Category Archives: paper

Paper: “Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms”

Title: Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms Authors: Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, Mike Johnstone Abstract The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement.This paper discusses … Continue reading

Posted in paper, security | Leave a comment

Paper: “Geo Forensics: Classes of Locational Data Sources for Embedded Devices”

Title: Geo Forensics: Classes of Locational Data Sources for Embedded Devices Authors: Peter Hannay Abstract A number of devices, web services and applications are being released with, or updated to be locationally aware. The use of location data can be … Continue reading

Posted in forensics, gps, paper | Leave a comment

Paper: “Eavesdropping on the Smart Grid”

Title: Eavesdropping on the Smart Grid Authors: Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Chris Holme Abstract An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was … Continue reading

Posted in paper, security | Leave a comment

Paper: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering

Title: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering Authors: Peter Hannay, Greg Baatard Abstract The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information … Continue reading

Posted in gps, paper, security | Leave a comment

Paper: “The 2011 IDN Homograph Attack Mitigation Survey”

Title: The 2011 IDN Homograph Attack Mitigation Survey Authors: Peter Hannay, Greg Baatard Abstract The advent of internationalized domain names (IDNs) has introduced a new threat, with the non-English character sets allowing for visual mimicry of domain names. Whilst this … Continue reading

Posted in paper, security | Leave a comment

Paper: “Using traffic analysis to identify The Second Generation Onion Router”

Title: Using traffic analysis to identify The Second Generation Onion Router Authors: John Barker, Peter Hannay, Patryk Szewczyk Abstract Anonymous networks provide security for users by obfuscating messages with encryption and hiding communications amongst cover traffic provided by other network … Continue reading

Posted in paper, security | Leave a comment

Paper: “GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering”

Title: GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering Authors: Peter Hannay, Greg Baatard Abstract The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information … Continue reading

Posted in forensics, gps, paper, security | Leave a comment

Paper: “Kindle Forensics: Acquisition & Analysis”

Title: Kindle Forensics: Acquisition & Analysis Authors: Peter Hannay Abstract The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, … Continue reading

Posted in forensics, paper, security | Leave a comment

Paper: “Backtrack in the Outback – A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia”

Title: Backtrack in the Outback – A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia Authors: Craig Valli, Andrew Woodward, Peter Hannay Abstract The authors were involved in extensive vulnerability assessment and penetration testing of over 15 … Continue reading

Posted in paper, security | Leave a comment

Paper: “Using Traffic Analysis to Identify Tor Usage – A Proposed Study”

Title: Using Traffic Analysis to Identify Tor Usage – A Proposed Study Authors: John Barker, Peter Hannay, Christopher Bolan Abstract Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal of … Continue reading

Posted in paper, security | Leave a comment