Dr Andrew Woodward
Staff Qualifications
-
Bachelor of Science Honours, Edith Cowan University .
-
GradCert (Graduate Certificate), Edith Cowan University, 2006 .
-
Doctor of Philosophy, Edith Cowan University, 2005 .
Research
Recent Research Grants
-
The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN),
Griffith University,
Grant - NIRAP,
2011,
$3,184.
-
Review of Vulnerability in Smart Grid Appliances and Networks,
Dept of the Prime Minister and Cabinet,
Grant - Research Support For National Security,
2011,
$27,273.
-
Overclocking of mechanical hard disk drives,
Attorney General's D Branch,
Attorney General's Department, D Branch Grant,
2011,
$18,182.
-
Review of Vulnerability in Smart Grid Appliances and Networks,
Dept of the Prime Minister and Cabinet,
Grant - Research Support For National Security(**),
2010,
$30,000.
-
Leading edge developments in tourism ICT and related underlying technologies,
CRC Centre for Sustainable Tourism,
Grant,
2004,
$17,000.
Recent Publications (within the last five years)
Journal Articles
-
Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42, Virginia, USA.
-
Golygowski, LA., Woodward, A., (2009), Is it possible to use passive spectral characteristics of wireless network client devices for forensic identification purposes?. Journal of Network Forensics, 1(1), 1-15, Perth, Western Australia.
-
McEniery, D., Woodward, A., (2008), Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field. Journal of Information Warfare, 7(3), 35-54, Edith Cowan University WA.
Conference Publications
-
Jacobson, E., Woodward, A., (2011), A longitudinal study of Wi-Fi access point security in the Perth Central Business District. Proceedings of The 9th Australian Information Security Management Conference, 124-129, Perth, WA.
-
Pung, W., Woodward, A., (2011), Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?. Proceedings of The 9th Australian Digital Forensics Conference, 93-99, Perth, Western Australia.
-
Brand, M., Valli, C., Woodward, A., (2011), A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference, 1(1-2 August), 1-6, Perth, WA.
-
Valli, C., Woodward, A., Hannay, P., (2011), Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011, 191-195, Richmond, Virginia, USA.
-
Pung, W., Woodward, A., (2010), Does the use of MIMO Technology used by 802.11n Reduce or Increase the Impact of Denial of Service Attacks?. The Proceedings of the 8th Australian Digital Forensics Conference, 135-141, Perth, Western Australia.
-
Woodward, A., Valli, C., (2010), Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies. Proceedings of The 2010 International Cyber Resilience Conference icr 2010, 118-125, Perth, Western Australia.
-
Cheng, TC., Woodward, A., (2010), An investigation into the efficacy of three erasure tools under Windows 7. The Proceedings of the 8th Australian Digital Forensics Conference, 162-168, Perth, Western Australia.
-
Brand, M., Valli, C., Woodward, A., (2010), Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software. The Proceedings of the 8th Australian Digital Forensics Conference, 31-38, Perth, Western Australia.
-
Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. The Proceedings of the 8th Australian Digital Forensics Conference, 39-45, Perth, Western Australia.
-
Hannay, P., Woodward, A., (2009), Firewire Forensics in Modern Operating Systems. Proceedings of the 2009 International Conference on Security and Management (SAM'09), 635-638, United States of America.
-
Woodward, A., Turner, B., (2009), When You Can?t See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks. Proceedings of the 10th Australian Information Warfare and Security Conference, 18-23, Perth, Western Australia.
-
Woodward, A., (2009), Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?. Proceedings of the 2009 International Conference on Security and Management (SAM'09), 622-627, United States of America.
-
Talbot, S., Woodward, A., (2009), Improving an Organisations Existing Information Technology Policy to Increase Security. Proceedings of the 7th Australian Information Security Management Conference, 120-128, Perth, Western Australia.
-
Valli, C., Woodward, A., (2009), SCADA Security - Slowly Circling a Disaster Area. Proceedings of the 2009 International Conference on Security and Management (SAM 2009), II(13-17th July), 613-617, United States.
-
Freeman, M., Woodward, A., (2009), Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives. Proceedings of the 7th Australian Digital Forensics Conference, 33-41, Perth, Western Australia.
-
Freeman, M., Woodward, A., (2009), SmartPot - Creating a 1st Generation Smartphone Honeypot. Proceedings of the 7th Australian Digital Forensics Conference, 25-32, Perth, Western Australia.
-
Valli, C., Woodward, A., (2008), The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues. Proceedings of the 6th Australian Digital Forensics Conference, 211-214, Edith Cowan University Perth WA.
-
Turner, B., Woodward, A., (2008), Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation. Proceedings of the 6th Australian Information Security Management Conference, 130 - 137, Edith Cowan University Perth WA.
-
Turner, B., Woodward, A., (2008), Network security isnt all fun and games: an analysis of information transmitted whilst playing Team Fortress 2. Proceedings of the 6th Australian Information Security Management Conference, 138-144, Edith Cowan University Perth WA.
-
Hannay, P., Woodward, A., (2008), Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims. Proceedings of the 2008 International Conference on Security & Management (SAM '08), 620-622, United States of America.
-
Woodward, A., Valli, C., (2008), Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis. Proceedings of the 6th Australian Digital Forensics Conference, 204-208, Edith Cowan University , Mount Lawley Campus Perth WA.
-
Woodward, A., (2008), What Artefacts do Current BitTorrent Clients Leave Behind?. Proceedings of the 2008 International Conference on Security & Management (SAM '08), 608-613, United States of America.
-
Woodward, A., Hannay, P., (2008), Forensic implications of using the firewire memory exploit with Microsoft Windows XP. Proceedings of the 2008 International Conference on Security & Management (SAM '08), 593-597, United States of America.
Research Student Supervision
Co-principal Supervisor
-
Doctor of Philosophy, .
.
-
Doctor of Information Technology, A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils.
Associate Supervisor
-
Doctor of Philosophy, The Development Of An Attack Graph Using Applied Levels Of Deception For Directing Attack Methods In A Honeynet..
-
Doctor of Philosophy, Vulnerabilities In Class One Electronic Product Code Radio Frequency Identification Systems.
-
Doctor of Philosophy, An Investigation Into Remote Transactions..
-
Doctor of Information Technology, Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks.
-
Doctor of Philosophy, An Intelligence Model For Terrorist Incident Prevention For Australian Police: A Systemic Investigation.