Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Mr Peter Hannay


Contact Information Telephone: +61 8 6304 2849, Email:, Campus: Joondalup, Room: JO18.308
Staff Member Details
Telephone: +61 8 6304 2849
Campus: Joondalup  
Room: JO18.308  


Peter Hannay is a researcher and lecturer based within the School of Science. His research is focused on the acquisition and analysis of data from small and embedded devices, with a particular focus on locational history. Peter is also involved in network vulnerability, malware and OT research projects under the banner of the Security Research Institute.

Research Areas and Interests

  • Small and embedded device forensics, with focus on locational history
  • Software vulnerability discovery and exploit development
  • Malware analysis


  • BCompScHons (Bachelor of Computer Science Hons), Edith Cowan University, 2009.
  • Bachelor degree in Computer Science, Edith Cowan University, 2007.


Recent Research Grants

  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010 - 2012,  $77,154.

Recent Publications (within the last five years)

Journal Articles

  • Chernyshev, M., Valli, C., Hannay, P., (2016), On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593, Piscataway, USA.
  • Hannay, P., (2013), Geo Forensics: Classes of Locational Data Sources for Embedded Devices. IACSIT International Journal of Engineering and Technology, 5(2), 261-264.

Conference Publications

  • Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, DOI: 10.1109/HICSS.2016.678.
  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360? 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, DOI: 10.1007/978-3-319-47063-4_2.
  • Chernyshev, M., Hannay, P., (2015), Security assessment of IoT devices: The case of two smart TVs. Proceedings of the 13th Australian Digital Forensics Conference, 85-94, Perth, WA.
  • Chernyshev, M., Valli, C., Hannay, P., (2015), 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15), 349-352.
  • Heriyanto, A., Valli, C., Hannay, P., (2015), Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference, 5-14, Perth, WA.
  • Hope, H., Hannay, P., (2014), The impace of custom ROM backups on android external storage erasure. Proceedings of the 12th Australian Digital Forensics Conference, 94-101.
  • Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA.
  • Chernyshev, M., Hannay, P., (2014), The zombies strike back: Towards client-side beef detection. Proceedings of the 12th Australian Digital Forensics Conference, 26-34, Perth, W.A..
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia.
  • Hannay, P., Baatard, G., (2012), The 2011 IDN Homograph Attack Mitigation Survey. Proceedings of the International Conference on Security and Management SAM'12, 653-657, Georgia, USA.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C., (2012), Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference, 54-60, Perth, Western Australia.
Skip to top of page