Top of page
Global Site Navigation

School of Computer and Security Science

Local Section Navigation
You are here:
ECU is currently converting this web content to a more mobile friendly format. If you find the content below is not formatting correctly during this transition please view on desktop browser.
Main Content

Professor Craig Valli

Director, ECU Security Research Institute

Contact Information Telephone: (61 8) 6304 5109, Mobile: 0447 853 517, Email: c.valli@ecu.edu.au, Campus: Joondalup, Room: JO23.306
Staff Member Details
Telephone: (61 8)  6304 5109  
Mobile: 0447 853 517  
Email: c.valli@ecu.edu.au   
Campus: Joondalup  
Room: JO23.306  

 

Craig is the Director of the ECU Security Research Institute and Professor (Digital Forensics) within the School of Computer and Security Science.

Background

Craig has over 25 years experience in the IT Industry and consults to industry and government on network security and digital forensics issues. His main research and consultancy is focussed on securing networks and critical infrastructures, detection of network borne threats and forensic analysis of cyber security incidents. Craig is a Fellow of the Australian Computer Society.

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association 

Awards and Recognition

National and International Awards

  • 2010 WAITTA - IT Achiever of the Year Award
  • 2010 Inventor of the Year Award Finalist

Research Areas and Interests

  • Network Security and Forensics, Honeypots, Intrusion Detection Systems, Internet Misuse, Compute Clustering (Beowulf), Computer Forensics, Wireless Security and SCADA Security

Staff Qualifications

  • Bachelor of Education, Edith Cowan University .
  • Master, Edith Cowan University .
  • Doctorate, Edith Cowan University, 2004 .
  • Diploma of Teaching, Western Australian CAE, 1985 .

Research

Recent Research Grants

  • Internet of Things (IoT),  Cisco Systems Australia Pty Ltd,  CISCO - Grant,  2014 - 2016,  $160,000.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.
  • Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582,  European Commission,  Grant - Seventh Framework Programme (FP7),  2012 - 2015,  $223,800.
  • Internet of Things (IoT) ModBUS and BacNET,  Cisco Systems Australia Pty Ltd,  CISCO - Grant,  2015,  $125,000.
  • Small Medium Enterprise Cyber Security Engagement (SMESEC) - Project Pilot,  City of Wanneroo,  Grant,  2013 - 2014,  $21,908.
  • Scalable Measures for Automated Recognition Technologies (SMART),  European Union,  EU Seventh Framework Program,  2010,  $389,772.
  • CRC for Cyber Security (CyberCRC),  Department of Commerce,  Innovation Co-investment Program,  2012 - 2013,  $707,833.
  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN),  Griffith University,  Grant - NIRAP,  2010 - 2012,  $37,139.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010 - 2011,  $77,154.
  • Overclocking of mechanical hard disk drives,  Attorney General's D Branch,  Attorney General's Department, D Branch Grant,  2011 - 2012,  $54,545.
  • Transceiver Array for Optical Media,  Attorney-General - Commonwealth,  Grant,  2010 - 2011,  $293,091.
  • Update on Investigation into RFID Threats and Vulnerabilities,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010,  $10,000.
  • An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector,  Defence Signals Directorate,  Grant,  2005 - 2006,  $25,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies,  Defence Signals Directorate,  Grant,  2004 - 2005,  $39,000.

Recent Publications (within the last five years)

Journal Articles

  • Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42, Virginia, USA.
  • Jones, A., Valli, C., Dardick, G., Sutherland, I., Dabibi, G., Davies, G., (2010), The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 5(4), 43-64, Virginia, USA.
  • Valli, C., (2010), Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. Journal of Digital Forensics, Security and Law, 5(2), 35-44, United States.

Conference Publications

  • Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA.
  • Rabadia, P., Valli, C., (2014), Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts. Proceedings of 12th Australian Digital Forensics Conference, 114-121, Perth, W.A..
  • Valli, C., Martinus, I., Johnstone, M., (2014), Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management, 71-75.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia.
  • Valli, C., Rabadia, P., Woodward, A., (2013), Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference, 141-149, Edith Cowan University.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C., (2012), Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference, 54-60, Perth, Western Australia.
  • Coole, M., Woodward, A., Valli, C., (2012), Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference, 36-43, Perth, Western Australia.
  • Valli, C., (2012), SSH -- Somewhat Secure Host. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012, 227-235, Melbourne, DOI: 10.1007/978-3-642-35362-8.
  • Limwiriyakul, S., Valli, C., (2011), An IT Security Investigation into the Online Payment Systems of Selected Local Government Councils in WA. Proceedings of the 2011 International Conference on Security & Management, 598-604, USA.
  • Valli, C., Woodward, A., Hannay, P., (2011), Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011, 191-195, Richmond, Virginia, USA.
  • Brand, M., Valli, C., Woodward, A., (2011), A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference, 1(1-2 August), 1-6, Perth, WA.
  • Woodward, A., Valli, C., (2010), Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies. Proceedings of The 2010 International Cyber Resilience Conference icr 2010, 118-125, Perth, Western Australia.
  • Valli, C., Al-Lawati, M., (2010), Developing Robust VoIP Router Honeypots Using Device Fingerprints. Proceedings of The 2010 International Cyber Resilience Conference ICR 2010, 90-96, Perth, WA.
  • Valli, C., (2010), An Analysis of Malfeasant Activity Directed at a VoIP Honeypot. Proceedings of 8th Australian Digital Forensics Conference, 169-174, Perth, WA.
  • Nur E Alam, N., Vasiliev, M., Alameh, K., Valli, C., (2010), Magneto-optical visualisation for high-resolution forensic data recovery using advanced thin film nano-materials. Proceedings of the 2010 International Cyber Resilience Conference, 78-82, Joondalup, WA.
  • Valli, C., Al Lawati, M., (2010), Developing VoIP Router honeypots. Proceedings of the 2010 International Conference on Security & Management (SAM '10), 2(12-15 July), 615-619, Las Vegas, USA.
  • Valli, C., Hannay, P., (2010), Geotagging Where Cyberspace Comes to Your Place. Proceedings of the 2010 International Conference on Security & Management (SAM '10), 2(July 12-15), 627-630, Las Vegas, USA.
  • Leng, J., Valli, C., Armstrong, L., (2010), A Wrapper-based Feature Selection for Analysis of Large Data Sets. 2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010), 1(16-18 Nov), 167-170, Piscataway, N.J..
  • Szewczyk, P., Valli, C., (2010), Ignorant experts: computer and network security support from internet service providers. Proceedings 2010 4th International Conference on Network and System Security (NSS), 323-327, Piscataway, N.J., DOI: 10.1109/NSS.2010.42.
  • Brand, M., Valli, C., Woodward, A., (2010), Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software. The Proceedings of the 8th Australian Digital Forensics Conference, 31-38, Perth, Western Australia.
  • Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. The Proceedings of the 8th Australian Digital Forensics Conference, 39-45.

Research Student Supervision

Principal Supervisor

  • Doctor of Information Technology,  A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils.
  • Doctor of Philosophy,  An Investigation Into Remote Transactions..
  • Doctor of Philosophy,  The Development Of An Attack Graph Using Applied Levels Of Deception For Directing Attack Methods In A Honeynet..
  • Doctor of Information Technology,  Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks.
  • Doctor of Philosophy,  . .
  • Master of Science (Computer Science),  Audit Trails And Organisational Barriers..

Co-principal Supervisor

  • Doctor of Philosophy,  Mining Climate Data For Shire Level Wheat Yield Predictions In Western Australia.

Associate Supervisor

  • Doctor of Philosophy,  An Intelligence Model For Terrorist Incident Prevention For Australian Police: A Systemic Investigation.
  • Doctor of Philosophy,  The Information Strategy Requirements Of The Unit States Government From 2004 Onwards..
  • Doctor of Philosophy,  An Investigation Into Electronic Information Security In General Practice..
Skip to top of page