Dr Raymond Choo, Fulbright Scholar in Cyber Security and Digital Forensics

Choo, Kim-Kwang Raymond  

Aug 2016 - Current: Cloud Technology Endowed Professorship, The University of Texas at San Antonio, USA
 2017 - Current: Adjunct Associate Professor, University of South Australia, Australia
Apr 2017 - CurrentHonorary Commander, 502nd Air Base Wing, Joint Base San Antonio-Fort Sam Houston, USA 

Senior Member, IEEE
Fellow, Australian Computer Society 

Other affiliations

  • May 2011 – Mar 2017: Associate Professor, University of South Australia, Australia
  • Sep 2015 – Feb 2016: Visiting Expert (访问专家), INTERPOL Global Complex for Innovation (IGCI), Singapore
  • May 2015 – Dec 2016: Co-Chair, Education Council, Cloud Security Alliance Asia Pacific, Singapore
  • Oct 2011 – Current: Justice of the Peace for South Australia, Australia
  • May 2008 – Current: Member of the International Consultancy Group (Research) @ United Nations Office on Drugs and Crime-Korean Institute of Criminology Virtual Forum against Cybercrime Programme


I am the recipient of the following grants: 
  • Cooperative Research Centre for Data to Decision grant "Integrated Policing: Federated Data Platform" - Markus Stumptner (0.3 FTE), Andy Koronios (0.05 FTE), Jixue Li (0.05 FTE ), Wolfgang Meyer (0.2 FTE), Jing Gao (0.1 FTE), Terence Chan (0.2 FTE), Kim-Kwang Raymond Choo (0.2 FTE); AUD 1,236,883 (2016-2019)
  • auDa Foundation grant "Defence against the Dark Arts: resisting online social manipulation and propaganda" - Helen Ashman, Kim-Kwang Raymond Choo, Kirsten Wahlstrom (2016-2019)
  • Government of South Australia, SA Health grant "The feasibility and validity of obtaining pre-illness activity data in critically ill patients using 'smart-phone' technology: a validation study" - Samuel Gluck (Royal Adelaide Hospital), Kim-Kwang Raymond Choo, Adam Deane (Royal Adelaide Hospital and Adelaide University), Theodore lwashyna (University of Michigan, USA) (2016)
  • Ministry of Education, Singapore grant "Toward secure and privacy-preserving computing in mobile cloud" - Rongxing Lu (Nanyang Technology University), Kim-Kwang Raymond Choo (2015-2017)
  • Nanyang Technology University College of Engineering, Singapore grant "Secure Fog Computing System Design and Implementation" - Rongxing Lu (Nanyang Technology University), Gaoxi Xiao (Nanyang Technology University), Boon Hee Soong (Nanyang Technology University), Ping Wang (Nanyang Technology University), Jie Zhang (Nanyang Technology University), Kim-Kwang Raymond Choo, Xiaodong Lin (University of Ontario Institute of Technology, Canada), Sherman (Xuemin) Shen (University of Waterloo, Canada) (2015-2016)
  • University of South Australia Research Themes Investment Scheme grant "A Public Health Approach to Dealing with Sexting" - Kim-Kwang Raymond Choo, Barbara Spears, Nicholas Procter, Carmel Taddeo, Colette Langos, Lesley-Anne Ey (2015-2016)
  • [Cat 1] National Drug Law Enforcement Research Fund (NRLERF) grant "Evidence-based digital forensic framework for drug (and other serious and organised) crime law enforcement investigations in the cloud computing environment" - Kim-Kwang Raymond Choo (0.4 FTE), Jill Slay (0.1 FTE); AUD 269,319 (2013-2015) 
  • [Cat 3] BAE Systems stratsec grant "Information Security Research Winter School 2012" (Dr Kim-Kwang Raymond Choo and Adjunct Professor Jill Slay (2012)), 
  • [Cat 1] National Drug Law Enforcement Research Fund (NRLERF) grant "Exploitation of Electronic Evidence from Mobile Phone Mediated Drug Crime" - Jill Slay and Kim-Kwang Raymond Choo; AUD 271,040 (2011–2013)
  • [Cat 1] Australian Research Council Discovery Projects grant (DP1096833) "The evolution of cybercrime: the monitoring of serious crime in cyberspace" - Rod Broadhurst (Australian National University), Kim-Kwang Raymond Choo; AUD 350,000 (2010-2012)
  • [Cat 3] Australasian Institute of Judicial Administration Incorporated (AIJA) grant "ICT and the judiciary: multimedia glossary" - Jill Slay, Kim-Kwang Raymond Choo, Nina Evans (2011)


I have co-edited three books entitled "Cloud Security Ecosystem" (published by Syngress: An Imprint of Elsevier, 2015)Mobile Security and Privacy” (published by Syngress: An Imprint of Elsevier, 2017) and “Contemporary Digital Forensic Investigations of Cloud and Mobile Applications” (published by Syngress: An Imprint of Elsevier, 2017), as well as (co)authoring a number of publications in the areas of cyber crime and security, and digital forensics including 
Secure Key Establishment
  • a book entitled "Secure Key Establishment" published in Springer’s “Advances in Information Security” book series, 
  • a book entitled "Cloud Storage Forensics, 1st Edition" published by Syngress: An Imprint of Elsevier (Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories). For reviews of our book, see
  • seven Australian Government refereed monographs, 
  • 30 refereed book chapters, 
  • 218 refereed journal articles, 
  • 88 refereed conference articles and 
  • six Australian Government parliamentary submissions – see 
I am the co-inventor of two PCT and one provisional patent applications on digital forensics and mobile app security filed in 2015.

My Google Scholar H-index is 33 and i10-index is 118, and my Erdős number is 4. Citations of my research include governmental reports: 
  • (Australian) 2010 Australian Government House of Representatives Standing Committee on Communications Report on the Inquiry into Cyber Crime, 2011 Australian Government House of Representatives Joint Select Committee’s Report on Cyber-Safety, 2013 Australian Crime Commission Fact Sheet on “Cyber and Technology Enabled Crime”2013 Australian Government House of Representatives Joint Select Committee on Cyber-Safety's Report on the Inquiry into Cybersafety for Senior Australians, 
  • (International) Working paper for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, United Nations Office on Drugs and Crime (UNODC) 2011 “Handbook on Identity-related Crime”, 2010 US CRS Report for Congress (Prepared for Members and Committees of Congress) entitled “Organized Crime: An Evolving Challenge for U.S. Law Enforcement”, International Telecommunication Union (ITU) 2011 “Understanding Cybercrime: A Guide For Developing Countries” report, 2012 UNODC “Wildlife and Forest Crime Analytic Toolkit” report, and 
    2013 UK Home Office report entitled "Cyber crime: A review of the evidence".
One of my published cryptographic protocols was included in two independent submissions to the IEEE 802.11, the working group setting the standards for wireless LANs, by computer scientists from Fujitsu Labs in America; and the Internet Engineering Task Force (IETF) / Network Working Group by a team of computer scientists from Tropos Networks (US), Toshiba, Huawei, and University of Murcia. A protocol jointly proposed with Sherman Chow (formerly of New York University, US) was used as in the P2P solution of the Milagro TLS (pairing-based cryptography for Transport Layer Security) presented to the IETF by researchers from MIRACL Ltd in 2016.

My published design principle about how session keys should be constructed in cryptographic (key establishment) protocols that result in significant benefits for their security was cited in a special publication (SP 800-56A) – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography – by the US National Institute of Standards and Technology. This is one of four academic (i.e. non-NIST and non-international standard) citations, and the other three academic citations are publications of (1) Professor Alfred Menezes (University of Waterloo), Professor Phillip Rogaway (UC Davis), Professor Mihir Bellare (UC San Diego), and Professor Dan Boneh (Stanford University) – the top scholars in the field.


I am also the recipient of various awards and scholarships including
  1. Winner, Cybersecurity Educator of the Year – APAC, 2016 (2016 Cybersecurity Excellence Awards (CEAs) are produced in cooperation with the Information Security Community on LinkedIn).
  2. Best Research Paper Award, 20th European Symposium on Research in Computer Security (ESORICS 2015) - acceptance rate is 59/298 (~19.8%).
  3. Winning team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015.
  4. Highly Commended award by ANZPAA National Institute of Forensic Science (ANZPAA NIFS).
  5. "2014 Academic Impact and Uptake Award" which recognises researchers who have made important contributions to knowledge and have demonstrated excellence over a period of 5 years in research achievement in an area of strategic importance to the University of South Australia, research leadership and supervision, impact of research in terms of peer recognition and uptake, and strengthening of collaboration across world leading research institutions and groups.
  6. 2010 ACT Pearcey Award for “Taking a risk and making a difference in the development of the Australian ICT industry”
  7. 2010 Consensus IT Professional Award (one of 5 Winners) and 2010 Consensus IT Writers Award Finalist
  8. 2009 Fulbright Professional Scholarship in Australian-United States Alliance Studies, sponsored by the Australian Government Department of Foreign Affairs and Trade
  9. 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the Australian Government's Australian Institute of Criminology (AIC), and through it to the public service of the nation
  10. British Computer Society's Wilkes Award for the best paper published in the 2007 volume of The Computer Journal (Oxford University Press)
  11. 2007 Queensland University of Technology (QUT)'s Faculty of Information Technology Executive Dean’s outstanding Ph.D. thesis commendation
  12. 2005 Australasian Conference on Information Security and Privacy (ACISP 2005) Best Student Paper Award

    Speaking Engagements (see "My Presentations") and Media ("My Media Interviews")

    I have been an invited speaker at a number of conferences in Australia and overseas such as the following:
    • Invited Witness in a private briefing on Bitcoin and alternative remittance systems to the Australian Government Parliamentary Joint Committee on Corporations and Financial Services, 28 March 2014
    • Distinguished Speaker at the International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Gjevik, Norway, September 2016
    • Invited Expert 
      1. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)(J15-04250)Training, UNAFEI, Tokyo, Japan, 10 May–18 June 2015
      2. INTERPOL Cyber Research Agenda Workshop, INTERPOL Global Complex for Innovation, Singapore, 10 March 2015
      3. 2015 Taiwan International Symposium on Regional Security and Transnational Crimes, Taiwan, 18–23 October 2015, Organised by Ministry of Justice Investigation Bureau
      4. United Nations Office on Drugs and Crime–International Telecommunication Union (UNODC-ITU) 2011 Asia-Pacific Regional Workshop on Fighting Cybercrime
    • Keynote Speaker 
      1. International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017), in conjunction with IEEE/ACM CHASE 2017, Philadelphia, USA, 17–19 July
      2. SERENE-RISC Spring 2016 Workshop, Vancouver BC, Canada, 27–28 April 2016
      3. International Conference on Data Science and Data Intensive Systems (DSDIS 2015), Sydney, Australia, 11–13 December 2015 
      4. Cloud Security Alliance New Zealand Summit 2015, 27 November 2015 
      5. International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), Co-organised by Infocomm Development Authority of Singapore, Singapore, 26-27 October 2015 
      6. CSO CXO Series Breakfast Event, Sydney, Australia, 31 July 2015, Organised by CSO Australia and Trend Micro 
      7. CSO CXO Series Breakfast Event, Melbourne, Australia, 30 July 2015, Organised by CSO Australia and Trend Micro 
      8. 2014 International Conference on Cyber-Crime Investigation and Cyber Security (Asia Pacific University of Technology and Innovation, Malaysia) 
      9. 2014 International Conference on Applied Linguistics & Language Teaching (National Taiwan University of Science and Technology, Taiwan) 
      10. 2014 Anti-Phishing Working Group (APWG)’s Counter-eCrime Operations Summit (CeCOS VIII) 
      11. 2011 Economic Crime Asia Conference (Nanyang Technological University, Singapore) 
      12. 2010 International Conference on Applied Linguistics (National Chiayi University, Taiwan) 
      13. ECPAT Taiwan’s 2008 Conference on Criminal Problems and Intervention Strategy
    • Plenary Speaker at the 2010 International Conference on Applied Linguistics
    I was one of over 20 international (and one of two Australian) experts consulted by the research team preparing McAfee's commissioned report entitled “Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare

    Recent Professional Activities (see "Complete Listing")

    1. External Evaluation Member, IEEE Communications and Information Security Technical Committee (CISTC) Technical Recognition Award Committee (2015, 2016, 2017).
    2. External Expert Reviewer for Academic Programs
      1. Australian Government Tertiary Education Quality Standards Agency (TEQSA) (2013, 2017) 
      2. New York University, School of Professional Studies (2017)
    3. External Expert Reviewer for Faculty Appointment, Tenure-Track Assistant Professor of Cyber Security, School of Computer Science and Engineering, Nanyang Technological University, Singapore (2017)
    4. Thesis Examiner
      1. Doctor of Philosophy (Ph.D.) thesis, University of New South Wales (UNSW) Sydney, Australia (2017)
      2. Doctor of Philosophy (Ph.D.) thesis, Universiti Putra Malaysia, Malaysia (2017) 
      3. Doctor of Philosophy (Ph.D.) thesis, University of Wollongong, Australia (2017)
    5. Guest Editor,
      1. Kim-Kwang Raymond Choo, Jemal Abawajy and Rafiqul Islam 2017. Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. Journal of Computer and System Sciences 83(1): 1–2. http://dx.doi.org/10.1016/j.jcss.2016.09.001 
      2. Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang and Yu Yu 2017. Embedded Device Forensics and Security. ACM Transactions on Embedded Computing Systems 16(2): Article no 50. https://doi.org/10.1145/3015662  
      3. Zhiyong Zhang and Kim-Kwang Raymond Choo 2017. Guest Editorial: Multimedia Social Network Security and Applications. Multimedia Tools and Applications 76(3): 3163–3168. http://dx.doi.org/10.1007/s11042-016-4081-z 
      4. Elisa Bertino, Kim-Kwang Raymond Choo 2016, Dimitrios Georgakopoulos and Surya Nepal. Internet of Things (IoT): Smart and Secure Service Delivery. ACM Transactions on Internet Technology 16(4): Article no 22. https://doi.org/10.1145/3013520 
      5. Kim-Kwang Raymond Choo, Josep Domingo-Ferrer and Lei Zhang 2016. Cloud Cryptography: Theory, Practice and Future Research Directions. Future Generation Computer Systems 62: 51–53, 2016. http://dx.doi.org/10.1016/j.future.2016.04.017 
      6. Kim-Kwang Raymond Choo, Martin Herman, Michaela Iorga and Ben Martini 2016. Cloud Forensics: State-of-the-Art and Future Directions. Digital Investigation, 18: 77–78. http://dx.doi.org/10.1016/j.diin.2016.08.003 
      7. Kim-Kwang Raymond Choo, Lior Rokach and Claudio Bettini 2016. Mobile security and privacy: Advances, challenges and future research directions. Pervasive and Mobile Computing 31: 1–2. http://dx.doi.org/10.1016/j.pmcj.2016.10.003 
      8. Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin and Peter Mueller 2016. Guest Editorial: Network Forensics and Surveillance for Emerging Networks. IEEE Network 30(6): 4–5. http://dx.doi.org/10.1109/MNET.2016.7764272 
      9. Kim-Kwang Raymond Choo and Rick Sarre 2015. Guest Editors’ Introduction: Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Computing 2(4): 8–13. http://dx.doi.org/10.1109/MCC.2015.84
    6. Program Chair, 3rd International Conference on Green, Pervasive and Cloud Computing (GPC 2017)
    7. Program Chair, 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017)
    8. General Chair, 17th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2017)
    9. General Chair, 12th International Conference on Future Information Technology (FutureTech 2017)
    10. Co-Chair
      • "Cyber-of-Things: Cyber-Crimes and Cyber-Security" minitrack @Hawaii International Conference on System Sciences (HICSS 2018)
      • "Cyber Threat Intelligence and Analytics" minitrack @Hawaii International Conference on System Sciences (HICSS 2018)
      • "Second Annual Big Data Security, Privacy and Trust Workshop (BigDataSPT 2017)", in conjunction with 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2017)

      Academic Visitors

      1. January 2015: Associate Professor Christian W. Probst, Technical University of Denmark 
      2. February 2015 – February 2016: Associate Professor Mengbo Hou, Shandong University’s Lab of Information Security and Cryptography (Supported by a China Scholarship Council Fellowship)
      3. June 2015: Associate Professor Yong Yu, University of Electronic Science and Technology of China
      4. July 2015 – April 2016: Opeyemi Osanaiye (Ph.D. Candidate), University of Cape Town, South Africa

      Prospective PhD Students 

      My door is always open to motivated individuals, particularly those with excellent academic records (and publication track record), who are interested in researching on cyber security and digital forensics (technical research), cyber crime (criminology and policy research), anti-money laundering / counter terrorism financing, cryptography and digital forensics. To see what types of problems I work on, please visit " "

      Since joining the University of South Australia in March 2011, I have supervised to completion one DIT, 12 Ph.D., 13 Master and nine Honours (eight 1st Class, and one 2nd Upper Class Honours) theses. 
      1. Dr. Angela Irwin, 2013 [Ph.D. Thesis: Money laundering and terrorism financing in virtual environments] - Currently, she is a Lecturer at the Centre for Policing, Intelligence and Counter Terrorism (PICT), Macquarie University. 
      2. Dr. Aswami Fadillah Mohd Ariffin, 2013 [Ph.D. Thesis: A general model of forensic data recovery framework for digital CCTV systems] - Currently, he is the Vice President of Cyber Security Responsive Services at CyberSecurity Malaysia.
      3. Yuan (Tom) Gao, 2014 [DIT Thesis: Commercial implementation of shared secret in middleware] - Currently, he is the Microsoft Application and Digital Manager at CSR Limited.
      4. Ben Martini, 2015  [Ph.D. Thesis: ForFACTS: a Forensic Framework for Analysis of Cloud Technologies and Services] - Currently, he is a lecturer at the University of South Australia.
      5. Ki Hong (Steve) Chon, 2016, Australian National University [Ph.D. Thesis: Cybercrime Precursors: Towards a Model of Offender Resources] - Currently, he is a Data Scientist with NuData Security, Canada.
      6. Deepa Mani, 2016 [Ph.D. Thesis: Understanding Information Security Risk in Australian Real Estate Sectors]. Currently, she is a contracted academic at the University of South Australia.
      7. Ala' (Jordan) Aburumman, 2016 [Ph.D. Thesis: Secure Session Initiation Protocol Solutions for Mobile Ad Hoc Networks]. Currently, he is a contracted academic at the University of South Australia.
      8. Nurul Hidayah Ab Rahman, 2016 [Ph.D. Thesis: An Evidence-based Cloud Incident Handling Framework]. Currently, she is an academic at Universiti Tun Hussein Onn Malaysia, Malaysia.
      9. Opeyemi Osanaiye, 2016, University of Cape Town, South Africa, [Ph.D. Thesis: DDoS defence for service availability in cloud computing]. Currently, he is a post-doctoral researcher at University of Pretoria, South Africa.
      10. Victor Prokhorenko, 2017 [Ph.D. Thesis: An intent-based behavioural intrusion prevention framework for PHP-based web applications]. Currently, he is a contracted academic at the University of South Australia.
      11. Abdullah Azfar, 2017 [Ph.D. Thesis: Forensic Taxonomies of Android Apps (ForTAApps)]. Currently, he is a digital forensic consultant at KPMG Australia.
      12. Darren Quick, 2017 [Ph.D. Thesis: Digital Forensic Data Reduction and Quick Analysis for Evidence and Intelligence]. Currently, he is a digital forensic investigator at the Australian Government Australian Border Force.
      13. Christopher Tassone, 2017 [Ph.D. Thesis: A Mobile Forensic Visualisation Lifecycle]. 
      I can be contacted on (email) raymond [DOT] choo [AT] fulbrightmail [DOT] org