Owen Lo
Owen Lo

Dr Owen Lo

Senior Research Fellow

Biography

Dr Owen Lo is a Research Fellow in the Blockpass ID Lab at Edinburgh Napier University. Additionally, he also holds the role of Tech Lead at MemCrypt Ltd. Owen graduated with a 1st Honours (Class Medal Award) degree in Computer Networks and Distributed Systems at Edinburgh Napier University before continuing to complete a PhD at the same university on the topic of e-Health. Some awards Owen has received include: Young Software Engineer of the Year Award (Lumison Prize)(2010), Team Prize Raytheon Cyber Challenge Award (2011) and Student of the Year ENU Award (2012).

During his PhD, Owen contributed to the Data Capture and Auto Identification Reference (DACAR) Project – a project funded in part by EPSRC and TSB – and which aimed to create a secure cloud-based information sharing platform for patient data in healthcare environments. His work on the DACAR project includes the development of a Patient Simulator and an electronic version of the Early Warning Score system used to perform risk assessment on patients.

In his role as a Research Fellow, Owen has collaborated with organisations including Morgan Stanley and Keysight Technologies on industry focused research projects. His collaboration with Morgan Stanley focused on insider threats and investigated machine learning techniques to assess how one may determine if an employee was conducting malicious activity. Owen’s collaboration with Keysight Technologies involved research on the topic of side channel analysis and vulnerabilities related to IoT devices. His work on side channel analysis involved applying a technique called power analysis to block-based cryptographic encryption algorithms including Advanced Encryption Standard (AES) and PRESENT. His results showed that both algorithms are susceptible to information leakage (i.e. the secret key may be revealed) under certain conditions which results in the compromised security of both algorithms. Lastly, Owen’s research into IoT security has demonstrated numerous vulnerabilities with consumer ready devices including network service vulnerabilities and Bluetooth Low Energy vulnerabilities.

During his time at ENU, Owen has contributed to the success of three university spin-out companies: Symphonic Software, Cyancomb and MemCrypt Ltd. Symphonic Software involved the development of an information sharing engine used for the secure and trusted sharing of information between different sectors including finance, healthcare, social care, and law enforcement. For Cyancomb, he worked on research and development of a fully-featured contraband detection software used to enable rapid detection of illegal content on computing devices. Owen's work on MemCrypt, the most recent spin-out from ENU, is focused on ransomware detection and data recovery. In his role as Tech Lead at MemCrypt, Owen is currently leading the development of MemCrypt's core innovation: the ability to detect and capture cryptographic keys which allows for the rapid recovery of data affected by ransomware.

Esteem

Fellowships and Awards

  • Edinburgh Napier University Student of the Year Award
  • Young Software Engineer of the Year Award (3rd Place)
  • Institute Researchers win prize at Raytheon Security Challenge event

 

Invited Speaker

  • Blockpass Identity Lab Conference on Digital Identity, Blockchain and Advanced Cryptography
  • SICSA Cybernexus Workshop on Cybersecurity and the Internet of Things
  • CENSIS 5th Technology Summit
  • The Cyber Academy Big Data Conference
  • CEED-Scotland Forensics of IT and Data Analytics Workshop
  • The Cyber Academy Conference of Ransomware, Cryptography and Pseudo-Identity
  • The Cyber Academy Big Data Conference
  • The Cyber Academy International Conference on Cryptography and High Performance Computing

 

Media Activity

  • CyberASAP Alumni Case Study for MemCrypt Project (https://ktn-uk.org/news/cyberasap-alumni-insights-open-and-transparent-communication-between-team-members-and-university-is-key-to-a-successful-spin-out/)
  • DIGIT news article on MemCrypt Spinout (https://www.digit.fyi/edinburgh-napier-university-spinout-memcrypt-to-fight-ransomware/)
  • Edinburgh Napier University Press release on MemCrypt Ltd spin-out (https://www.napier.ac.uk/about-us/news/memcrypt-launch)
  • Research on IoT security vulnerabilities featured in The Scotsman article (https://www.scotsman.com/business/companies/tech/edinburgh-napier-and-glasgow-s-censis-partner-in-cybersecurity-drive-1-4765948)
  • Research on side channel analysis featured in Edinburgh Napier University Impact 2017 magazine (https://www.napier.ac.uk/~/media/images/impact-case-studies-september-2017/impact-magazine-2017.pdf)
  • Edinburgh Napier University writes news article on side channel analysis research (https://www.napier.ac.uk/about-us/news/can-your-device-be-hacked-by-tapping-its-power-supply)

 

Reviewing

  • Invited reviewer for International Journal of Information Security
  • Invited reviewer for International Conference on Security of Information and Networks (SIN)
  • Invited reviewer for Mobile Information Systems
  • Invited reviewer for Journal of Cyber Security Technology
  • Invited reviewer for IEEE Technology and Society Magazine

 

Date


42 results

System and method for management of confidential data

Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (in press)
System and method for management of confidential data. GB2561176A
This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to car...

Method for identification of digital content

Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018)
Method for identification of digital content. World Intellectual Property Organization
Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that m...

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2018)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Securityhttps://doi.org/10.1145/3230833.3232801
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...

Applications of Blockchain Within Healthcare.

Journal Article
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018)
Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical traci...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)

Journal Article
Lo, O., Buchanan, W. J., & Carson, D. (2016)
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1(2), 88-107. https://doi.org/10.1080/23742917.2016.1231523
This article demonstrates two fundamental techniques of power analysis, differential power analysis (DPA) and correlation power analysis (CPA), against a modern piece of hardw...

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

RESCUE: Resilient Secret Sharing Cloud-based Architecture.

Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015)
RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, (872-879). https://doi.org/10.1109/Trustcom.2015.459
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...

The future internet: a world of secret shares

Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015)
The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445
The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This pape...

Heart data analysis, modelling and application in risk assessment

Thesis
Lo, O. Heart data analysis, modelling and application in risk assessment. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/8833
The heart is a fundamental aspect of the human body. Significant work has been undertaken to better understand the characteristics and mechanisms of this organ in past researc...

Current Post Grad projects

Previous Post Grad projects