Kim-Kwang Raymond Choo

 

Research Interests

Cloud Security
Cyber Security
Mobile Security
Digital Forensics

Institutional Contact

The University of Texas at San Antonio

Department of Information Systems and Cyber Security

One UTSA Circle — San Antonio, TX 78249-0631, USA

Biography

I currently hold the Cloud Technology Endowed Professorship at The University of Texas at San Antonio, USA.

I have co-edited five books entitled “Cloud Security Ecosystem” (published by Syngress: An Imprint of Elsevier, 2015), “Mobile Security and Privacy” (published by Syngress: An Imprint of Elsevier, 2017), “Contemporary Digital Forensic Investigations of Cloud and Mobile Applications” (published by Syngress: An Imprint of Elsevier, 2017), “Green, Pervasive, and Cloud Computing” (published in Springer’s Lecture Notes in Computer Science book series, 2017), and “Advanced Multimedia and Ubiquitous Engineering” (published in Springer’s Lecture Notes in Electrical Engineering book series, 2017), as well as (co)authoring a number of publications in the areas of anti-money laundering, cyber and information security, and digital forensics including a book published in Springer’s “Advances in Information Security” book series, a book published by Syngress/Elsevier (Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories), seven Australian Government Australian Institute of Criminology (AIC) refereed monographs, 30 refereed book chapters, 223 refereed journal articles, 92 refereed conference articles and six parliamentary submissions (see https://sites.google.com/site/raymondchooau/publications). I am the co-inventor of two PCT and one provisional patent applications on digital forensics and mobile app security filed in 2015.

My research has been widely cited, including in key government reports such as the 2010 Australian Government House of Representatives Standing Committee on Communications Report on the Inquiry into Cyber Crime, 2011 Australian Government House of Representatives Joint Select Committee’s Report on Cyber-Safety, 2013 Australian Crime Commission Fact Sheet on “Cyber and Technology Enabled Crime”, 2013 Australian Government House of Representatives Joint Select Committee on Cyber-Safety’s Report on the Inquiry into Cybersafety for Senior Australians, Working paper for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, United Nations Office on Drugs and Crime (UNODC) 2011 “Handbook on Identity-related Crime”, 2010 US CRS Report for Congress (Prepared for Members and Committees of Congress) entitled “Organized Crime: An Evolving Challenge for U.S. Law Enforcement”, International Telecommunication Union (ITU) 2011 “Understanding Cybercrime: A Guide For Developing Countries” report, 2012 UNODC “Wildlife and Forest Crime Analytic Toolkit” report , and 2013 UK Home Office report entitled “Cyber crime: A review of the evidence”. One of my published cryptographic protocols was included in two independent submissions to the IEEE 802.11, the working group setting the standards for wireless LANs, by computer scientists from Fujitsu Labs in America; and the IETF / Network Working Group by a team of computer scientists from Tropos Networks (US), Toshiba, Huawei, and University of Murcia. My published design principle about how session keys should be constructed in cryptographic (key establishment) protocols that result in significant benefits for their security was cited in a special publication (SP 800-56A) – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography – by the US National Institute of Standards and Technology. This is one of four academic (i.e. non-NIST and non-international standard) citations, and the other three academic citations are publications of (1) Professor Alfred Menezes (University of Waterloo), Professor Phillip Rogaway (UC Davis), Professor Mihir Bellare (UC San Diego), and Professor Dan Boneh (Stanford University) – the top scholars in the field. My Google Scholar h-index is 34, and i10-index is 120 – http://scholar.google.com.au/citations?user=rRBNI6AAAAAJ&hl=en.

I have been an invited speaker for a number of events in Australia and overseas (e.g. 2011 UNODC-ITU Asia-Pacific Regional Workshop on Fighting Cybercrime, 2011 (Ministerial-level) Korea-Australia-New Zealand Broadband Summit 2011 and the 2014 World Internet Conference (Wuzhen Summit), Jointly Organized by the Cyberspace Administration of China and the People’s Government of Zhejiang Province). I was a Keynote/Plenary Speaker at conferences such as SERENE-RISC Spring 2016 Workshop, IEEE International Conference on Data Science and Data Intensive Systems (DSDIS2015) and those organised by Infocomm Development Authority of Singapore (2015), Cloud Security Alliance New Zealand (2015), CSO Australia and Trend Micro (2015), Anti-Phishing Working Group (2014), National Taiwan University of Science and Technology (2014), Asia Pacific University of Technology & Innovation (Malaysia; 2014), Nanyang Technological University (Singapore; 2011), and National Chiayi University (Taiwan; 2010); and a Distinguished Speaker at the International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Norway. I was also an Invited Expert @United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)(J15-04250) Training in 2015, and at INTERPOL Cyber Research Agenda Workshop in 2015 (see https://sites.google.com/site/raymondchooau/presentations).

I serve on various editorial boards including as Special Issue Guest Editor of ACM Transactions on Embedded Computing Systems (2017; DOI: 10.1145/3015662), ACM Transactions on Internet Technology (2017; DOI: 10.1145/3013520), Digital Investigation (2016; DOI: 10.1016/j.diin.2016.08.003), Future Generation Computer Systems (2016; DOI: 10.1016/j.future.2016.04.017), IEEE Cloud Computing (2015; DOI: 10.1109/MCC.2015.84), IEEE Network (2016; DOI: 10.1109/MNET.2016.7764272), IEEE Transactions on Dependable and Secure Computing (2017; DOI: 10.1109/TDSC.2017.2664183), Journal of Computer and System Sciences (2017; DOI: 10.1016/j.jcss.2016.09.001), Multimedia Tools and Applications (2017; DOI: 10.1007/s11042-016-4081-z), Pervasive and Mobile Computing  (2016; DOI: 10.1016/j.pmcj.2016.10.003), etc (see https://sites.google.com/site/raymondchooau/professional-activities).  

In 2016, I was named Cybersecurity Educator of the Year – APAC (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn),  and in 2015, my team and I won the Digital Forensics Research Challenge organized by Germany’s University of Erlangen-Nuremberg. Other awards include ESORICS 2015 Best Paper Award, 2014 Highly Commended Award by the Australia New Zealand Policing Advisory Agency, Fulbright Scholarship in 2009, 2008 Australia Day Achievement Medallion, and British Computer Society’s Wilkes Award in 2008.

In April 2017, O was appointed an Honorary Commander, 502nd Air Base Wing, Joint Base San Antonio-Fort Sam Houston, USA. I am also a Fellow of the Australian Computer Society, and a Senior Member of IEEE.