Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Professor Craig Valli

Director, ECU Security Research Institute

Contact Information Telephone: +61 8 6304 5109, Mobile: 0447 853 517, Email: c.valli@ecu.edu.au, Campus: Joondalup, Room: JO23.306
Staff Member Details
Telephone: +61 8 6304 5109
Mobile: 0447 853 517
Email: c.valli@ecu.edu.au
Campus: Joondalup  
Room: JO23.306  

 

Professor Craig Valli is the Director of the ECU Security Research Institute and Professor (Digital Forensics) within the School of Science.

Background

Professor Craig Valli has over 30 years experience in the ICT Industry and consults to industry and government on cyber security and digital forensics matters. Along with being Director of the Edith Cowan University Security Research Institute, he is a Professor of Digital Forensics, a Fellow of the Australian Computer Society and Director of the Australian Computer Society Centre of Expertise in Security at ECU. He also currently holds the position of research director for the Australian Cyber Security Research Institute. Craig is the current President of the High Tech Crime Investigators Association (Australian Chapter) and a Member of the INTERPOL Cyber Crime Experts Group.

Craig has over 100 peer reviewed academic publications in cyber security and digital forensics. He serves on several cyber security related conference committees and journal editorial boards. Craig is also the founder and current Chair of the Australian Digital Forensics Conference.

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association
  • High Tech Crime Investigators Association

Awards and Recognition

National and International Awards

  • 2010 WAITTA - IT Achiever of the Year Award
  • 2010 Inventor of the Year Award Finalist

Research Areas and Interests

  • Network Security and Forensics, Honeypots, Intrusion Detection Systems, Internet Misuse, Compute Clustering (Beowulf), Computer Forensics, Wireless Security and SCADA Security

Qualifications

  • Bachelor of Education, Edith Cowan University.
  • Masters of Management Information Systems, Edith Cowan University.
  • Doctor of Information Technology, Edith Cowan University, 2004.
  • Diploma of Teaching, Western Australian CAE, 1985.

Research

Recent Research Grants

  • Academic Centre of Cyber Security Excellence,  Department of Education and Training,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • ESSENTIAL - Evolving Security SciencE through Networked Technologies, Information policy And Law,  European Commission,  Horizons 2020,  2017 - 2020,  $394,374.
  • Cyber Security Survey and Professional Development Seminars,  Law Society of WA,  Grant,  2017 - 2018,  $30,000.
  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Cyber Electronic Warfare: The effects of team dynamics, cognitive load and team mental models.,  Defence Science and Technology Group of the Department of Defence,  Competitive Evaluation Research Agreement (CERA) Program,  2017 - 2018,  $153,407.
  • Internet of Things (IoT) ModBUS and BacNET,  Cisco Systems Australia Pty Ltd,  CISCO - Grant,  2015 - 2018,  $125,000.
  • Advanced Biometric Template Protection: Design of a Cancelable Biometric Framework,  Defence Science and Technology Group of the Department of Defence,  Competitive Evaluation Research Agreement (CERA) Program,  2017 - 2018,  $128,226.
  • Design of a Biometric Protection System using Feature Transformation Techniques,  Edith Cowan University,  Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017,  2017,  $8,700.
  • Internet of Things (IoT),  Cisco Systems Australia Pty Ltd,  CISCO - Grant,  2016 - 2017,  $160,000.
  • Investigation of social media for radicalisation and terrorism in the Maldives,  Edith Cowan University,  Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 ? 2017,  2017,  $11,000.
  • Cyber Check.me,  City of Joondalup,  Grant,  2015 - 2016,  $16,740.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.
  • Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582,  European Commission,  Grant - Seventh Framework Programme (FP7),  2012 - 2015,  $223,800.
  • Small Medium Enterprise Cyber Security Engagement (SMESEC) - Project Pilot,  City of Wanneroo,  Grant,  2013 - 2014,  $21,908.
  • Scalable Measures for Automated Recognition Technologies (SMART),  European Union,  EU Seventh Framework Program,  2011 - 2014,  $389,772.
  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN),  Griffith University,  Grant - NIRAP,  2009 - 2013,  $37,139.
  • CRC for Cyber Security (CyberCRC),  Department of Commerce,  Innovation Co-investment Program,  2013,  $707,833.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010 - 2012,  $77,154.
  • Transceiver Array for Optical Media,  Attorney-General - Commonwealth,  Grant,  2010 - 2012,  $293,091.
  • Overclocking of mechanical hard disk drives,  Attorney General's D Branch,  Attorney General's Department, D Branch Grant,  2011 - 2012,  $54,545.
  • Update on Investigation into RFID Threats and Vulnerabilities,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010,  $10,000.
  • An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector,  Department of Defence,  Defence Signals Directorate - Grant,  2005 - 2006,  $25,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies,  Department of Defence,  Defence Signals Directorate - Grant,  2004 - 2005,  $39,000.

Recent Publications (within the last five years)

Book Chapters

  • Zheng, G., Shankaran, R., Valli, C., (2017), Cyber Security for Wireless Implants. Wearable Sensors: Applications, design and implementation, 8-1~8-27, Bristol UK, IoP Publishing, DOI: 10.1088/978-0-7503-1505-0.

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  • Chaudhry, J., Qidwai, U., Zeeshan, HM., Valli, C., (2017), Secure Detection of Critical Cardiac Abnormalities for Wireless Body Area Networks. Computer Systems Science and Engineering, article in press(article in press), 11p., Leicester, United Kingdom, CRL Publishing.
  • Chernyshev, M., Valli, C., Hannay, P., (2016), On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593, Piscataway, USA, IEEE.

Conference Publications

  • Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmed, M., Valli, C., (2017), AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments, 121-127, IEEE, DOI: 10.1109/LCN.Workshops.2017.73.
  • Chaudhry, J., Ahmad, M., Habib, M., Ashraf, R., Valli, C., (2017), Enhancements in Data-Recovery and Re-Transmit Mechanisms of Transmission Control Protocol Enabled Medical Devices. 2017 IEEE 42nd Conference on Local Computer Networks, 42(9-12 Oct 2017), 121-12721-127, Singapore, IEEE.
  • Zheng, G., Zhang, G., Yang, W., Valli, C., Shankaran , R., Orgun, MA., (2017), From WannaCry to WannaDie: Security Trade-offs and Design for Implantable Medical Devices. 17th International Symposium on Communications and Information Technologies (ISCIT2017), 1-5, IEEE.
  • Bothur, D., Zheng, G., Valli, C., (2017), A critical analysis of security vulnerabilities and countermeasures in a smart ship system., 1-7.
  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C., (2017), Application of 3D Delaunay Triangulation in Fingerprint Authentication System., 8.
  • Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, IEEE Computer Society, DOI: 10.1109/HICSS.2016.678.
  • Chernyshev, M., Valli, C., Hannay, P., (2015), 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15), 349-352.
  • Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virginia, USA, Association of Digital Forensics, Security and Law.
  • Thomas, T., Valli, C., (2015), Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context. Proceedings of the 13th Australian Digital Forensics Conference, 22-36, Perth, WA, Edith Cowan University.
  • Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA, Edith Cowan University.
  • Heriyanto, A., Valli, C., Hannay, P., (2015), Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference, 5-14, Perth, WA, Edith Cowan University.
  • Rabadia, P., Valli, C., (2015), Analysis into developing accurate and efficient intrusion detection approaches. Proceedings of 13th Australian Digital Forensics Conference, 70-76, Perth, WA, Edith Cowan University.
  • Rabadia, P., Valli, C., (2014), Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts. Proceedings of 12th Australian Digital Forensics Conference, 114-121, Perth, W.A., ECU.
  • Valli, C., Martinus, I., Johnstone, M., (2014), Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management, 71-75, CSREA Press.
  • Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA, Association of Digital Forensics, Security and Law.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia, Security Research Centre, Edith Cowan University.
  • Valli, C., Rabadia, P., Woodward, A., (2013), Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference, 141-149, Edith Cowan University, Security Research Centre, Edith Cowan University.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C., (2012), Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference, 54-60, Perth, Western Australia, Security Research Centre, Edith Cowan University.
  • Coole, M., Woodward, A., Valli, C., (2012), Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference, 36-43, Perth, Western Australia, Security Research Centre, Edith Cowan University.
  • Valli, C., (2012), SSH -- Somewhat Secure Host. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012, 227-235, Melbourne, Springer, DOI: 10.1007/978-3-642-35362-8.

Research Student Supervision

Principal Supervisor

  • Doctor of Information Technology,  A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils
  • Doctor of Philosophy,  An Investigation Into Remote Transactions.
  • Doctor of Philosophy,  The Development Of An Attack Graph Using Applied Levels Of Deception For Directing Attack Methods In A Honeynet.
  • Doctor of Information Technology,  Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks
  • Doctor of Philosophy,  .
  • Doctor of Philosophy,  Blind Steganalysis Using Fractal Features
  • Doctor of Philosophy,  Discourses Of Terrorism: The Role Of Internet Technologies (social Media And Online Propaganda) On Islamic Radicalisation, Extremism And Recruitment Post 9/11
  • Doctor of Information Technology,  A Forensics Framework And Method In The Acquisition And Extraction Of Data From Nand Flash Memory Storage Chip
  • Doctor of Philosophy,  Secure Portable Execution And Storage Environments: A Capability To Improve Security For Remote Working
  • Doctor of Philosophy,  A Non-device Specific Framework For The Development Of Forensic Locational Data Analysis Procedure For Consumer Grade Small And Embedded Devices
  • Doctor of Philosophy,  An Investigation Into Factors Inhibiting Australian End-users From Utilising Adsl Router Security Effectively
  • Master of Science (Computer Science),  Audit Trails And Organisational Barriers.

Co-principal Supervisor

  • Doctor of Philosophy,  Mining Climate Data For Shire Level Wheat Yield Predictions In Western Australia

Associate Supervisor

  • Doctor of Philosophy,  An Investigation Into Off-link Ipv6 Host Enumeration Search Techniques
  • Doctor of Philosophy,  The Information Strategy Requirements Of The Unit States Government From 2004 Onwards.
  • Doctor of Philosophy,  An Intelligence Model For Terrorist Incident Prevention For Australian Police: A Systemic Investigation
  • Doctor of Philosophy,  An Investigation Into Electronic Information Security In General Practice.
Skip to top of page