Dr Andrew Woodward

Senior Lecturer

Telephone: (61 8)  6304 5019  
Email: a.woodward@ecu.edu.au   
Campus: Joondalup  
Room: JO18.243  

 

Staff Qualifications

  • Bachelor of Science Honours, Edith Cowan University .
  • GradCert (Graduate Certificate), Edith Cowan University, 2006 .
  • Doctor of Philosophy, Edith Cowan University, 2005 .

Research

Recent Research Grants

  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN),  Griffith University,  Grant - NIRAP,  2011,  $3,184.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Dept of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2011,  $27,273.
  • Overclocking of mechanical hard disk drives,  Attorney General's D Branch,  Attorney General's Department, D Branch Grant,  2011,  $18,182.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Dept of the Prime Minister and Cabinet,  Grant - Research Support For National Security(**),  2010,  $30,000.
  • Leading edge developments in tourism ICT and related underlying technologies,  CRC Centre for Sustainable Tourism,  Grant,  2004,  $17,000.

Recent Publications (within the last five years)

Journal Articles

  • Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42, Virginia, USA.
  • Golygowski, LA., Woodward, A., (2009), Is it possible to use passive spectral characteristics of wireless network client devices for forensic identification purposes?. Journal of Network Forensics, 1(1), 1-15, Perth, Western Australia.
  • McEniery, D., Woodward, A., (2008), Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field. Journal of Information Warfare, 7(3), 35-54, Edith Cowan University WA.

Conference Publications

  • Jacobson, E., Woodward, A., (2011), A longitudinal study of Wi-Fi access point security in the Perth Central Business District. Proceedings of The 9th Australian Information Security Management Conference, 124-129, Perth, WA.
  • Pung, W., Woodward, A., (2011), Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?. Proceedings of The 9th Australian Digital Forensics Conference, 93-99, Perth, Western Australia.
  • Brand, M., Valli, C., Woodward, A., (2011), A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference, 1(1-2 August), 1-6, Perth, WA.
  • Valli, C., Woodward, A., Hannay, P., (2011), Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011, 191-195, Richmond, Virginia, USA.
  • Pung, W., Woodward, A., (2010), Does the use of MIMO Technology used by 802.11n Reduce or Increase the Impact of Denial of Service Attacks?. The Proceedings of the 8th Australian Digital Forensics Conference, 135-141, Perth, Western Australia.
  • Woodward, A., Valli, C., (2010), Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies. Proceedings of The 2010 International Cyber Resilience Conference icr 2010, 118-125, Perth, Western Australia.
  • Cheng, TC., Woodward, A., (2010), An investigation into the efficacy of three erasure tools under Windows 7. The Proceedings of the 8th Australian Digital Forensics Conference, 162-168, Perth, Western Australia.
  • Brand, M., Valli, C., Woodward, A., (2010), Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software. The Proceedings of the 8th Australian Digital Forensics Conference, 31-38, Perth, Western Australia.
  • Brand, M., Valli, C., Woodward, A., (2010), Malware Forensics: Discovery of the Intent of Deception. The Proceedings of the 8th Australian Digital Forensics Conference, 39-45, Perth, Western Australia.
  • Hannay, P., Woodward, A., (2009), Firewire Forensics in Modern Operating Systems. Proceedings of the 2009 International Conference on Security and Management (SAM'09), 635-638, United States of America.
  • Woodward, A., Turner, B., (2009), When You Can?t See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks. Proceedings of the 10th Australian Information Warfare and Security Conference, 18-23, Perth, Western Australia.
  • Woodward, A., (2009), Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?. Proceedings of the 2009 International Conference on Security and Management (SAM'09), 622-627, United States of America.
  • Talbot, S., Woodward, A., (2009), Improving an Organisations Existing Information Technology Policy to Increase Security. Proceedings of the 7th Australian Information Security Management Conference, 120-128, Perth, Western Australia.
  • Valli, C., Woodward, A., (2009), SCADA Security - Slowly Circling a Disaster Area. Proceedings of the 2009 International Conference on Security and Management (SAM 2009), II(13-17th July), 613-617, United States.
  • Freeman, M., Woodward, A., (2009), Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives. Proceedings of the 7th Australian Digital Forensics Conference, 33-41, Perth, Western Australia.
  • Freeman, M., Woodward, A., (2009), SmartPot - Creating a 1st Generation Smartphone Honeypot. Proceedings of the 7th Australian Digital Forensics Conference, 25-32, Perth, Western Australia.
  • Valli, C., Woodward, A., (2008), The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues. Proceedings of the 6th Australian Digital Forensics Conference, 211-214, Edith Cowan University Perth WA.
  • Turner, B., Woodward, A., (2008), Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation. Proceedings of the 6th Australian Information Security Management Conference, 130 - 137, Edith Cowan University Perth WA.
  • Turner, B., Woodward, A., (2008), Network security isnt all fun and games: an analysis of information transmitted whilst playing Team Fortress 2. Proceedings of the 6th Australian Information Security Management Conference, 138-144, Edith Cowan University Perth WA.
  • Hannay, P., Woodward, A., (2008), Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims. Proceedings of the 2008 International Conference on Security & Management (SAM '08), 620-622, United States of America.
  • Woodward, A., Valli, C., (2008), Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis. Proceedings of the 6th Australian Digital Forensics Conference, 204-208, Edith Cowan University , Mount Lawley Campus Perth WA.
  • Woodward, A., (2008), What Artefacts do Current BitTorrent Clients Leave Behind?. Proceedings of the 2008 International Conference on Security & Management (SAM '08), 608-613, United States of America.
  • Woodward, A., Hannay, P., (2008), Forensic implications of using the firewire memory exploit with Microsoft Windows XP. Proceedings of the 2008 International Conference on Security & Management (SAM '08), 593-597, United States of America.

Research Student Supervision

Co-principal Supervisor

  • Doctor of Philosophy,  . .
  • Doctor of Information Technology,  A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils.

Associate Supervisor

  • Doctor of Philosophy,  The Development Of An Attack Graph Using Applied Levels Of Deception For Directing Attack Methods In A Honeynet..
  • Doctor of Philosophy,  Vulnerabilities In Class One Electronic Product Code Radio Frequency Identification Systems.
  • Doctor of Philosophy,  An Investigation Into Remote Transactions..
  • Doctor of Information Technology,  Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks.
  • Doctor of Philosophy,  An Intelligence Model For Terrorist Incident Prevention For Australian Police: A Systemic Investigation.