Overview
Background
Professor Ryan Ko is Chair Professor of Cyber Security, Centre Director of UQ Cyber Research Centre, Director of Research at the School of Electrical Engineering and Computer Science, and an elected member of the Academic Board at the University of Queensland, Australia. He holds a Bachelor of Engineering (Computer Engineering)(Hons.) (2005), and PhD (2011) from Nanyang Technological University (NTU), Singapore.
Ko has held senior scientific leadership, executive, and directorship roles across industry and academia, and has more than 15 years of board, governance and advisory experience across government, industry and NGOs across Australia, New Zealand, Singapore, and USA.
He currently serves on the Audit and Risk Committee for the board of the global not-for-profit ORCID, and has served on boards and advisory groups for AustCyber, Queensland Government, Meat and Livestock Australia (MLA), and the NZX-listed (NZE:LIC) Livestock Improvement Cooperation (LIC).
He has also served as expert advisor to INTERPOL, the government of Tonga, NZDF, NZ Minister for Communications' Cyber Security Skills Taskforce, and is a Technical Advisor (one of four nationally-appointed) for judges relating to the Harmful Digital Communications Act 2015, Ministry of Justice. He has also served as independent technical expert for Australian law firms in court cases, litigations and class actions.
He is a registered external expert for the Tertiary Education Quality and Standards Agency (TEQSA), and a member of the Australian Computer Society (ACS) Accreditation Committee. He has experience reviewing course proposals and served in governance roles for higher education institutes.
He is Adjunct Professor at the Singapore Institute of Technology, and Affiliate Faculty Member at NIATEC at the Idaho State University, USA.
He has been a co-founder of 4 start-ups, including First Watch Ltd (NZ) – an industrial cybersecurity spin-off based on his patented OT security and provenance research at the University of Waikato.
Since joining UQ in 2019, he has served as:
- Deputy Head of School (External Engagement) (2021-2022)
- Founding Discipline Leader of the Cyber Security and Software Engineering discipline (2020-2021)
- Group Leader - Cyber Security (2019)
Ko has successfully established several university-wide, multi-disciplinary academic research and education programmes, including establishing and leading:
- UQ Cyber Research Centre - interdisciplinary cyber scurity research centre involving 60+ academics and their respective teams from the 6 Schools (EECS, Business, Economics, Law, Social Science, Mathematics & Physics), the Centre for Policy Futures, and 4 Faculties since 2019.
- UQ's interdisciplinary postgraduate programme (MCyber, PGDipCyber, GCertCyber) involving four UQ faculties in 2019,
- NZ's first cyber security graduate research programme and lab (Cybersecurity Researchers of Waikato (CROW)) in 2012,
- NZ's first Master of Cyber Security (encompassing technical and law courses), the NZ Cyber Security Challenge since 2014, and
- NZ Institute for Security and Crime Science – Te Puna Haumaru as its founding director, the Evidence Based Policing Centre (at Wellington with NZ Police and ESR), and Master of Security and Crime Science in 2017 with the University of Waikato, NZ.
Over his academic career, Ko has been awarded A$20+million in competitive grants as lead Chief Investigator, and ~A$40+million as co-investigator. Prior to UQ, he was the highest funded computer scientist in New Zealand, as Principal Investigator and Science Leader of the largest MBIE-awarded cloud security research funding for STRATUS (NZ$12.2 million; 2014-2018). STRATUS' research was awarded 'Gold' by MBIE (i.e. top performing project, 2017), adopted by INTERPOL and featured in NZ's Department of Prime Minister and Cabinet's NZ Cyber Security Strategy 2016 annual report.
Ko has a track record developing international and national cyber security curricula, including:
- Co-creation of the gold-standard (ISC)2 Certified Cloud Security Professional (CCSP) curriculum (2014-2015)
- Authoring the draft of the NZQA's Level 6 Cybersecurity Diploma qualification as part of the NZ Cyber Security Skills Taskforce on behalf of the Department of Prime Minister and Cabinet.
Ko has also experience developing competitions and coaching competitive cyber security teams, including:
- Co-founding the NZ Cyber Security Challenge in 2014, and leading the NZCSC from 2014 to 2018. NZCSC is now the premier national cyber security competition in NZ.
- Co-founding the Oceania Cybersecurity Challenge (OCC) in 2020, and leading the competition from 2022 to present. OCC is now the regional qualifiers for the International Cybersecurity Challenge
- Co-founding the International Cybersecurity Challenge (ICC) as part of the Steering Committee in 2022. ICC has been held in Athens (2022) and San Diego (2023). It is aiming to be the world cup of cyber competitions.
- Head Coach of Team Oceania for the ICC. 2022 Results: Overall 4th; 2023 Results: Overall 2nd in the world.
He contributed to the establishment of the Government of Tonga CERT and CERT NZ, and has been a keynote speaker regularly on cyber and cloud security research across the globe, including the OECD, Republic of Korea National Assembly (2018), INTERPOL (2017), TEDx Ruakura (2017), and the NZ Members of Parliament (2016).
Within the ISO/IEC JTC 1/SC 27, Prof Ko was Head of Delegation for the Singapore national body, served as Editor, ISO/IEC 21878 “Security guidelines for design and implementation of virtualized servers”, and hosted the ISO/IEC JTC 1/SC 27 meetings at Hamilton, NZ, in 2017. He is currently one of the editors of the ISO/IEC PWI 5181 Data Provenance Reference Model. In 2022, Ko co-chaired the development of the Singapore standard TR 106:2022 Tiered cybersecurity standards for enterprises in collaboration with the SPSTC and Singapore Cyber Security Agency.
Ko serves as an assessor for the Australian Research Council (ARC), Irish Research Council, Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO), Natural Sciences and Engineering Research Council of Canada (NSERC), and NZ MBIE College of Assessors (since 2015).
Ko has externally examined 11 PhD and 3 Masters theses for universities in Australia, New Zealand, Canada, Hong Kong and Singapore.
For his contributions to the field, he was elected Fellow of the Australian Computer Society, Fellow of the Queensland Academy of Arts and Sciences, and Fellow of Cloud Security Alliance (CSA) (2016). He was awarded the Singapore Government (Enterprise Singapore)’s Young Professional Award (2018) for his leadership at ISO, and awarded the inaugural CSA Ron Knode Service Award 2012 for the establishment of Cloud Data Governance and Cloud Vulnerabilities Research Working Groups. He is also recipient of the 2015 (ISC)2 Information Security Leadership Award.
For his research and teaching excellence, he was awarded the University of Queensland Awards for Excellence - Leadership (Commendation) (2023), EAIT Nominations for Most Effective Teacher (both semesters of 2020, 2021, 2022, 2023), University of Waikato's Early Career Excellence Award (2014), Faculty Teaching Excellence Awards (2014, 2015, 2018), and the Nola Campbell eLearning Excellence Award (2014). During his PhD, he was also awarded A*STAR SIMTech's Best Student Award (2009), and clinched the 1st Prize of the IEEE Services Cup 2009 at IEEE ICWS (CORE A*) in Los Angeles, CA.
Earlier in his career, Ko was a systems engineer, and subsequently founded two start-ups (one was a social enterprise which became an events/conventions management contractor with IMG at mega-events in Singapore, including the inaugural Youth Olympics in 2010).
He is an active science communicator and is regularly interviewed and featured by Australian (ABC News, SBS News, 7 News, 9 News, Courier Mail, Network 10, AFR), Singaporean (Channel NewsAsia, CNA Radio938), NZ (NZ Herald, Dominion Post, Stuff.co.nz, Waikato Times, TVNZ, Central TV) and international media on topics of cyber security, cybercrime and data privacy.
Availability
- Professor Ryan Ko is:
- Available for supervision
- Media expert
Fields of research
Qualifications
- Bachelor (Honours) of Computer Engineering, Nanyang Technological University
- Doctor of Philosophy, Nanyang Technological University
- Certificate of Management, Harvard University
- Fellow, Australian Computer Society, Australian Computer Society
- Fellow, Cloud Security Alliance, Cloud Security Alliance
- Fellow, Queensland Academy of Arts and Sciences, Queensland Academy of Arts and Sciences
Research interests
-
Provenance and Traceability
Applications into tracking Cybercrime Payments (e.g. cryptocurrency transactions), and data across AgTech, IoT, Edge, Cloud Computing and OT environments.
-
Trusted Computing Applications
Applications into agriculture, regulatory, auditing and media.
-
Data Privacy and Privacy Enhancing Technologies
Enabling secure and private multi-party computation.
-
AI Planning/ Automated Planning
Adapting classical AI planning approaches into cyber security.
-
Automating Cyber Security for Critical Infrastructure
Designing cyber autonomy to empower all end-users.
-
Applying Situation Crime Prevention to Cybercrime Prevention
Applying SCP techniques into processes and controls to prevent cybercrime.
-
Board and Organisational Structures for Cyber Resilience
Understanding how factors and pressures (e.g. board composition and organisational structures, external pressures) affect an organisation's cyber resilience.
-
Creating Measurable Indicators of Cyber Resilience
Developing a framework to quantify factors allowing senior executives to understand and make decisions about cyber resilience.
-
Operational Technology (OT) Security
Focusing on Industrial Control Systems (ICS) and related protocols.
Research impacts
Ko's research in cyber security focuses on returning control of data to users. His research reduces users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing. His research is adopted internationally (e.g. CERN, INTERPOL, and HP clients such as Apple, Nasa, US Treasury/IRS). His papers have received conference Best Paper Awards (2011, 2015, 2017), and resulted in several technology transfers (e.g. HP), open source contributions (e.g. Kali Linux THC) and spin-offs (e.g. First Watch). He has published in top venues including WWW (The Web), IEEE S&P, NeurIPS, ACM Computing Surveys, IACR CHES, PETS, DCC, ESORICS, IEEE Comms Surveys and Tutorials, IEEE TrustCom, IEEE ICWS, IEEE TDSC, IEEE TSC, Computers & Security, IEEE Trans on Smart Grid, and more than 170 publications including books, refereed conference papers, journal papers, book chapters, encyclopaedia entries, technical reports and international patents (PCT).
Recently, he is researching information integrity and cyber autonomy in critical infrastructure sectors such as energy, manufacturing, regulatory and agriculture sectors. He has served in technical programme committees for more than 30 IEEE conferences/workshops, associate editor for 6 journals, and as series editor for Elsevier's security books.
Works
Search Professor Ryan Ko’s works on UQ eSpace
2016
Conference Publication
Message from the TSCloud 2016 Symposium Chairs
Ko, Ryan and Choo, Kim-Kwang Raymond (2016). Message from the TSCloud 2016 Symposium Chairs. IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 August 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/trustcom.2016.0015
2016
Book
Security in computing and communications
Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss and Jose M. Alcaraz Calero eds. (2016). Security in computing and communications. Communications in Computer and Information Science, Singapore: Springer Singapore. doi: 10.1007/978-981-10-2738-3
2016
Conference Publication
UVisP: user-centric visualization of data provenance with Gestalt principles
Garae, Jeffery, Ko, Ryan K. L. and Chaisiri, Sivadon (2016). UVisP: user-centric visualization of data provenance with Gestalt principles. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.292
2016
Conference Publication
Preface
Mueller, Peter, Thampi, Sabu M., Alam Bhuiyan, Md. Zakirul, Ko, Ryan, Doss, Robin and Alcaraz Calero, Jose M. (2016). Preface. 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016. Singapore: Springer.
2016
Conference Publication
Computing mod with a variable lookup table
Will, Mark A. and Ko, Ryan K. L. (2016). Computing mod with a variable lookup table. 4th International Symposium on Security in Computing and Communications (SSCC), Jaipur, India, 21-24 September 2016. Singapore: Springer. doi: 10.1007/978-981-10-2738-3_1
2016
Book
Algorithms and Architectures for Parallel Processing
Jesus Carretero, Javier Garcia-Blas, Ryan K.L. Ko, Peter Mueller and Koji Nakano eds. (2016). Algorithms and Architectures for Parallel Processing. Lecture Notes in Computer Science, Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-49583-5
2015
Journal Article
Preface
Ko, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Preface. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. doi: 10.1016/B978-0-12-801595-7.09982-1
2015
Book
The cloud security ecosystem: technical, legal, business and management issues
Ryan K. L. Ko and Kim-Kwang Raymond Choo eds. (2015). The cloud security ecosystem: technical, legal, business and management issues. Waltham, MA USA: Elsevier. doi: 10.1016/C2014-0-00456-X
2015
Conference Publication
Inferring user actions from provenance logs
Li, Xin, Joshi, Chaitanya, Tan, Alan Y. S. and Ko, Ryan K. L. (2015). Inferring user actions from provenance logs. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.442
2015
Book Chapter
Cloud security ecosystem
Ko, Ryan K. L. and Choo, Kim-Kwang Raymond (2015). Cloud security ecosystem. The cloud security ecosystem: technical, legal, business and management issues. (pp. 1-14) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00001-X
2015
Conference Publication
Trusted tamper-evident data provenance
Taha, Mohammad M. Bany, Chaisiri, Sivadon and Ko, Ryan K. L. (2015). Trusted tamper-evident data provenance. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.430
2015
Conference Publication
STRATUS: Towards Returning Data Control to Cloud Users
Ko, Ryan K. L., Russello, Giovanni, Nelson, Richard, Pang, Shaoning, Cheang, Aloysius, Dobbie, Gill, Sarrafzadeh, Abdolhossein, Chaisiri, Sivadon, Asghar, Muhammad Rizwan and Holmes, Geoffrey (2015). STRATUS: Towards Returning Data Control to Cloud Users. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_6
2015
Book Chapter
Provenance for cloud data accountability
Tan, Alan Y. S., Ko, Ryan K. L., Holmes, Geoff and Rogers, Bill (2015). Provenance for cloud data accountability. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. (pp. 171-185) Waltham, MA United States: Elsevier. doi: 10.1016/B978-0-12-801595-7.00008-2
2015
Conference Publication
Welcome message from the ICA3PP 2015 workshop chairs
Dong, Mianxiong, Ko, Ryan K. L. and Alam Bhuiyan, Md. Zakirul (2015). Welcome message from the ICA3PP 2015 workshop chairs. ICA3PP 2015 Workshop, Zhangjiajie, China, 18-20 November 2015. Heidelberg, Germany: Springer.
2015
Conference Publication
Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents
Will, Mark A., Nicholson, Brandon, Tiehuis, Marc and Ko, Ryan K. L. (2015). Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents. International Conference on Cloud Computing Research and Innovation ICCCRI, Singapore Singapore, 26-27 October 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICCCRI.2015.30
2015
Conference Publication
Message from the ITA 2015 Symposium Chairs
Wu, Yulei , Ko, Ryan , Javadi, Bahman and Al-Dubai, Ahmed (2015). Message from the ITA 2015 Symposium Chairs. ITA 2015 Symposium, Liverpool, United Kingdom, 26-28 October 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit/iucc/dasc/picom.2015.389
2015
Book Chapter
A guide to homomorphic encryption
Will, Mark A. and Ko, Ryan K. L. (2015). A guide to homomorphic encryption. The cloud security ecosystem: technical, legal, business and management issues. (pp. 101-127) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00005-7
2015
Conference Publication
Message from the workshop chairs of IEEE TSCloud 2015
Ko, Ryan and Choo, Kim-Kwang Raymond (2015). Message from the workshop chairs of IEEE TSCloud 2015. Symposium on Trust and Security in Cloud Computing (TrustCloud), Helsinki, Finland, 20 - 22 August 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom.2015.337
2015
Conference Publication
Message from the symposium chairs: TSCloud 2014
Ko, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Message from the symposium chairs: TSCloud 2014. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2014.147
2015
Conference Publication
A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications
Delamore, Baden and Ko, Ryan K. L. (2015). A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. Joint 14th IEEE Int Conf on Trust, Security and Privacy in Computers and Communications / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE International Conference on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki Finland, 20-22 August 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/Trustcom.2015.493
Funding
Current funding
Past funding
Supervision
Availability
- Professor Ryan Ko is:
- Available for supervision
Looking for a supervisor? Read our advice on how to choose a supervisor.
Supervision history
Current supervision
-
Doctor Philosophy
Evaluating and Improving Type Inference Models for Web Application Reverse Engineering
Principal Advisor
Other advisors: Associate Professor Mark Utting, Professor Michael Bruenig
-
Doctor Philosophy
Measuring and Enhancing Honeypot Interactivity to Derive Attack Strategy Insights for Industry Control Systems Security
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
Applying Situational Crime Prevention to Business Processes to Prevent Cybercrime
Principal Advisor
Other advisors: Dr John Gilmour, Dr Elinor Tsen
-
Doctor Philosophy
A Provenance System Architecture for Distributed File Systems
Principal Advisor
-
Doctor Philosophy
Adaptive, secure and resilient programmable logic controllers (PLCs) and data transfer protocols
Principal Advisor
Other advisors: Professor Tapan Saha
-
Doctor Philosophy
Virtualized Root of Trust in Cloud Computing
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
AI planner for autonomous cyber defence for operational technologies (OT)
Principal Advisor
Other advisors: Dr Priyanka Singh
-
Doctor Philosophy
Efficient Methods for Automating Reconstruction of Provenance and Cryptocurrency Networks for Crime Attribution
Principal Advisor
Other advisors: Dr Miao Xu
-
Doctor Philosophy
Advancing cyberworthiness via integration of AI and Model-Based Systems Engineering (MBSE)
Associate Advisor
Other advisors: Dr Priyanka Singh
-
Doctor Philosophy
The nexus between data breaches, cyber safety and employee productivity in the hybrid work context
Associate Advisor
Other advisors: Associate Professor Remi Ayoko
-
-
Doctor Philosophy
Justice for sexual assault and rape: Digital media and Australian legal reforms
Associate Advisor
Other advisors: Associate Professor Allison Fish, Dr Jonah Rimer
Completed supervision
-
2025
Doctor Philosophy
Evaluating and Enhancing the Resilience of Regression-Based Anomaly Detectors Against Gradient-Free Evasion Attacks in Industrial Control Systems
Principal Advisor
Other advisors: Dr Naipeng Dong
-
2024
Doctor Philosophy
Using Situational Crime Prevention (SCP) to Prevent Cybercrimes
Principal Advisor
Other advisors: Professor Lorraine Mazerolle, Dr John Gilmour
-
2025
Doctor Philosophy
A corpus-based analysis of conspiracy theory discourse on Reddit: Understanding conspiracy-fuelled anomie and moral panics during COVID-19
Associate Advisor
Other advisors: Dr Martin Schweinberger
-
2023
Doctor Philosophy
Security and Performance Evaluation of Software Defined Networking adopting Moving Target Defenses
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
2023
Doctor Philosophy
Investigating the components of a contextual cyber resilience for organisations
Associate Advisor
Other advisors: Associate Professor Sergeja Slapnicar
-
2021
Doctor Philosophy
Privacy-preserving Sharing for Genome-wide Analysis
Associate Advisor
Other advisors: Dr Caitlin Curtis, Professor Xue Li
Media
Enquiries
Contact Professor Ryan Ko directly for media enquiries about:
- AI for Cyber Security
- Cloud Computing Security
- Critical infrastructure security
- Cyber Attack Attribution
- Cyber Crime
- Cyber Security
- Cybersecurity
- Data Accountability
- Data Control
- Data Privacy
- Data Provenance
- Data Tracking
- ICS Security
- Industrial control systems security
- Information Security
- Privacy enhancing technologies
Need help?
For help with finding experts, story ideas and media enquiries, contact our Media team: