Dr Raymond Choo, Fulbright Scholar in Cyber Security and Digital Forensics

Choo, Kim-Kwang Raymond (中文简介

Aug 2016 - Current: Cloud Technology Endowed Professorship, The University of Texas at San Antonio, USA
Mar 2011 - Current: Associate Professor
, University of South Australia, Australia
Senior Member, IEEE
Fellow, Australian Computer Society (澳大利亚计算机协会会士)

Other affiliations

  • Sep 2015 – Feb 2016: Visiting Expert (访问专家) @ INTERPOL Global Complex for Innovation (IGCI; 国际刑警全球综合性创新总部)
  • May 2015 – Current: Co-Chair @ Education Council, Cloud Security Alliance Asia Pacific (雲安全聯盟亞太區)
  • Oct 2011  Current: Justice of the Peace for SA (太平紳士(南澳洲))
  • May 2008  Current: Member of the International Consultancy Group (Research) @ United Nations Office on Drugs and Crime-Korean Institute of Criminology Virtual Forum against Cybercrime Programme

Grants 

I am the recipient of the following grants: 
  • Cooperative Research Centre for Data to Decision grant "Integrated Policing: Federated Data Platform" - Markus Stumptner (0.3 FTE), Andy Koronios (0.05 FTE), Jixue Li (0.05 FTE ), Wolfgang Meyer (0.2 FTE), Jing Gao (0.1 FTE), Terence Chan (0.2 FTE), Kim-Kwang Raymond Choo (0.2 FTE); AUD 1,236,883 (2016-2019)
  • auDa Foundation grant "Defence against the Dark Arts: resisting online social manipulation and propaganda" - Helen Ashman, Kim-Kwang Raymond Choo, Kirsten Wahlstrom; AUD 78,864 (2016-2019)
  • Government of South Australia, SA Health grant "The feasibility and validity of obtaining pre-illness activity data in critically ill patients using 'smart-phone' technology: a validation study" - Samuel Gluck (Royal Adelaide Hospital), Kim-Kwang Raymond Choo, Adam Deane (Royal Adelaide Hospital and Adelaide University), Theodore lwashyna (University of Michigan, USA); AUD 49,900 (2016)
  • Ministry of Education, Singapore grant "Toward secure and privacy-preserving computing in mobile cloud" - Rongxing Lu (Nanyang Technology University), Kim-Kwang Raymond Choo; SGD 99,803 (2015-2017)
  • Nanyang Technology University College of Engineering, Singapore grant "Secure Fog Computing System Design and Implementation" - Rongxing Lu (Nanyang Technology University), Gaoxi Xiao (Nanyang Technology University), Boon Hee Soong (Nanyang Technology University), Ping Wang (Nanyang Technology University), Jie Zhang (Nanyang Technology University), Kim-Kwang Raymond Choo, Xiaodong Lin (University of Ontario Institute of Technology, Canada), Sherman (Xuemin) Shen (University of Waterloo, Canada); SGD 50,000 (2015-2016)
  • University of South Australia Research Themes Investment Scheme grant "A Public Health Approach to Dealing with Sexting" - Kim-Kwang Raymond Choo, Barbara Spears, Nicholas Procter, Carmel Taddeo, Colette Langos, Lesley-Anne Ey; AUD 35,000 (2015-2016)
  • [Cat 1] National Drug Law Enforcement Research Fund (NRLERF) grant "Evidence-based digital forensic framework for drug (and other serious and organised) crime law enforcement investigations in the cloud computing environment" - Kim-Kwang Raymond Choo (0.4 FTE), Jill Slay (0.1 FTE); AUD 269,319 (2013-2015) 
  • [Cat 3] BAE Systems stratsec grant "Information Security Research Winter School 2012" (Dr Kim-Kwang Raymond Choo and Adjunct Professor Jill Slay; AUD 60,000 (2012)), 
  • [Cat 1] National Drug Law Enforcement Research Fund (NRLERF) grant "Exploitation of Electronic Evidence from Mobile Phone Mediated Drug Crime" - Jill Slay and Kim-Kwang Raymond Choo; AUD 271,040 (2011–2013)
  • [Cat 1] Australian Research Council Discovery Projects grant (DP1096833) "The evolution of cybercrime: the monitoring of serious crime in cyberspace" - Rod Broadhurst (Australian National University), Kim-Kwang Raymond Choo; AUD 350,000 (2010-2012)
  • [Cat 3] Australasian Institute of Judicial Administration Incorporated (AIJA) grant "ICT and the judiciary: multimedia glossary" - Jill Slay, Kim-Kwang Raymond Choo, Nina Evans; AUD 10,000 (2011)

Research

I have co-edited three books entitled "Cloud Security Ecosystem" (published by Syngress: An Imprint of Elsevier, 2015)Mobile Security and Privacy” (published by Syngress: An Imprint of Elsevier, 2016) and “Contemporary Digital Forensic Investigations of Cloud and Mobile Applications” (published by Syngress: An Imprint of Elsevier, 2016), as well as (co)authoring a number of publications in the areas of cyber crime and security, and digital forensics including 
Secure Key Establishment
  • a book entitled "Secure Key Establishment" published in Springer’s “Advances in Information Security” book series, 
  • a book entitled "Cloud Storage Forensics, 1st Edition" published by Syngress: An Imprint of Elsevier (Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories). For reviews of our book, see
  • seven Australian Government’s Australian Institute of Criminology (AIC) refereed monographs, 
  • 27 refereed book chapters, 
  • 144 refereed journal articles, 
  • 76 refereed conference articles and 
  • six parliamentary submissions – see 
I am the co-inventor of two PCT and one provisional patent applications on digital forensics and mobile app security filed in 2015.

My research has been widely cited (and my Google Scholar h-index is 28 - My Google Scholar Page, and my Erdős number is 4), including in key government reports such as the 
  • (Australian) 2010 Australian Government House of Representatives Standing Committee on Communications Report on the Inquiry into Cyber Crime, 2011 Australian Government House of Representatives Joint Select Committee’s Report on Cyber-Safety, 2013 Australian Crime Commission Fact Sheet on “Cyber and Technology Enabled Crime”2013 Australian Government House of Representatives Joint Select Committee on Cyber-Safety's Report on the Inquiry into Cybersafety for Senior Australians, 
  • (International) Working paper for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, United Nations Office on Drugs and Crime (UNODC) 2011 “Handbook on Identity-related Crime”, 2010 US CRS Report for Congress (Prepared for Members and Committees of Congress) entitled “Organized Crime: An Evolving Challenge for U.S. Law Enforcement”, International Telecommunication Union (ITU) 2011 “Understanding Cybercrime: A Guide For Developing Countries” report, 2012 UNODC “Wildlife and Forest Crime Analytic Toolkit” report, and 
    2013 UK Home Office report entitled "Cyber crime: A review of the evidence".
One of my published cryptographic protocols was included in two independent submissions to the IEEE 802.11, the working group setting the standards for wireless LANs, by computer scientists from Fujitsu Labs in America; and the Internet Engineering Task Force (IETF) / Network Working Group by a team of computer scientists from Tropos Networks (US), Toshiba, Huawei, and University of Murcia. A protocol jointly proposed with Sherman Chow (formerly of New York University, US) was used as in the P2P solution of the Milagro TLS (pairing-based cryptography for Transport Layer Security) presented to the IETF by researchers from MIRACL Ltd in 2016.

My published design principle about how session keys should be constructed in cryptographic (key establishment) protocols that result in significant benefits for their security was cited in a special publication (SP 800-56A) – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography – by the US National Institute of Standards and Technology. This is one of four academic (i.e. non-NIST and non-international standard) citations, and the other three academic citations are publications of (1) Professor Alfred Menezes (University of Waterloo), Professor Phillip Rogaway (UC Davis), Professor Mihir Bellare (UC San Diego), and Professor Dan Boneh (Stanford University) – the top scholars in the field.

Awards 


I am also the recipient of various awards and scholarships including
  1. Winner, Cybersecurity Educator of the Year – APAC, 2016 (2016 Cybersecurity Excellence Awards (CEAs) are produced in cooperation with the Information Security Community on LinkedIn).
  2. Best Research Paper Award, 20th European Symposium on Research in Computer Security (ESORICS 2015) - acceptance rate is 59/298 (~19.8%).
  3. Winning team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015.
  4. Highly Commended award by ANZPAA National Institute of Forensic Science (ANZPAA NIFS).
  5. "2014 Academic Impact and Uptake Award" which recognises researchers who have made important contributions to knowledge and have demonstrated excellence over a period of 5 years in research achievement in an area of strategic importance to the University of South Australia, research leadership and supervision, impact of research in terms of peer recognition and uptake, and strengthening of collaboration across world leading research institutions and groups.
  6. 2010 ACT Pearcey Award for “Taking a risk and making a difference in the development of the Australian ICT industry”
  7. 2010 Consensus IT Professional Award (one of 5 Winners) and 2010 Consensus IT Writers Award Finalist
  8. 2009 Fulbright Professional Scholarship in Australian-United States Alliance Studies, sponsored by the Australian Government Department of Foreign Affairs and Trade
  9. 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the Australian Government's Australian Institute of Criminology (AIC), and through it to the public service of the nation
  10. British Computer Society's Wilkes Award for the best paper published in the 2007 volume of The Computer Journal (Oxford University Press)
  11. 2007 Queensland University of Technology (QUT)'s Faculty of Information Technology Executive Dean’s outstanding Ph.D. thesis commendation
  12. 2005 Australasian Conference on Information Security and Privacy (ACISP 2005) Best Student Paper Award

    Speaking Engagements (see "My Presentations") and Media ("My Media Interviews")

    I have been an invited speaker at a number of conferences in Australia and overseas such as the World Internet Conference (Wuzhen Summit; 世界互联网大会(乌镇)), Jointly Organized by the Cyberspace Administration of China (中国国家互联网信息办公室) and the People's Government of Zhejiang Province (浙江省人民政府), China, 19–21 November 2014.
    • Invited Witness in a private briefing on Bitcoin and alternative remittance systems to the Australian Government Parliamentary Joint Committee on Corporations and Financial Services, 28 March 2014
    • Distinguished Speaker at the International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Gjevik, Norway, September 2016
    • Invited Expert 
      1. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI; 联合国亚洲和远东预防犯罪和罪犯待遇研究所) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)(J15-04250)Training, UNAFEI, Tokyo, Japan, 10 May–18 June 2015
      2. INTERPOL Cyber Research Agenda Workshop, INTERPOL Global Complex for Innovation (國際刑警組織全球創新中心), Singapore, 10 March 2015
      3. 2015 Taiwan International Symposium on Regional Security and Transnational Crimes, Taiwan, 18–23 October 2015, Organised by Ministry of Justice Investigation Bureau (台灣法務部調查局)
      4. United Nations Office on Drugs and Crime–International Telecommunication Union (UNODC-ITU) 2011 Asia-Pacific Regional Workshop on Fighting Cybercrime
    • Keynote Speaker 
      1. SERENE-RISC Spring 2016 Workshop, Vancouver BC, Canada, 27–28 April 2016
      2. International Conference on Data Science and Data Intensive Systems (DSDIS 2015), Sydney, Australia, 11–13 December 2015
      3. Cloud Security Alliance New Zealand Summit 2015, 27 November 2015
      4. International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), Co-organised by Infocomm Development Authority of Singapore, Singapore, 26-27 October 2015
      5. CSO CXO Series Breakfast Event, Sydney, Australia, 31 July 2015, Organised by CSO Australia and Trend Micro
      6. CSO CXO Series Breakfast Event, Melbourne, Australia, 30 July 2015, Organised by CSO Australia and Trend Micro
      7. 2014 International Conference on Cyber-Crime Investigation and Cyber Security (Asia Pacific University of Technology and Innovation, Malaysia)
      8. 2014 International Conference on Applied Linguistics & Language Teaching (National Taiwan University of Science and Technology, Taiwan)
      9. 2014 Anti-Phishing Working Group (APWG)’s Counter-eCrime Operations Summit (CeCOS VIII)
      10. 2011 Economic Crime Asia Conference (Nanyang Technological University, Singapore)
      11. 2010 International Conference on Applied Linguistics (National Chiayi University, Taiwan)
      12. ECPAT Taiwan’s 2008 Conference on Criminal Problems and Intervention Strategy 
    • Plenary Speaker at the 2010 International Conference on Applied Linguistics
    I was one of over 20 international (and one of two Australian) experts consulted by the research team preparing McAfee's commissioned report entitled “Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare
    , and have been interviewed by the
     
    • Australian media: Australian Government House of Representatives "About the House" magazine, ABC News, Advertiser, ARN, Australian Financial Review, Canberra's CityNews magazine, Canberra Times, Computerworld.com.au, Direct Magazine, Herald Sun (& Career One), IT News, My Business Magazine, Public Accountant: The Official Journal of the Institute of Public Accountants, SA Defence Magazine, SC Magazine, Sydney Morning Herald (& Business Day), The Age, The Australian, The Conversation, ZDNet Australia; and
    • International media
      938Live radio,
       
       
      Asia Pacific Security Magazine, China Global, FutureGov, Money Laundering Bulletin, E-finance & Payments Law & Policy, Electric New Paper, Global Times, New Scientist, 
      Prepaid Trends magazine, SC Magazine (US), Sunday Times, and Thomson Reuters Accelus, Regulatory Intelligence - 
      see
       

    Recent Professional Activities (see "Complete Listing")

    1. External Evaluation Member, IEEE Communications and Information Security Technical Committee (CISTC) 2016 Technical Recognition Award Committee
    2. Guest Editor (国际期刊特邀编辑),
      1. IEEE Cloud Computing Magazine: Special Issue on "Legal Clouds: How to Balance Privacy with Legitimate Surveillance and Lawful Data Access" (2015)
    3. General Chair, International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2016)
    4. General Executive ChairIEEE International Conference on Cyber, Physical and Social Computing (CPSCom 2016)
    5. Program Vice-ChairIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China
    6. Co-Chair
    7. Steering Committee

    Academic Visitors

    1. January 2015: Associate Professor Christian W. Probst, Technical University of Denmark 
    2. February 2015 – February 2016: Associate Professor Mengbo Hou, Shandong University’s Lab of Information Security and Cryptography (Supported by a China Scholarship Council Fellowship)
    3. June 2015: Associate Professor Yong Yu, University of Electronic Science and Technology of China
    4. July 2015 – April 2016: Opeyemi Osanaiye (Ph.D. Candidate), University of Cape Town, South Africa

    Prospective PhD Students 

    My door is always open to motivated individuals, particularly those with excellent academic records (and publication track record) if you are interested to apply for scholarships - see http://www.unisa.edu.au/resdegrees/scholarships/default.asp, who are interested in researching on cyber security and digital forensics (technical research), cyber crime (criminology and policy research), anti-money laundering / counter terrorism financing, cryptography and digital forensics. To see what types of problems I work on, please visit " "

    Since joining the University of South Australia in March 2011, I have supervised to completion one DIT, four Ph.D., 13 Master and nine Honours (eight 1st Class, and one 2nd Upper Class Honours) theses. 
    1. Dr. Angela Irwin, 2013 [Ph.D. Thesis: Money laundering and terrorism financing in virtual environments] - Currently, she is a Lecturer at the Centre for Policing, Intelligence and Counter Terrorism (PICT), Macquarie University. 
    2. Dr. Aswami Fadillah Mohd Ariffin, 2013 [Ph.D. Thesis: A general model of forensic data recovery framework for digital CCTV systems] - Currently, he is the Vice President of Cyber Security Responsive Services at CyberSecurity Malaysia.
    3. Yuan (Tom) Gao, 2014 [DIT Thesis: Commercial implementation of shared secret in middleware] - Currently, he is the Microsoft Application and Digital Manager at CSR Limited.
    4. Ben Martini, 2015  [Ph.D. Thesis: ForFACTS: a Forensic Framework for Analysis of Cloud Technologies and Services] - Currently, he is a Post-Doctoral Researcher at the University of South Australia.
    5. Deepa Mani, 2016  [Ph.D. Thesis: Understanding Information Security Risk in Australian Real Estate Sectors].
    6. Ki Hong (Steve) Chon [Under revision; Australian National University; Ph.D. Thesis: Cybercrime Precursors: Towards a Model of Offender Resources]
    I am currently
    the 
    • principal supervisor of nine Ph.D. scholars, and co-supervisor of seven 
      Ph.D. scholars at the University of South Australia; 
    • co-supervisor of one Ph.D. scholar at University of Cape Town;
    • principal supervisor of four Master students at the University of South Australia; and 
    • principal supervisor of a Honours student at the University of South Australia - see
       
      http://people.unisa.edu.au/Raymond.Choo.

    I can be contacted on (email) raymond [DOT] choo [AT] fulbrightmail [DOT] org