Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Professor Craig Valli

Director, ECU Security Research Institute

Contact Information Telephone: +61 8 6304 5109, Mobile: 0447 853 517, Email: c.valli@ecu.edu.au, Campus: Joondalup, Room: JO23.306
Staff Member Details
Telephone: +61 8 6304 5109
Mobile: 0447 853 517
Email: c.valli@ecu.edu.au
Campus: Joondalup  
Room: JO23.306  

 

Professor Craig Valli is the Director of the ECU Security Research Institute and Professor (Digital Forensics) within the School of Science.

Background

Professor Craig Valli has over 30 years experience in the ICT Industry and consults to industry and government on cyber security and digital forensics matters. Along with being Director of the Edith Cowan University Security Research Institute, he is a Professor of Digital Forensics, a Fellow of the Australian Computer Society and Director of the Australian Computer Society Centre of Expertise in Security at ECU. He also currently holds the position of research director for the Australian Cyber Security Research Institute. Craig is a member of the High Tech Crime Investigators Association (Australian Chapter) and the INTERPOL Cyber Crime Experts Group.

Craig has over 100 peer reviewed academic publications in cyber security and digital forensics. He serves on several cyber security related conference committees and journal editorial boards. Craig is also the founder and current Chair of the Australian Digital Forensics Conference.

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association
  • High Tech Crime Investigators Association

Awards and Recognition

National and International Awards

  • 2010 WAITTA - IT Achiever of the Year Award
  • 2010 Inventor of the Year Award Finalist

Research Areas and Interests

  • Network Security and Forensics, Honeypots, Intrusion Detection Systems, Internet Misuse, Compute Clustering (Beowulf), Computer Forensics, Wireless Security and SCADA Security

Qualifications

  • Masters of Management Information Systems, Edith Cowan University.
  • Bachelor of Education, Edith Cowan University.
  • Doctor of Information Technology, Edith Cowan University, 2004.
  • Diploma of Teaching, Western Australian CAE, 1985.

Research

Recent Research Grants

  • Measuring and Mitigating Vigilance Decrement in Cyber Network Defence Tasks,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre PhD Scholarship,  2019 - 2022,  $225,000.
  • ESSENTIAL - Evolving Security SciencE through Networked Technologies, Information policy And Law,  European Commission,  Horizons 2020,  2017 - 2021,  $394,374.
  • Academic Centre of Cyber Security Excellence,  Department of Education and Training,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • Cyber Electronic Warfare: The effects of team dynamics, cognitive load and team mental models.,  Defence Science and Technology Group of the Department of Defence,  Competitive Evaluation Research Agreement (CERA) Program,  2017 - 2018,  $153,407.
  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Cyber Security Survey and Professional Development Seminars,  Law Society of WA,  Grant,  2017 - 2018,  $30,000.
  • Internet of Things (IoT) ModBUS and BacNET,  Cisco Systems Australia Pty Ltd,  CISCO - Grant,  2015 - 2018,  $125,000.
  • Advanced Biometric Template Protection: Design of a Cancelable Biometric Framework,  Defence Science and Technology Group of the Department of Defence,  Competitive Evaluation Research Agreement (CERA) Program,  2017 - 2018,  $128,226.
  • Design of a Biometric Protection System using Feature Transformation Techniques,  Edith Cowan University,  Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017,  2017,  $8,700.
  • Internet of Things (IoT),  Cisco Systems Australia Pty Ltd,  CISCO - Grant,  2016 - 2017,  $160,000.
  • Investigation of social media for radicalisation and terrorism in the Maldives,  Edith Cowan University,  Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017,  2017,  $11,000.
  • Cyber Check.me,  City of Joondalup,  Grant,  2015 - 2016,  $16,740.
  • Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582,  European Commission,  Grant - Seventh Framework Programme (FP7),  2012 - 2015,  $223,800.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.
  • Scalable Measures for Automated Recognition Technologies (SMART),  European Union,  EU Seventh Framework Program,  2011 - 2014,  $389,772.
  • Small Medium Enterprise Cyber Security Engagement (SMESEC) - Project Pilot,  City of Wanneroo,  Grant,  2013 - 2014,  $21,908.
  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN),  Griffith University,  Grant - NIRAP,  2009 - 2013,  $37,139.
  • CRC for Cyber Security (CyberCRC),  Department of Commerce,  Innovation Co-investment Program,  2013,  $707,833.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010 - 2012,  $77,154.
  • Overclocking of mechanical hard disk drives,  Attorney General's D Branch,  Attorney General's Department, D Branch Grant,  2011 - 2012,  $54,545.
  • Transceiver Array for Optical Media,  Attorney-General - Commonwealth,  Grant,  2010 - 2012,  $293,091.
  • Update on Investigation into RFID Threats and Vulnerabilities,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010,  $10,000.
  • An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector,  Department of Defence,  Defence Signals Directorate - Grant,  2005 - 2006,  $25,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies,  Department of Defence,  Defence Signals Directorate - Grant,  2004 - 2005,  $39,000.

Recent Publications (within the last five years)

Book Chapters

  • Peacock, M., Johnstone, M., Valli, C., (2018), An Exploration of Some Security Issues Within the BACnet Protocol. Information Systems Security and Privacy , 252–272, Heidelberg, Germany, Springer, DOI: https://doi.org/10.1007/978-3-319-93354-2_12.
  • Zheng, G., Shankaran, R., Valli, C., (2017), Cyber Security for Wireless Implants. Wearable Sensors: Applications, design and implementation, 27p., Bristol, UK, IoP Publishing, DOI: 10.1088/978-0-7503-1505-0.

Journal Articles

  • Yang, W., Wang, S., Hu, J., Zheng, G., Yang, J., Valli, C., (2019), Securing Deep Learning Based Edge Finger-vein Biometrics with Binary Decision Diagram. IEEE Transactions on Industrial Informatics, 15(3), 10, IEEE.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C., (2019), Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry, 11(2), 141, DOI: 10.3390/sym11020141.
  • Yang, W., Wang, S., Zheng, G., Valli, C., (2019), Impact of feature proportion on matching performance of multi-biometric systems. ICT Express, 99(99), 99, DOI: 10.1016/j.icte.2018.03.001.
  • Yang, W., Wang, S., Zheng, G., Yang, J., Valli, C., (2019), A Privacy-Preserving Lightweight Biometric System for Internet-of-Things Security. IEEE Communications Magazine, In press(In press), In press.
  • Zheng, G., Shankaran, R., Yang, W., Valli, C., Qiao, L., Orgun, M., Mukhopadhyay, SC., (2019), A Critical Analysis of ECG-based Key Distribution for Securing Wearable and Implantable Medical Devices. IEEE Sensors Journal, 99(99), 1-1, IEEE Sensors Council, DOI: 10.1109/JSEN.2018.2879929.
  • Chaudhry, J., Qidwai, U., Zeeshan, HM., Valli, C., (2019), Secure Detection of Critical Cardiac Abnormalities for Wireless Body Area Networks. Computer Systems Science and Engineering, article in press(article in press), 11p., Leicester, United Kingdom, CRL Publishing.
  • McAteer, I., Ibrahim, A., Zheng, G., Yang, W., Valli, C., (2019), Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), 34, Switzerland, DOI: https://doi.org/10.3390/technologies7020034.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Chaudhry, J., Adi, E., Valli, C., (2018), Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem. IEEE Access, 6(26 January 2018), 9390-9403, IEEE, DOI: 10.1109/ACCESS.2018.2799522.
  • Zheng, G., Yang, W., Valli, C., Qiao, L., Shankaran, R., Orgun, MA., Mukhopadhyay, SC., (2018), Finger-to-Heart(F2H): Authentication for Wireless Implantable Medical Devices. IEEE Journal of Biomedical and Health Informatics, 99(99), 99, USA, IEEE, DOI: 10.1109/JBHI.2018.2864796.
  • Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J., (2018), A security review of local government using NIST CSF: a case study. Journal of Supercomputing, 74(10), 5171-5186, Springer, DOI: 10.1007/s11227-018-2479-2.
  • Yang, W., Wang, S., Zheng, G., Chaudhry, J., Valli, C., (2018), ECB4CI: An Enhanced Cancelable Biometric System for Securing Critical Infrastructures. Journal of Supercomputing, 74(10), 4893-4909, DOI: 10.1007/s11227-018-2266-0.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C., (2018), A Fingerprint and Finger-vein Based Cancelable Multi-biometric System. Pattern Recognition, 78(June 2018), 242-251, DOI: 10.1016/j.patcog.2018.01.026.
  • Chernyshev, M., Valli, C., Johnstone, M., (2017), Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Transactions on Information Forensics and Security, 12(7), 1625-1636, IEEE Signal Processing Society, DOI: 10.1109/TIFS.2017.2678463.
  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  • Chernyshev, M., Valli, C., Hannay, P., (2016), On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593, Piscataway, USA, IEEE, DOI: 10.1109/TIFS.2015.2507542.

Conference Publications

  • Valli, C., Johnstone, M., Fleming, R., (2018), A Survey of Lawyers’ Cyber Security Practises in Western Australia. Annual ADFSL Conference on Digital Forensics, Security and Law, 219-226, Florida, USA, Association of Digital Forensics, Security and Law.
  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C., (2018), Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 235(13-15 December, 2017), 291-298, Springer, Cham, Springer, DOI: 10.1007/978-3-319-90775-8_23.
  • Chaudhry, J., Farmand, S., Islam, S., Islam, MR., Hannay, P., Valli, C., (2018), Discovering trends for the development of novel authentication applications for dementia patients. International Conference on Applications and Techniques in Cyber Security and Intelligence, Applications and Techniques in Cyber Security and Intelligence, 580(16-18 June, 2017), 220-237, China, Springer, DOI: 10.1007/978-3-319-67071-3_29.
  • Syed, N., Baig, Z., Valli, C., Ibrahim, A., (2017), Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. iThings-GreenCom-CPSCom-SmartData 2017, 748-755, DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115.
  • Chaudhry, J., Ahmad, M., Habib, MA., Ashraf, R., Valli, C., (2017), Enhancements in Data-Recovery and Re-Transmit Mechanisms of Transmission Control Protocol Enabled Medical Devices. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops, 121-12721-127, IEEE.
  • Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmed, M., Valli, C., (2017), AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops, 121-127, IEEE, DOI: 10.1109/LCN.Workshops.2017.73.
  • Murray, G., Johnstone, M., Valli, C., (2017), The convergence of IT and OT in critical infrastructure. Proceedings of the 15th Australian Information Security Management Conference, 149-155, Perth, WA, Edith Cowan University.
  • Peacock, M., Johnstone, M., Valli, C., (2017), Security Issues with BACnet Value Handling. Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP) 2017, 546-552, Science and Technology Publications.
  • Bothur, D., Zheng, G., Valli, C., (2017), A critical analysis of security vulnerabilities and countermeasures in a smart ship system. The Proceedings of 15th Australian Information Security Management Conference, 81-87, Perth, Australia, Edith Cowan University.
  • Rabadia, P., Valli, C., Ibrahim, A., Baig, Z., (2017), Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference, 10p., Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a839e6d1d283.
  • Zheng, G., Zhang, G., Yang, W., Valli, C., Shankaran , R., Orgun, MA., (2017), From WannaCry to WannaDie: Security Trade-offs and Design for Implantable Medical Devices. 17th International Symposium on Communications and Information Technologies (ISCIT2017), 1-5, IEEE.
  • Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, IEEE Computer Society, DOI: 10.1109/HICSS.2016.678.
  • Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA, ECU Security Research Institute.
  • Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virginia, USA, Association of Digital Forensics, Security and Law.
  • Thomas, T., Valli, C., (2015), Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context. Proceedings of the 13th Australian Digital Forensics Conference, 22-36, Perth, WA, ECU Security Research Institute.
  • Rabadia, P., Valli, C., (2015), Analysis into developing accurate and efficient intrusion detection approaches. Proceedings of 13th Australian Digital Forensics Conference, 70-76, Perth, WA, ECU Security Research Institute.
  • Heriyanto, A., Valli, C., Hannay, P., (2015), Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference, 5-14, Perth, WA, ECU Security Research Institute.
  • Chernyshev, M., Valli, C., Hannay, P., (2015), 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15), 349-352, WorldComp.
  • Valli, C., Martinus, I., Johnstone, M., (2014), Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management, 71-75, CSREA Press.
  • Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA, Association of Digital Forensics, Security and Law.
  • Rabadia, P., Valli, C., (2014), Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts. Proceedings of 12th Australian Digital Forensics Conference, 114-121, Perth, W.A., ECU, DOI: 10.4225/75/57b3e7d5fb882.

Research Student Supervision

Principal Supervisor

  • Doctor of Information Technology,  A METHOD FOR SECURING ONLINE COMMUNITY SERVICE: A STUDY OF SELECTED WESTERN AUSTRALIAN COUNCILS
  • Doctor of Philosophy,  AN INVESTIGATION INTO REMOTE TRANSACTIONS.
  • Doctor of Philosophy,  THE DEVELOPMENT OF AN ATTACK GRAPH USING APPLIED LEVELS OF DECEPTION FOR DIRECTING ATTACK METHODS IN A HONEYNET.
  • Doctor of Information Technology,  SECURITY AWARENESS BY ONLINE BANKING USERS IN WESTERN AUSTRALIAN OF PHISHING ATTACKS
  • Doctor of Philosophy,  .
  • Doctor of Philosophy,  BLIND STEGANALYSIS USING FRACTAL FEATURES
  • Doctor of Philosophy,  DISCOURSES OF TERRORISM: THE ROLE OF INTERNET TECHNOLOGIES (SOCIAL MEDIA AND ONLINE PROPAGANDA) ON ISLAMIC RADICALISATION, EXTREMISM AND RECRUITMENT POST 9/11
  • Doctor of Philosophy,  A NON-DEVICE SPECIFIC FRAMEWORK FOR THE DEVELOPMENT OF FORENSIC LOCATIONAL DATA ANALYSIS PROCEDURE FOR CONSUMER GRADE SMALL AND EMBEDDED DEVICES
  • Doctor of Information Technology,  A FORENSICS FRAMEWORK AND METHOD IN THE ACQUISITION AND EXTRACTION OF DATA FROM NAND FLASH MEMORY STORAGE CHIP
  • Doctor of Philosophy,  SECURE PORTABLE EXECUTION AND STORAGE ENVIRONMENTS: A CAPABILITY TO IMPROVE SECURITY FOR REMOTE WORKING
  • Doctor of Philosophy,  AN INVESTIGATION INTO FACTORS INHIBITING AUSTRALIAN END-USERS FROM UTILISING ADSL ROUTER SECURITY EFFECTIVELY
  • Master of Science (Computer Science),  AUDIT TRAILS AND ORGANISATIONAL BARRIERS.
  • Master of Science (Computer Science),  PHYSICAL LAYER SECURITY USING OPTICAL STEGANOGRAPHY AND ENCODING TECHNIQUES IN OPTICAL NETWORKS
  • Doctor of Philosophy,  EXTRACTION OF PATTERNS IN SELECTED NETWORK TRAFFIC FOR A PRECISE AND EFFICIENT INTRUSION DETECTION APPROACH

Co-principal Supervisor

  • Doctor of Philosophy,  MINING CLIMATE DATA FOR SHIRE LEVEL WHEAT YIELD PREDICTIONS IN WESTERN AUSTRALIA

Associate Supervisor

  • Doctor of Philosophy,  AN INVESTIGATION INTO OFF-LINK IPV6 HOST ENUMERATION SEARCH TECHNIQUES
  • Doctor of Philosophy,  ANOMALY DETECTION IN BACNET/IP MANAGED BUILDING AUTOMATION SYSTEMS
  • Doctor of Philosophy,  THE INFORMATION STRATEGY REQUIREMENTS OF THE UNIT STATES GOVERNMENT FROM 2004 ONWARDS.
  • Doctor of Philosophy,  AN INTELLIGENCE MODEL FOR TERRORIST INCIDENT PREVENTION FOR AUSTRALIAN POLICE: A SYSTEMIC INVESTIGATION
  • Doctor of Philosophy,  AN INVESTIGATION INTO ELECTRONIC INFORMATION SECURITY IN GENERAL PRACTICE.
Skip to top of page