Top of page

Student/Staff Portal
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Peter Hannay

Adjunct Senior Lectuer

Staff Member Details
Email: p.hannay@ecu.edu.au

Qualifications

  • Doctor of Philosophy, Edith Cowan University, 2017.
  • Bachelor of Computer Science with First Class Honours, Edith Cowan University, 2009.
  • Bachelor of Computer Science Major Software Engineering, Edith Cowan University, 2007.

Research Outputs

Journal Articles

  • Malik, I., Ibrahim, A., Hannay, P., Sikos, L. (2023). Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions. Computers, 12(4), Article number 79. https://doi.org/10.3390/computers12040079.

Book Chapters

  • Malik, I., McAteer, I., Ibrahim, A., Hannay, P., Baig, Z., Zheng, G. (2020). Cyber Security for Network of Things (NoTs) in Military Systems: Challenges and Countermeasures. Security Analytics for the Internet of Everything (233-251). CRC Press.

Conference Publications

  • Walling, L., Johnstone, M., Hannay, P. (2020). Information Warfare by Proxy: Malware in PLC Firmware. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019) (57-61). Deakin University. https://ro.ecu.edu.au/ecuworkspost2013/8239.

Journal Articles

  • McAteer, I., Hannay, P., Malik, I., Baig, Z. (2018). Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone. Journal of Digital Forensics, Security and Law, 13(4), 5-21. https://doi.org/10.15394/jdfsl.2018.1535.
  • Malik, I., McAteer, I., Hannay, P., Baig, Z. (2018). Preparing for Secure Wireless Medical Environment in 2050: A Vision. IEEE Access, 6(4 May 2018), 25666-25674. https://doi.org/10.1109/ACCESS.2018.2833509.

Conference Publications

  • Malik, I., McAteer, I., Hannay, P., Syed, N., Baig, Z. (2018). XMPP architecture and security challenges in an IoT ecosystem. Proceedings of 16th Australian Information Security Management Conference (2018) (62-73). Edith Cowan University. https://doi.org/10.25958/5c52735166690.
  • Chong, K., Malik, I., Hannay, P. (2018). Mitigating man-in-the-middle attacks on mobile devices by blocking insecure http traffic without using vpn. Proceedings of the 16th Australian Information Security Management Conference (1-13). Edith Cowan University. https://doi.org/10.25958/5C526C2966688.
  • Chaudhry, J., Farmand, S., Islam, S., Islam, MR., Hannay, P., Valli, C. (2018). Discovering trends for the development of novel authentication applications for dementia patients. International Conference on Applications and Techniques in Cyber Security and Intelligence, Applications and Techniques in Cyber Security and Intelligence (220-237). Springer. https://doi.org/10.1007/978-3-319-67071-3_29.
  • Montealegre, C., Njuguna, C., Malik, I., Hannay, P., McAteer, I. (2018). Security vulnerabilities in android applications. Proceedings of the 16th Australian Information Security Management Conference (14-28). Edith Cowan University. https://doi.org/10.25958/5c5274d466691.

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M. (2017). Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13. https://doi.org/10.1016/j.diin.2017.06.015.

Conference Publications

  • Wakeling, S., Hannay, P., Baig, Z. (2017). A review of data breaches and losses that occurred from laptops that were stolen or otherwise misplaced in 2015 and 2016. Proceedings of the 15th Australian Information Security Management Conference (97-107). Edith Cowan University. https://doi.org/10.4225/75/5a84fc4395b51.
  • McElroy, T., Hannay, P., Baatard, G. (2017). The 2017 Homograph Browser Attack Mitigation Survey. Proceedings of the 15th Australian Information Security Management Conference (88-96). https://doi.org/10.4225/75/5a84fe5695b55.
  • McAteer, I., Malik, I., Baig, Z., Hannay, P. (2017). Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things. 15th Australian Information Security Management Conference (70-80). Edith Cowan University. https://doi.org/10.4225/75/5a84f4a695b4c.
  • Woolley, C., Ibrahim, A., Hannay, P. (2017). Building a dataset for image steganography. Proceedings of the 15th Australian Digital Forensics Conference (36-45). Edith Cowan University. https://doi.org/10.4225/75/5a83a0541d284.

Journal Articles

  • Chernyshev, M., Valli, C., Hannay, P. (2016). On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593. https://doi.org/10.1109/TIFS.2015.2507542.

Conference Publications

  • Chernyshev, M., Valli, C., Hannay, P. (2016). Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences (Article no. 7427866). IEEE Computer Society. https://doi.org/10.1109/HICSS.2016.678.
  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M. (2016). Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360° 2015 Revised Selected Papers, Part I (16-26). Springer Verlag. https://doi.org/10.1007/978-3-319-47063-4_2.

Conference Publications

  • Heriyanto, A., Valli, C., Hannay, P. (2015). Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference (5-14). ECU Security Research Institute.
  • Chernyshev, M., Hannay, P. (2015). Security assessment of IoT devices: The case of two smart TVs. Proceedings of the 13th Australian Digital Forensics Conference (85-94). Security Research Institute, Edith Cown University.
  • Chernyshev, M., Valli, C., Hannay, P. (2015). 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15) (349-352). WorldComp.

Conference Publications

  • Valli, C., Woodward, A., Hannay, P., Johnstone, M. (2014). Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law (35-40). Association of Digital Forensics, Security and Law.
  • Hope, H., Hannay, P. (2014). The impace of custom ROM backups on android external storage erasure. Proceedings of the 12th Australian Digital Forensics Conference (94-101). ECU. https://doi.org/10.4225/75/57b3e5dbfb880.
  • Chernyshev, M., Hannay, P. (2014). The zombies strike back: Towards client-side beef detection. Proceedings of the 12th Australian Digital Forensics Conference (26-34). ECU. https://doi.org/10.4225/75/57b3de3dfb87a.

Journal Articles

  • Hannay, P. (2013). Geo Forensics: Classes of Locational Data Sources for Embedded Devices. IACSIT International Journal of Engineering and Technology, 5(2), 261-264.

Conference Publications

  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M. (2013). Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference (42-48). Security Research Centre, Edith Cowan University.

Conference Publications

  • Hannay, P., Baatard, G. (2012). The 2011 IDN Homograph Attack Mitigation Survey. Proceedings of the 2012 International Conference on Security and Management SAM2012 (653-657). CSREA Press.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C. (2012). Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference (54-60). Security Research Centre, Edith Cowan University.

Conference Publications

  • Hannay, P., Baatard, G. (2011). GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering. Proceedings of the 2nd International Cyber Resilience Conference (29-37). Security Research Centre, Edith Cowan University.
  • Barker, J., Hannay, P., Szewczyk, P. (2011). Using traffic analysis to identify The Second Generation Onion Router. Proceedings: 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (72-78). IEEE. https://doi.org/10.1109/EUC.2011.76.
  • Hannay, P. (2011). Kindle Forensics: Acquisition & Analysis. Proceedings of the Conference on Digital Forensics, Security, and Law 2011 (145-149). Association of Digital Forensics, Security and Law.
  • Valli, C., Woodward, A., Hannay, P. (2011). Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011 (191-195). Association of Digital Forensics, Security and Law.

Conference Publications

  • Hannay, P., Bolan, C. (2010). The 2010 IDN Homograph Attack Mitigation Survey. Proceedings of the 2010 International Conference on Security & Management, SAM 2010 (611-614). CSREA Press.
  • Barker, J., Hannay, P., Bolan, C. (2010). Using Traffic Analysis to Identify Tor Usage – A Proposed Study. Proceedings of the 2010 International Conference on Security & Management, SAM 2010 (620-623). CSREA Press.
  • Valli, C., Hannay, P. (2010). Geotagging Where Cyberspace Comes to Your Place. Proceedings of the 2010 International Conference on Security & Management (SAM '10) (627-630). CSREA Press.

Conference Publications

  • Hannay, P. (2009). Fun & Games: an Introduction to Console Forensics. Proceedings of the 2009 International Conference on Security and Management (SAM09) (609-612). CSREA Press.
  • Bolan, C., Hannay, P. (2009). Freegate: A Defence against the Pending Censorship of Australia?. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (133-140). University of Plymouth.
  • Hannay, P., Bolan, C. (2009). An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations. Proceedings of the 7th Australian Information Security Management Conference (82-87). Centre for Security Research, Edith Cowan University.
  • Hannay, P., Woodward, A. (2009). Firewire Forensics in Modern Operating Systems. Proceedings of the 2009 International Conference on Security and Management (SAM'09) (635-638). CSREA Press.
  • Hannay, P. (2009). Satellite Navigation Forensics Techniques. Proceedings of the 7th Australian Digital Forensics Conference (14-18). Centre for Security Research, Edith Cowan University.
  • Pydayya, K., Hannay, P., Szewczyk, P. (2009). The 2009 Personal Firewall Robustness Evaluation. Proceedings of the 7th Australian Information Security Management Conference (98-102). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Woodward, A., Hannay, P. (2008). Forensic implications of using the firewire memory exploit with Microsoft Windows XP. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (593-597). CSREA Press.
  • Hannay, P., Woodward, A. (2008). Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims.. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (620-622). CSREA Press.
  • Hannay, P. (2008). Forensic Acquisition and Analysis of the TomTom One Satellite Navigation Unit. Proceedings of the 6th Australian Digital Forensics Conference (78-81). Centre for Security Research, Edith Cowan University.
  • Smart, J., Tedeschi, K., Meakins, D., Hannay, P., Bolan, C. (2008). Subverting National Internet Censors: An Investigation into Existing Tools and Techniques. Proceedings of the 6th Australian Digital Forensics Conference (158-164). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Hannay, P., Woodward, A., Cope, N. (2007). A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase 1 proof of concept. Proceedings of 5th Australian Digital Forensics Conference (178-183). School of Computer and Information Science.
  • Hannay, P., James, P. (2007). Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment. Proceedings of 5th Australian Digital Forensics Conference (153-162). School of Computer and Information Science, Edith Cowan University.
  • Hannay, P. (2007). A Methodology for the Forensic Acquisition of the TomTom One Satellite Navigation System - A Research in Progress. Proceedings of 5th Australian Digital Forensics Conference (194-197). School of Computer and Information Science, Edith Cowan University.

Research Projects

  • Academic Centre of Cyber Security Excellence, Department of Education, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
  • Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 ‑ 2018, $400,000.
  • Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 ‑ 2015, $83,371.
  • Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 ‑ 2012, $77,154.

Research Student Supervision

No data available

Associate Supervisor

  • Doctor of Philosophy, A defensive strategy for detecting targeted adversarial poisoning attacks in machine learning trained malware detection models
  • Doctor of Philosophy, Anomaly detection in bacnet/ip managed building automation systems
  • Doctor of Philosophy, Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach
  • Doctor of Philosophy, Developing resilient approaches for detection of compromised IoT devices through machine learning
Skip to top of page