Author Archives: Peter Hannay

Zurich!

I thought I’d vary from just posting my academic papers and publish some information on my experiences in Zurich. Maybe some of this will assist others visiting the city. I’ll continue to provide updates and edits during my stay in … Continue reading

Posted in Uncategorized | Leave a comment

Paper: “Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms”

Title: Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms Authors: Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, Mike Johnstone Abstract The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement.This paper discusses … Continue reading

Posted in paper, security | Leave a comment

Paper: “Geo Forensics: Classes of Locational Data Sources for Embedded Devices”

Title: Geo Forensics: Classes of Locational Data Sources for Embedded Devices Authors: Peter Hannay Abstract A number of devices, web services and applications are being released with, or updated to be locationally aware. The use of location data can be … Continue reading

Posted in forensics, gps, paper | Leave a comment

Paper: “Eavesdropping on the Smart Grid”

Title: Eavesdropping on the Smart Grid Authors: Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Chris Holme Abstract An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was … Continue reading

Posted in paper, security | Leave a comment

Paper: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering

Title: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering Authors: Peter Hannay, Greg Baatard Abstract The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information … Continue reading

Posted in gps, paper, security | Leave a comment

Paper: “The 2011 IDN Homograph Attack Mitigation Survey”

Title: The 2011 IDN Homograph Attack Mitigation Survey Authors: Peter Hannay, Greg Baatard Abstract The advent of internationalized domain names (IDNs) has introduced a new threat, with the non-English character sets allowing for visual mimicry of domain names. Whilst this … Continue reading

Posted in paper, security | Leave a comment

Paper: “Using traffic analysis to identify The Second Generation Onion Router”

Title: Using traffic analysis to identify The Second Generation Onion Router Authors: John Barker, Peter Hannay, Patryk Szewczyk Abstract Anonymous networks provide security for users by obfuscating messages with encryption and hiding communications amongst cover traffic provided by other network … Continue reading

Posted in paper, security | Leave a comment

Paper: “GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering”

Title: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering Authors: Peter Hannay, Greg Baatard Abstract The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information … Continue reading

Posted in forensics, gps, paper, security | Leave a comment

Paper: “Kindle Forensics: Acquisition & Analysis”

Title: Kindle Forensics: Acquisition & Analysis Authors: Peter Hannay Abstract The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, … Continue reading

Posted in forensics, paper, security | Leave a comment

Paper: “Backtrack in the Outback – A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia”

Title: Backtrack in the Outback – A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia Authors: Craig Valli, Andrew Woodward, Peter Hannay Abstract The authors were involved in extensive vulnerability assessment and penetration testing of over 15 … Continue reading

Posted in paper, security | Leave a comment