Skip to menu Skip to content Skip to footer
Professor Ryan Ko
Professor

Ryan Ko

Email: 
Phone: 
+61 7 336 51092

Overview

Background

Professor Ryan Ko is Chair and Director of UQ Cyber and a member of the Academic Board at the University of Queensland, Australia. He holds a Bachelor of Engineering (Computer Engineering)(Hons.) (2005), and PhD (2011) from Nanyang Technological University, Singapore.

Ko has held senior scientific leadership, executive, and directorship roles across industry and academia, and has more than a decade of board, governance and advisory experience across government, industry and NGOs across Australia, New Zealand, Singapore, and USA.

He currently serves on the Audit and Risk Committee for the board of the global not-for-profit ORCID, and has served on boards and advisory groups for AustCyber, Queensland Government, Meat and Livestock Australia (MLA), and the NZX-listed (NZE:LIC) Livestock Improvement Cooperation (LIC).

He has also served as expert advisor to INTERPOL, the government of Tonga, NZDF, NZ Minister for Communications' Cyber Security Skills Taskforce, and one of four nationally-appointed Technical Adviser for the Harmful Digital Communications Act 2015, Ministry of Justice. He has also served as independent technical expert for court cases.

He is also Adjunct Professor at the Singapore Institute of Technology, and Affiliate Faculty Member at NIATEC at the Idaho State University, USA.

He is co-founder of Cyber Security Certification Australia (CSCAU), CyberCert, and First Watch Ltd (NZ) – an industrial cybersecurity spin-off based on his patented OT security and provenance research at the University of Waikato.

Since joining UQ in 2019, he has served as:

  • Deputy Head of School (External Engagement) (2021-2022)
  • Founding Discipline Leader of the Cyber Security and Software Engineering discipline (2020-2021)
  • Group Leader - Cyber Security (2019)

Ko has successfully established several university-wide, multi-disciplinary academic research and education programmes, including establishing and leading:

  • UQ Cyber - interdisciplinary cyber scurity research centre involving 60+ academics and their respective teams from the 6 Schools (EECS, Business, Economics, Law, Social Science, Mathematics & Physics), the Centre for Policy Futures, and 4 Faculties since 2019.
  • UQ's interdisciplinary postgraduate programme (MCyber, PGDipCyber, GCertCyber) involving four UQ faculties in 2019,
  • NZ's first cyber security graduate research programme and lab (Cybersecurity Researchers of Waikato (CROW)) in 2012,
  • NZ's first Master of Cyber Security (encompassing technical and law courses), the NZ Cyber Security Challenge since 2014, and
  • NZ Institute for Security and Crime Science – Te Puna Haumaru as its founding director, the Evidence Based Policing Centre (at Wellington with NZ Police and ESR), and Master of Security and Crime Science in 2017 with the University of Waikato, NZ.

Over his academic career, Ko has been awarded A$20+million in competitive grants as lead Chief Investigator, and ~A$40+million as co-investigator. Prior to UQ, he was the highest funded computer scientist in New Zealand, as Principal Investigator and Science Leader of the largest MBIE-awarded cloud security research funding for STRATUS (NZ$12.2 million; 2014-2018). STRATUS' research was awarded 'Gold' by MBIE (i.e. top performing project, 2017), adopted by INTERPOL and featured in NZ's Department of Prime Minister and Cabinet's NZ Cyber Security Strategy 2016 annual report.

Ko has a track record developing international and national cyber security curricula, including:

  • Co-creation of the gold-standard (ISC)2 Certified Cloud Security Professional (CCSP) curriculum (2014-2015)
  • Authoring the draft of the NZQA's Level 6 Cybersecurity Diploma qualification as part of the NZ Cyber Security Skills Taskforce on behalf of the Department of Prime Minister and Cabinet.

Ko has also experience developing competitions and coaching competitive cyber security teams, including:

  • Co-founding the NZ Cyber Security Challenge in 2014, and leading the NZCSC from 2014 to 2018. NZCSC is now the premier national cyber security competition in NZ.
  • Co-founding the Oceania Cybersecurity Challenge (OCC) in 2020, and leading the competition from 2022 to present. OCC is now the regional qualifiers for the International Cybersecurity Challenge
  • Co-founding the International Cybersecurity Challenge (ICC) as part of the Steering Committee in 2022. ICC has been held in Athens (2022) and San Diego (2023). It is aiming to be the world cup of cyber competitions.
  • Head Coach of Team Oceania for the ICC. 2022 Results: Overall 4th; 2023 Results: Overall 2nd in the world.

He contributed to the establishment of the Government of Tonga CERT and CERT NZ, and has spoken regularly on cyber and cloud security research across the globe, including the OECD, Republic of Korea National Assembly (2018), INTERPOL (2017), TEDx Ruakura (2017), and the NZ Members of Parliament (2016).

Within the ISO/IEC JTC 1/SC 27, Prof Ko was Head of Delegation for the Singapore national body, served as Editor, ISO/IEC 21878 “Security guidelines for design and implementation of virtualized servers”, and hosted the ISO/IEC JTC 1/SC 27 meetings at Hamilton, NZ, in 2017. He is currently one of the editors of the ISO/IEC PWI 5181 Data Provenance Reference Model. In 2022, Ko co-chaired the development of the Singapore standard TR 106:2022 Tiered cybersecurity standards for enterprises in collaboration with the SPSTC and Singapore Cyber Security Agency.

Ko serves as an assessor for the Australian Research Council (ARC), Irish Research Council, Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO), and NZ MBIE College of Assessors (since 2015).

He is also an external expert for the Tertiary Education Quality and Standards Agency (TEQSA).

Ko has externally examined 11 PhD and 3 Masters theses for universities in Australia, New Zealand, Canada, Hong Kong and Singapore.

For his contributions to the field, he was elected Fellow of the Australian Computer Society, Fellow of the Queensland Academy of Arts and Sciences, and Fellow of Cloud Security Alliance (CSA) (2016). He was awarded the Singapore Government (Enterprise Singapore)’s Young Professional Award (2018) for his leadership at ISO, and awarded the inaugural CSA Ron Knode Service Award 2012 for the establishment of Cloud Data Governance and Cloud Vulnerabilities Research Working Groups. He is also recipient of the 2015 (ISC)2 Information Security Leadership Award.

For his research and teaching excellence, he was awarded the University of Queensland Awards for Excellence - Leadership (Commendation) (2023), EAIT Nominations for Most Effective Teacher (both semesters of 2020, 2021, 2022, 2023), University of Waikato's Early Career Excellence Award (2014), Faculty Teaching Excellence Awards (2014, 2015, 2018), and the Nola Campbell eLearning Excellence Award (2014). During his PhD, he was also awarded A*STAR SIMTech's Best Student Award (2009), and clinched the 1st Prize of the IEEE Services Cup 2009 at IEEE ICWS (CORE A*) in Los Angeles, CA.

Earlier in his career, Ko was a systems engineer, and subsequently founded two start-ups (one was a social enterprise which became an events/conventions management contractor with IMG at mega-events in Singapore, including the inaugural Youth Olympics in 2010).

He is an active science communicator and is regularly interviewed and featured by Australian (ABC News, SBS News, 7 News, 9 News, Courier Mail, Network 10, AFR), Singaporean (Channel NewsAsia, CNA Radio938), NZ (NZ Herald, Dominion Post, Stuff.co.nz, Waikato Times, TVNZ, Central TV) and international media on topics of cyber security, cybercrime and data privacy.

Availability

Professor Ryan Ko is:
Available for supervision
Media expert

Qualifications

  • Bachelor (Honours) of Computer Engineering, Nanyang Technological University
  • Doctor of Philosophy, Nanyang Technological University
  • Certificate of Management, Harvard University
  • Fellow, Australian Computer Society, Australian Computer Society
  • Fellow, Cloud Security Alliance, Cloud Security Alliance
  • Fellow, Queensland Academy of Arts and Sciences, Queensland Academy of Arts and Sciences

Research interests

  • Automating Cyber Security for Critical Infrastructure

    Designing cyber autonomy to empower all end-users.

  • Operational Technology (OT) Security

    Focusing on Industrial Control Systems (ICS) and related protocols.

  • Provenance and Traceability

    Applications into AgTech, IoT, Edge, Cloud Computing and OT environments.

  • Trusted Computing Applications

    Applications into agriculture, regulatory, auditing and media.

  • Data Privacy and Privacy Enhancing Technologies

    Enabling secure and private multi-party computation.

  • AI Planning/ Automated Planning

    Adapting classical AI planning approaches into cyber security.

  • Applying Situation Crime Prevention to Cybercrime Prevention

    Applying SCP techniques into processes and controls to prevent cybercrime.

  • Board and Organisational Structures for Cyber Resilience

    Understanding how factors and pressures (e.g. board composition and organisational structures, external pressures) affect an organisation's cyber resilience.

  • Creating Measurable Indicators of Cyber Resilience

    Developing a framework to quantify factors allowing senior executives to understand and make decisions about cyber resilience.

Research impacts

Ko's research in cyber security focuses on returning control of data to users. His research reduces users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing. His research is adopted internationally (e.g. CERN, INTERPOL, and HP clients such as Apple, Nasa, US Treasury/IRS). His papers have received conference Best Paper Awards (2011, 2015, 2017), and resulted in several technology transfers (e.g. HP), open source contributions (e.g. Kali Linux THC) and spin-offs (e.g. First Watch). He has published in top venues including WWW (The Web), NeurIPS, DCC, ESORICS, IEEE TrustCom, IEEE Comms Surveys and Tutorials, IEEE ICWS, IEEE TDSC, IEEE TSC, Computers & Security, IEEE Trans on Smart Grid, and more than 100 publications including books, refereed conference papers, journal papers, book chapters, encyclopaedia entries, technical reports and international patents (PCT).

Recently, he is researching information integrity and cyber autonomy in critical infrastructure sectors such as energy, manufacturing, regulatory and agriculture sectors. He has served in technical programme committees for more than 30 IEEE conferences/workshops, associate editor for 6 journals, and as series editor for Elsevier's security books.

Works

Search Professor Ryan Ko’s works on UQ eSpace

165 works between 2007 and 2024

81 - 100 of 165 works

2017

Conference Publication

Secure FPGA as a service - towards secure data processing by physicalizing the cloud

Will, Mark A. and Ko, Ryan K. L. (2017). Secure FPGA as a service - towards secure data processing by physicalizing the cloud. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, Australia, 1-4 August 2017. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.270

Secure FPGA as a service - towards secure data processing by physicalizing the cloud

2017

Book Chapter

Visualization and data provenance trends in decision support for cybersecurity

Garae, Jeffery and Ko, Ryan K. L. (2017). Visualization and data provenance trends in decision support for cybersecurity. Data analytics and decision support for cybersecurity: trends, methodologies and applications. (pp. 243-270) edited by Iván Palomares Carrascosa, Harsha Kumara Kalutarage and Yan Huang. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-59439-2_9

Visualization and data provenance trends in decision support for cybersecurity

2017

Journal Article

Malware propagation and prevention model for time-varying community networks within software defined networks

Liu, Lan, Ko, Ryan K. L., Ren, Guangming and Xu, Xiaoping (2017). Malware propagation and prevention model for time-varying community networks within software defined networks. Security and Communication Networks, 2017 2910310, 1-8. doi: 10.1155/2017/2910310

Malware propagation and prevention model for time-varying community networks within software defined networks

2016

Conference Publication

Preface

Mueller, Peter, Thampi, Sabu M., Alam Bhuiyan, Md. Zakirul, Ko, Ryan, Doss, Robin and Alcaraz Calero, Jose M. (2016). Preface. 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016. Singapore: Springer.

Preface

2016

Conference Publication

Computing mod with a variable lookup table

Will, Mark A. and Ko, Ryan K. L. (2016). Computing mod with a variable lookup table. 4th International Symposium on Security in Computing and Communications (SSCC), Jaipur, India, 21-24 September 2016. Singapore: Springer. doi: 10.1007/978-981-10-2738-3_1

Computing mod with a variable lookup table

2016

Book

Algorithms and Architectures for Parallel Processing

Jesus Carretero, Javier Garcia-Blas, Ryan K.L. Ko, Peter Mueller and Koji Nakano eds. (2016). Algorithms and Architectures for Parallel Processing. Lecture Notes in Computer Science, Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-49583-5

Algorithms and Architectures for Parallel Processing

2016

Conference Publication

Taxonomy of Man-in-the-Middle attacks on HTTPS

Stricot-Tarboton, Shaun, Chaisiri, Sivadon and Ko, Ryan K. L. (2016). Taxonomy of Man-in-the-Middle attacks on HTTPS. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.105

Taxonomy of Man-in-the-Middle attacks on HTTPS

2016

Conference Publication

From reactionary to proactive security: context-aware security policy management and optimization under uncertainty

Chaisiri, Sivadon and Ko, Ryan K. L. (2016). From reactionary to proactive security: context-aware security policy management and optimization under uncertainty. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.0107

From reactionary to proactive security: context-aware security policy management and optimization under uncertainty

2016

Conference Publication

The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws

Scoon, Craig and Ko, Ryan K. L. (2016). The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom/2016.303

The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws

2016

Conference Publication

Privacy preserving computation by fragmenting individual bits and distributing gates

Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.153

Privacy preserving computation by fragmenting individual bits and distributing gates

2016

Conference Publication

Message from the TSCloud 2016 Symposium Chairs

Ko, Ryan and Choo, Kim-Kwang Raymond (2016). Message from the TSCloud 2016 Symposium Chairs. IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 August 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/trustcom.2016.0015

Message from the TSCloud 2016 Symposium Chairs

2016

Conference Publication

UVisP: user-centric visualization of data provenance with Gestalt principles

Garae, Jeffery, Ko, Ryan K. L. and Chaisiri, Sivadon (2016). UVisP: user-centric visualization of data provenance with Gestalt principles. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.292

UVisP: user-centric visualization of data provenance with Gestalt principles

2016

Book

Security in computing and communications

Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss and Jose M. Alcaraz Calero eds. (2016). Security in computing and communications. Communications in Computer and Information Science, Singapore: Springer Singapore. doi: 10.1007/978-981-10-2738-3

Security in computing and communications

2015

Conference Publication

A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications

Delamore, Baden and Ko, Ryan K. L. (2015). A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. Joint 14th IEEE Int Conf on Trust, Security and Privacy in Computers and Communications / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE International Conference on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki Finland, 20-22 August 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/Trustcom.2015.493

A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications

2015

Conference Publication

Bin encoding: a user-centric secure full-text searching scheme for the cloud

Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2015). Bin encoding: a user-centric secure full-text searching scheme for the cloud. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/Trustcom.2015.420

Bin encoding: a user-centric secure full-text searching scheme for the cloud

2015

Conference Publication

A joint optimization approach to security-as-a-service allocation and cyber insurance management

Chaisiri, Sivadon, Ko, Ryan K. L. and Niyato, Dusit (2015). A joint optimization approach to security-as-a-service allocation and cyber insurance management. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.403

A joint optimization approach to security-as-a-service allocation and cyber insurance management

2015

Book Chapter

Security as a service (SecaaS)—An overview

Delamore, Baden and Ko, Ryan K. L. (2015). Security as a service (SecaaS)—An overview. The Cloud Security Ecosystem. (pp. 187-203) Waltham, MA United States: Elsevier. doi: 10.1016/b978-0-12-801595-7.00009-4

Security as a service (SecaaS)—An overview

2015

Conference Publication

Inferring user actions from provenance logs

Li, Xin, Joshi, Chaitanya, Tan, Alan Y. S. and Ko, Ryan K. L. (2015). Inferring user actions from provenance logs. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.442

Inferring user actions from provenance logs

2015

Book Chapter

Cloud security ecosystem

Ko, Ryan K. L. and Choo, Kim-Kwang Raymond (2015). Cloud security ecosystem. The cloud security ecosystem: technical, legal, business and management issues. (pp. 1-14) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00001-X

Cloud security ecosystem

2015

Book

The cloud security ecosystem: technical, legal, business and management issues

Ryan K. L. Ko and Kim-Kwang Raymond Choo eds. (2015). The cloud security ecosystem: technical, legal, business and management issues. Waltham, MA USA: Elsevier. doi: 10.1016/C2014-0-00456-X

The cloud security ecosystem: technical, legal, business and management issues

Funding

Current funding

  • 2023 - 2026
    Secure and Ethical XR Based HSE Training for First Responders in Crisis Situations
    CSIRO
    Open grant
  • 2021 - 2024
    Linking Digital Payments to Crime Using Bid Data Machine Learning Tools (ONI NISDRG grant administered by Griffith University)
    Griffith University
    Open grant

Past funding

  • 2024
    Quality Assurance & Testing of Classic A. I. Based Password Assessment Mechanisms
    DETACK GmbH
    Open grant
  • 2022 - 2023
    Algorand Centre of Excellence (ACE) on Sustainability Informatics for the Pacific (administered by Monash University)
    Monash University
    Open grant
  • 2022 - 2023
    Lean design workshop to understand future challenges for horticulture production in tropical and subtropical regions of Australia
    Horticulture Innovation Australia Limited
    Open grant
  • 2021
    Development of quality assurance technologies for meat processing plants
    Innovation Connections
    Open grant
  • 2020 - 2023
    Massive static and real-time datasets for cyber security research and digital competitiveness
    Data 61 - University Collaboration Agreement (DUCA)
    Open grant

Supervision

Availability

Professor Ryan Ko is:
Available for supervision

Before you email them, read our advice on how to contact a supervisor.

Supervision history

Current supervision

Completed supervision

Media

Enquiries

Contact Professor Ryan Ko directly for media enquiries about:

  • AI for Cyber Security
  • Cloud Computing Security
  • Critical infrastructure security
  • Cyber Attack Attribution
  • Cyber Crime
  • Cyber Security
  • Cybersecurity
  • Data Accountability
  • Data Control
  • Data Privacy
  • Data Provenance
  • Data Tracking
  • ICS Security
  • Industrial control systems security
  • Information Security
  • Privacy enhancing technologies

Need help?

For help with finding experts, story ideas and media enquiries, contact our Media team:

communications@uq.edu.au