Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Mr Peter Hannay

Lecturer

Contact Information Telephone: +61 8 6304 2849, Email: p.hannay@ecu.edu.au, Campus: Joondalup, Room: JO18.308
Staff Member Details
Telephone: +61 8 6304 2849
Email: p.hannay@ecu.edu.au
Campus: Joondalup  
Room: JO18.308  

 

Peter Hannay is a researcher and lecturer based within the School of Science. His research is focused on the acquisition and analysis of data from small and embedded devices, with a particular focus on locational history. Peter is also involved in network vulnerability, malware and OT research projects under the banner of the Security Research Institute.

Research Areas and Interests

  • Small and embedded device forensics, with focus on locational history
  • Software vulnerability discovery and exploit development
  • Malware analysis

Qualifications

  • Bachelor of Computer Science with First Class Honours, Edith Cowan University, 2009.
  • Bachelor of Computer Science Major Software Engineering, Edith Cowan University, 2007.

Research

Recent Research Grants

  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010 - 2012,  $77,154.

Recent Publications (within the last five years)

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(1), 3-13, DOI: https://doi.org/10.1016/j.diin.2017.06.015.
  • Chernyshev, M., Valli, C., Hannay, P., (2016), On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593, Piscataway, USA, IEEE.
  • Hannay, P., (2013), Geo Forensics: Classes of Locational Data Sources for Embedded Devices. IACSIT International Journal of Engineering and Technology, 5(2), 261-264, International Association of Computer Science and Information Technology.

Conference Publications

  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360? 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, Springer Verlag, DOI: 10.1007/978-3-319-47063-4_2.
  • Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, IEEE Computer Society, DOI: 10.1109/HICSS.2016.678.
  • Chernyshev, M., Valli, C., Hannay, P., (2015), 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15), 349-352.
  • Heriyanto, A., Valli, C., Hannay, P., (2015), Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference, 5-14, Perth, WA, Edith Cowan University.
  • Chernyshev, M., Hannay, P., (2015), Security assessment of IoT devices: The case of two smart TVs. Proceedings of the 13th Australian Digital Forensics Conference, 85-94, Perth, WA, Security Research Institute, Edith Cown University.
  • Hope, H., Hannay, P., (2014), The impace of custom ROM backups on android external storage erasure. Proceedings of the 12th Australian Digital Forensics Conference, 94-101, ECU.
  • Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA, Association of Digital Forensics, Security and Law.
  • Chernyshev, M., Hannay, P., (2014), The zombies strike back: Towards client-side beef detection. Proceedings of the 12th Australian Digital Forensics Conference, 26-34, Perth, W.A., ECU.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia, Security Research Centre, Edith Cowan University.
  • Hannay, P., Baatard, G., (2012), The 2011 IDN Homograph Attack Mitigation Survey. Proceedings of the International Conference on Security and Management SAM'12, 653-657, Georgia, USA, CSREA Press.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C., (2012), Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference, 54-60, Perth, Western Australia, Security Research Centre, Edith Cowan University.
Skip to top of page