C., (2010), Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. The 2010 ADFSL Conference on Digital Forensics, Security and Law, 17-25.
  • Valli, C., Al Lawati, M., (2010), Developing VoIP Router honeypots. Proceedings of the 2010 International Conference on Security & Management (SAM '10), 2(12-15 July), 615-619, Las Vegas, USA.
  • Valli, C., Hannay, P., (2010), Geotagging Where Cyberspace Comes to Your Place. Proceedings of the 2010 International Conference on Security & Management (SAM '10), 2(July 12-15), 627-630, Las Vegas, USA.
  • Nur E Alam, M., Vasiliev, M., Alameh, K., Valli, C., (2010), Magneto-optical visualisation for high-resolution forensic data recovery using advanced thin film nano-materials. Proceedings of the 2010 International Cyber Resilience Conference, 78-82, Joondalup, WA.
  • Valli, C., (2010), An Analysis of Malfeasant Activity Directed at a VoIP Honeypot. Proceedings of 8th Australian Digital Forensics Conference, 169-174, Perth, WA.
  • Jones, A., Valli, C., Dardick, G., Sutherland, I., Dabibi, G., Davies, G., (2010), The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Proceedings of the 8th Australian Digital Forensics Conference, 92-105, Perth, Western Australia.
  • Woodward, A., Valli, C., (2010), Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies. Proceedings of The 2010 International Cyber Resilience Conference icr 2010, 118-125, Perth, Western Australia.
  • Valli, C., Al-Lawati, M., (2010), Developing Robust VoIP Router Honeypots Using Device Fingerprints. Proceedings of The 2010 International Cyber Resilience Conference ICR 2010, 90-96, Perth, WA.
  • Brand, M., Valli, C., Woodward, A., (2010), Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software. The Proceedings of the 8th Australian Digital Forensics Conference, 31-38, Perth, Western Australia.
  • Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. The Proceedings of the 8th Australian Digital Forensics Conference, 39-45, Perth, Western Australia.
  • Leng, J., Valli, C., Armstrong, L., (2010), A Wrapper-based Feature Selection for Analysis of Large Data Sets. 2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010), 1(16-18 Nov), 167-170, Piscataway, N.J..
  • Szewczyk, P., Valli, C., (2010), Ignorant experts: computer and network security support from internet service providers. Proceedings 2010 4th International Conference on Network and System Security (NSS), 323-327, Piscataway, N.J., DOI: 10.1109/NSS.2010.42.
  • Valli, C., Woodward, A., (2009), SCADA Security - Slowly Circling a Disaster Area. Proceedings of the 2009 International Conference on Security and Management (SAM 2009), II(13-17th July), 613-617, United States.
  • Valli, C., (2009), Snort IDS for SCADA Networks. Proceedings of the 2009 International Conference on Security and Management (SAM 2009), II(13-17th July), 618-621, United States.
  • Valli, C., (2009), The not so smart, smart grid ? potential security risks associated with the deployment of smart grid technologies. Proceedings of The 7th Australian Digital Forensics Conference, 19-23, Perth, Western Australia.
  • Jones, A., Valli, C., Dabibi, G., (2009), The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market. Proceedings of The 7th Australian Digital Forensics Conference, 8-14, Perth, Western Australia.
  • Valli, C., Brand, MW., (2008), The Malware Analysis Body of Knowledge (MABOK). Proceedings of the 6th Australian Digital Forensics Conference, 70-72, Edith Cowan University Perth WA.
  • Valli, C., Jones, A., (2008), A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans. Proceedings of the 2008 International Conference on Security & Management (SAM '08), 604-607, United States of America.
  • Williams, T., Valli, C., (2008), Trust me. I am a Doctor. Your Records Are Safe... Proceedings of the 6th Australian Information Security Management Conference, 155-162, Edith Cowan University Mount Lawley Campus WA.
  • Valli, C., Woodward, A., (2008), The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues. Proceedings of the 6th Australian Digital Forensics Conference, 211-214, Edith Cowan University Perth WA.
  • Woodward, A., Valli, C., (2008), Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis. Proceedings of the 6th Australian Digital Forensics Conference, 204-208, Edith Cowan University , Mount Lawley Campus Perth WA.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy,  The Development Of An Attack Graph Using Applied Levels Of Deception For Directing Attack Methods In A Honeynet..
  • Doctor of Philosophy,  . .
  • Doctor of Philosophy,  An Investigation Into Remote Transactions..
  • Doctor of Information Technology,  A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils.
  • Master of Science (Computer Science),  Audit Trails And Organisational Barriers..
  • Doctor of Information Technology,  Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks.

Associate Supervisor

  • Doctor of Philosophy,  The Information Strategy Requirements Of The Unit States Government From 2004 Onwards..
  • Doctor of Philosophy,  An Intelligence Model For Terrorist Incident Prevention For Australian Police: A Systemic Investigation.
  • Doctor of Philosophy,  An Investigation Into Electronic Information Security In General Practice..