Staff Directory

190549 10150112656258576 468029 n

Contact Details


A researcher/practitioner in information security area with over five years of industrial and academic experience. His academic qualifications include both First class BSc (Hons) degree in Information Technology (specialised in Computer Systems and Networking) as well as, a Distinction for MSc level degree specialised in Information Systems Security at Sheffield Hallam University, United Kingdom.

Further, he is an information security professional/digital forensic consultant with below certifications;

Certified Information Systems Security Professional – CISSP
GIAC Certified Forensic Analyst -GCFA
Certified Ethical Hacker – C|EH
Fellow Member of Higher Education Academy – FHEA -UK


Amila Perera is working as a lecturer in information security and forensics at University of South Wales. He has specialised in researching effective solutions to address the challenges in digital forensics and intrusion pattern analysis areas. Amila has participated as a speaker at numerous conferences and workshops on various information security topics in Europe and Asia Pacific region.


2015 – Present : Lecturer in Forensics/Security at University of South Wales, United Kingdom
2011 – Present : Visiting Lecturer at University of Colombo School of Computing, Sri Lanka – MSc in Information Systems Security
2014 – 2015 : Senior Information Security Specialist at TechCERT / A Division of LK Domain Registry, Sri Lanka
2011 – 2013 : Information Security Specialist at TechCERT / A Division of LK Domain Registry, Sri Lanka
2010 – 2011 : Information Security Associate at TechCERT / A Division of LK Domain Registry, Sri Lanka


Validating Data Extraction from Hard Disk Drives(Peer review of First Method fit for Publication)
Client : Home Office(UK)
Publication Reference : ISBN 978-1-78655-131-3, CAST 062 16

The CAST Key Reference Hard Disk (CKRHD) consists of a conventional mechanical hard disk drive of a specific capacity; the complete user addressable storage capacity which is present on the disk is prepared with known data. The purpose of the CKRHD is to allow users to assess the extent to which an imaging process acquires an image of the user addressable area of a hard disk drive.

This document provides information about the preparation procedure used by CAST in the creation of each CKRHD over the period July 2015 to April 2016. The procedure complies with the principles which are detailed in ‘CAST publication 063/16’. Users may wish to refer to both documents in order to understand the scope and utility of the CKRHD, how it was created and how it may be applied to local method validation tasks. Competent users may use this procedure to prepare their own reference disks in the style of a CKRHD if desired.


Fellow member of Higher Education Academy UK – FHEA
Member of British Computer Society – MBCS
Certified Member of International Information Systems Security Certification Consortium – (ISC)2
Global Information Assurance Certification (GIAC)
Certified Member of International Council of Electronic Commerce Consultants – EC-Council
Cisco Certified Network Associate (CCNA) Certification – CISCO


Digital Forensic Analyst @ Cyber Defence Centre(CDC | USW)
Member of Information Security Research Group @USW


Akarawita, I. U., Perera, A. B., & Atukorale, A. (2015). ANDROPHSY–Forensic Framework for Android. In International Conference on Advances in ICT for Emerging Regions (ICTer) (Vol. 250, p. 258).

Algiriyage, N., Jayasena, S., Dias, G., Perera, A., & Dayananda, K. (2013, December). Identification and characterization of crawlers through analysis of web logs. In Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on (pp. 150-155). IEEE.

Areas of Expertise

Digital Forensics, Information Security, Intrusion Pattern Analysis and Incident Response

If you are a journalist on deadline and you need to speak with a member of university staff with particular expertise, please contact the Press Office.