`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`SHOOK, HARDY & BACON L.L.P.
`SHOOK, HARDY & BACON L.L.P.
`Gary Miller (Appearance Pro Hac Vice)
`Gary Miller (Appearance Pro Hac Vice)
`gmiller@ shb.com
`gmiller@shb.com
`111 S. Wacker Drive, 51st Floor
`111 S. Wacker Drive, 51st Floor
`Chicago, Illinois 60606
`Chicago, Illinois 60606
`Telephone: 312-704-7700
`Telephone: 312-704-7700
`Facsimile• 312-558-1195
`Facsimile: 312-558-1195
`
`Jesse J. Camacho (Appearance Pro Hac Vice)
`Jesse J. Camacho (Appearance Pro Hac Vice)
`jcamacho@shb.com
`jcamacho@shb.com
`Mary J. Peal (Appearance Pro Hac Vice)
`Mary J. Peal (Appearance Pro Hac Vice)
`mpeal@ shb.com
`mpeal@shb.com
`Ryan D. Dykal (Appearance Pro Hac Vice)
`Ryan D. Dykal (Appearance Pro Hac Vice)
`rdykal@ shb.com
`rdykal@shb.com
`Daniel M. Staren (Appearance Pro Hac Vice)
`Daniel M. Staren (Appearance Pro Hac Vice)
`dstaren@shb.com
`dstaren@shb.com
`2555 Grand Boulevard
`2555 Grand Boulevard
`Kansas City, Missouri 64108
`Kansas City, Missouri 64108
`Telephone: 816-474-6550
`Telephone: 816-474-6550
`Facsimile• 816-421-5547
`Facsimile: 816-421-5547
`
`Mayela C. Montenegro (SBN: 304471)
`Mayela C. Montenegro (SBN: 304471)
`mmontenegro@shb.com
`mmontenegro@shb.com
`5 Park Plaza, Suite 1600
`5 Park Plaza, Suite 1600
`Irvine, California 92614
`Irvine, California 92614
`Telephone:
`949-475-1500
`Telephone:
`949-475-1500
`Facsimile•
`949-475-0016
`Facsimile:
`949-475-0016
`
`Attorneys for Defendant
`Attorneys for Defendant
`TELESIGN CORPORATION
`TELESIGN CORPORATION
`
`
`UNITED STATES DISTRICT COURT
`UNITED STATES DISTRICT COURT
`
`Plaintiff,
`Plaintiff,
`
`v.
`v.
`
`TWILIO INC.,
`TWILIO INC.,
`
`
`
`
`
`TELESIGN CORPORATION
`TELESIGN CORPORATION
`
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
` )
`
`NORTHERN DISTRICT OF CALIFORNIA — SAN JOSE DIVISION
`NORTHERN DISTRICT OF CALIFORNIA – SAN JOSE DIVISION
`
`CASE NO.: 5:16-cv-6925-LHK
`CASE NO.: 5:16-cv-6925-LHK
`
`JUDGE: Hon. Lucy H. Koh
`JUDGE: Hon. Lucy H. Koh
`
`DECLARATION OF SETH NIELSON, Ph. D
`DECLARATION OF SETH NIELSON, Ph. D.
`
`JURY TRIAL DEMANDED
`JURY TRIAL DEMANDED
`
`
`
`Defendant.
`Defendant.
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF SETH NIELSON, Ph.D.
`DECLARATION OF SETH NIELSON, Ph.D.
`
`
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 1
`
`
`
`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`I, SETH NIELSON, declare as follows:
`I, SETH NIELSON, declare as follows:
`
`1.
`1.
`
`I have been engaged by TeleSign Corporation and asked to opine on issues stated
`I have been engaged by TeleSign Corporation and asked to opine on issues stated
`
`herein related to the Claim Construction proceeding involving U.S. Patent Nos. 8,306,021 (the
`herein related to the Claim Construction proceeding involving U.S. Patent Nos. 8,306,021 (the
`
`"'021 Patent"); 8,837,465 (the "'465 Patent"); and 8,755,376 (the '376 Patent") ("Asserted
`“’021 Patent”); 8,837,465 (the “’465 Patent”); and 8,755,376 (the “’376 Patent”) (“Asserted
`
`Patents"). I am being compensated at a rate of $400 per hour. No part of my compensation is
`Patents”). I am being compensated at a rate of $400 per hour. No part of my compensation is
`
`dependent on my opinions or the outcome of this proceeding, and I have no financial or
`dependent on my opinions or the outcome of this proceeding, and I have no financial or
`
`beneficial interest in any of the parties to this Claim Construction proceeding.
`beneficial interest in any of the parties to this Claim Construction proceeding.
`
`2.
`2. This declaration is based on the information that was available to me as of the date
`This declaration is based on the information that was available to me as of the date
`
`of this declaration. I may revise, supplement, or expand my opinions based on further review
`of this declaration. I may revise, supplement, or expand my opinions based on further review
`
`and analysis of information and opinions provided to me subsequent to the filing of this
`and analysis of information and opinions provided to me subsequent to the filing of this
`
`declaration, including information and opinions submitted by Twilio or its expert(s).
`declaration, including information and opinions submitted by Twilio or its expert(s).
`
`3.
`3.
`
`I received a B.S. in Computer Science in 2000 and an M.S. in Computer Science in
`I received a B.S. in Computer Science in 2000 and an M.S. in Computer Science in
`
`2004, both from Brigham Young University in Provo, Utah. I received my Ph.D. in Computer
`2004, both from Brigham Young University in Provo, Utah. I received my Ph.D. in Computer
`
`Science in 2009 from Rice University in Houston, Texas. A copy of my C.V. is included as Ex.
`Science in 2009 from Rice University in Houston, Texas. A copy of my C.V. is included as Ex.
`
`A, including a list of all cases in which, during the previous four years, I have testified as an
`A, including a list of all cases in which, during the previous four years, I have testified as an
`
`expert at trial or by deposition. Ex. A also includes a list of all publications that I have authored
`expert at trial or by deposition. Ex. A also includes a list of all publications that I have authored
`
`in the previous ten years.
`in the previous ten years.
`
`4.
`4.
`
`I am the recipient of the Brown Fellowship and a Graduate Fellowship from the
`I am the recipient of the Brown Fellowship and a Graduate Fellowship from the
`
`Rice University Computer Science Department. I was also a John and Eileen Tietze Fellow at
`Rice University Computer Science Department. I was also a John and Eileen Tietze Fellow at
`
`Rice University.
`Rice University.
`
`5. During my final undergraduate semester, I worked both as a teaching assistant for
`5. During my final undergraduate semester, I worked both as a teaching assistant for
`
`a Computer Networking course and as a researcher in the Networked Computing Lab. In these
`a Computer Networking course and as a researcher in the Networked Computing Lab. In these
`
`capacities, I assisted students in debugging and designing TCP/IP protocol stacks, Address
`capacities, I assisted students in debugging and designing TCP/IP protocol stacks, Address
`
`Resolution Protocol implementations, and Remote Procedure Call projects. I have collaborated
`Resolution Protocol implementations, and Remote Procedure Call projects. I have collaborated
`
`on investigations of statistical traffic engineering for bandwidth allocation, including a
`on investigations of statistical traffic engineering for bandwidth allocation, including a
`
`published paper entitled, "Effective Bandwidth for Traffic Engineering."
`published paper entitled, “Effective Bandwidth for Traffic Engineering.”
`
`6. My initial research work as a graduate student related to software engineering
`6. My initial research work as a graduate student related to software engineering
`
`topics, with a special emphasis on how programmers think while creating and modifying code.
`topics, with a special emphasis on how programmers think while creating and modifying code.
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 2 -
`- 2 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 2
`
`
`
`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`During my course work, I took a special topics class called "Programmer Cognition" as well as
`During my course work, I took a special topics class called “Programmer Cognition” as well as
`
`a graduate-level neuroscience class from the Psychology department. Based on my research, I
`a graduate-level neuroscience class from the Psychology department. Based on my research, I
`
`proposed a concept called "Design Dysphasia," wherein a programmer or software developer
`proposed a concept called “Design Dysphasia,” wherein a programmer or software developer
`
`becomes trapped in their approach to solving problems based on the paradigms and design
`becomes trapped in their approach to solving problems based on the paradigms and design
`
`approaches of the programming language. My research was published as "Design dysphasia
`approaches of the programming language. My research was published as “Design dysphasia
`
`and the pattern maintenance cycle," in the Journal Information and Software Technology
`and the pattern maintenance cycle,” in the Journal Information and Software Technology
`
`August 2006. This work also was a major component of my Master's thesis.
`August 2006. This work also was a major component of my Master’s thesis.
`
`7. Another part of my Master’s thesis was the identification of how certain
`7. Another part of my Master's thesis was the identification of how certain
`
`programming language concepts can be "mixed" together. I investigated practical mechanisms
`programming language concepts can be “mixed” together. I investigated practical mechanisms
`
`whereby the Python programming language could be extended to support features known as
`whereby the Python programming language could be extended to support features known as
`
`"functional programming" and "logic (or declarative) programming " Languages with this mix
`“functional programming” and “logic (or declarative) programming.” Languages with this mix
`
`of features are known as "multi-paradigm" programming languages.
`of features are known as “multi-paradigm” programming languages.
`
`8. While working towards my Ph.D. at Rice University, I studied and published
`8. While working towards my Ph.D. at Rice University, I studied and published
`
`research related to networking and computer security. In 2005, I published a paper entitled, "A
`research related to networking and computer security. In 2005, I published a paper entitled, “A
`
`Taxonomy of Rational Attacks." This paper categorized and described the various types of
`Taxonomy of Rational Attacks.” This paper categorized and described the various types of
`
`attacks that one might see in a decentralized, peer-to-peer network. When there is no
`attacks that one might see in a decentralized, peer-to-peer network. When there is no
`
`centralized authority, users have to cooperate to obtain service. The term "rational attacks"
`centralized authority, users have to cooperate to obtain service. The term “rational attacks”
`
`refers to the economic incentives to not cooperate while still exploiting the system for service.
`refers to the economic incentives to not cooperate while still exploiting the system for service.
`
`9. My Ph.D. Thesis was entitled “Designing Incentives for Peer-to-Peer Systems,”
`9. My Ph.D. Thesis was entitled "Designing Incentives for Peer-to-Peer Systems,"
`
`and it built on this concept. Given a network where participants cannot be forced to cooperate,
`and it built on this concept. Given a network where participants cannot be forced to cooperate,
`
`the operation of said network must induce cooperation by design of the outcomes. In other
`the operation of said network must induce cooperation by design of the outcomes. In other
`
`words, it must be in each participant's best interest to contribute to the cooperative operation. I
`words, it must be in each participant’s best interest to contribute to the cooperative operation. I
`
`conducted experiments included simulated extensions to the BitTorrent peer-to-peer protocol
`conducted experiments included simulated extensions to the BitTorrent peer-to-peer protocol
`
`for long-term identities and mechanisms for cooperative anonymity. I constructed my own
`for long-term identities and mechanisms for cooperative anonymity. I constructed my own
`
`simulator of the BitTorrent protocol, and simulated thousands of hours of operations. I built the
`simulator of the BitTorrent protocol, and simulated thousands of hours of operations. I built the
`
`core simulator in C++ and integrated the Python scripting language for the rapid specification
`core simulator in C++ and integrated the Python scripting language for the rapid specification
`
`of actual simulations.
`of actual simulations.
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 3 -
`- 3 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 3
`
`
`
`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`10.
`10. I have more than 15 years working in industry as an engineer and consultant.
`I have more than 15 years working in industry as an engineer and consultant.
`
`From 2001 through 2003, I worked as a software engineer at Metrowerks (formerly Lineo,
`From 2001 through 2003, I worked as a software engineer at Metrowerks (formerly Lineo,
`
`Inc.), where I had substantial responsibilities relating to software architecture, computer
`Inc.), where I had substantial responsibilities relating to software architecture, computer
`
`networking, and technical project management. In particular, I developed and maintained the
`networking, and technical project management. In particular, I developed and maintained the
`
`GUI for the Embedix SDK (Software Development Kit), ported the Linx GUI of the Embedix
`GUI for the Embedix SDK (Software Development Kit), ported the Linx GUI of the Embedix
`
`SDK to Windows, created an automated system to forward Linux python scripts to a Windows
`SDK to Windows, created an automated system to forward Linux python scripts to a Windows
`
`GUI, and developed a packaging and automated updating system for client software. To
`GUI, and developed a packaging and automated updating system for client software. To
`
`complete these assignments, I wrote tens of thousands of lines of computer code in C++, C,
`complete these assignments, I wrote tens of thousands of lines of computer code in C++, C,
`
`Python, and Perl. I also used various tools such as CVS source control and libraries such as the
`Python, and Perl. I also used various tools such as CVS source control and libraries such as the
`
`QT framework.
`QT framework.
`
`11. The Embedix SDK was a tool designed for creating third-party embedded systems
`11. The Embedix SDK was a tool designed for creating third-party embedded systems
`
`and deploying them to devices. The SDK provided guidance, tools, and graphical
`and deploying them to devices. The SDK provided guidance, tools, and graphical
`
`representations for third-party developers to use in creating their own BSP's (Board Support
`representations for third-party developers to use in creating their own BSP’s (Board Support
`
`Packages).
`Packages).
`
`12. During the 2004 fall semester of my Ph.D. program at Rice University, I identified
`12. During the 2004 fall semester of my Ph.D. program at Rice University, I identified
`
`a security vulnerability in the Google Desktop Search that could have allowed hackers to
`a security vulnerability in the Google Desktop Search that could have allowed hackers to
`
`compromise users' computers and obtain private information. After contacting Google and
`compromise users’ computers and obtain private information. After contacting Google and
`
`assisting them in closing the vulnerability, we published the details of our investigation.
`assisting them in closing the vulnerability, we published the details of our investigation.
`
`13.
`13. In 2005, I completed an internship at Google, where I designed and implemented a
`In 2005, I completed an internship at Google, where I designed and implemented a
`
`solution to privacy loss in Google Web Accelerator. The Google Web Accelerator was
`solution to privacy loss in Google Web Accelerator. The Google Web Accelerator was
`
`designed to increase the speed of browsing the Internet. Once installed on a user's computer,
`designed to increase the speed of browsing the Internet. Once installed on a user’s computer,
`
`the browser would request all content through a Google Proxy. The proxy performed pre-
`the browser would request all content through a Google Proxy. The proxy performed pre-
`
`fetching and extensive caching in order to provide fast and responsive service to the user. At
`fetching and extensive caching in order to provide fast and responsive service to the user. At
`
`the time of my internship, news reports had identified odd problems in which users of the
`the time of my internship, news reports had identified odd problems in which users of the
`
`Accelerator were accessing other individual's private pages. During my internship, I designed
`Accelerator were accessing other individual’s private pages. During my internship, I designed
`
`and implemented a prototype solution for this issue in C++.
`and implemented a prototype solution for this issue in C++.
`
`14. From 2005 through 2011, I worked as a Security Analyst and later a Senior
`14. From 2005 through 2011, I worked as a Security Analyst and later a Senior
`
`Security Analyst for Independent Security Evaluators. There, I developed a parallel-processing
`Security Analyst for Independent Security Evaluators. There, I developed a parallel-processing
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 4 -
`- 4 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 4
`
`
`
`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`based security tool, developed a FIPS-certified encryption library, developed hardware-
`based security tool, developed a FIPS-certified encryption library, developed hardware-
`
`accelerated encryption algorithms, developed encrypted file-system prototypes, developed an
`accelerated encryption algorithms, developed encrypted file-system prototypes, developed an
`
`encryption library for an ISE client, performed port-scanning analyses, evaluated security
`encryption library for an ISE client, performed port-scanning analyses, evaluated security
`
`protocols using formal methods and hand analysis, and evaluated security failures. I also
`protocols using formal methods and hand analysis, and evaluated security failures. I also
`
`designed and managed the implementation of a secure communication technology that splits
`designed and managed the implementation of a secure communication technology that splits
`
`trust between multiple SSL Certificate Authorities (CA), so that if one CA is compromised, the
`trust between multiple SSL Certificate Authorities (CA), so that if one CA is compromised, the
`
`communication stream can still be safely authenticated. My work on the secure
`communication stream can still be safely authenticated. My work on the secure
`
`communications technology project led to the issuance of multiple patents. In total, I wrote
`communications technology project led to the issuance of multiple patents. In total, I wrote
`
`hundreds of thousands of lines of code in C, C++, and Python, including projects where I had to
`hundreds of thousands of lines of code in C, C++, and Python, including projects where I had to
`
`implement the same functionality in two separate languages.
`implement the same functionality in two separate languages.
`
`15.
`15. In 2011, I began work as a Research Scientist at Harbor Labs and continued with
`In 2011, I began work as a Research Scientist at Harbor Labs and continued with
`
`that consulting firm until fall 2015. I worked with a wide range of clients, specializing in
`that consulting firm until fall 2015. I worked with a wide range of clients, specializing in
`
`network security, network communications, software architecture, and programming languages.
`network security, network communications, software architecture, and programming languages.
`
`I analyzed an extensive collection of commercial software, including software related to secure
`I analyzed an extensive collection of commercial software, including software related to secure
`
`email, cloud-based multimedia delivery, document signing, anti-virus and anti-intrusion, high-
`email, cloud-based multimedia delivery, document signing, anti-virus and anti-intrusion, high-
`
`performance routing, networking protocol stacks in mobile devices, PBX telecommunications
`performance routing, networking protocol stacks in mobile devices, PBX telecommunications
`
`software, VoIP, and peer-to-peer communications. I also analyzed security considerations for
`software, VoIP, and peer-to-peer communications. I also analyzed security considerations for
`
`potential technology acquisitions, re-created heuristic signatures for 1995-era viruses, and re-
`potential technology acquisitions, re-created heuristic signatures for 1995-era viruses, and re-
`
`created a 1995-era network for testing virus scanners of that time period in gateway virus
`created a 1995-era network for testing virus scanners of that time period in gateway virus
`
`scanning. I managed teams that reviewed technologies for compliance with various standards,
`scanning. I managed teams that reviewed technologies for compliance with various standards,
`
`such as HIF'AA, and for security vulnerabilities.
`such as HIPAA, and for security vulnerabilities.
`
`16. Also at Harbor Labs, I reviewed technology and source code for multiple clients
`16. Also at Harbor Labs, I reviewed technology and source code for multiple clients
`
`related to accusations of theft and/or misappropriation of trade secrets. These engagements
`related to accusations of theft and/or misappropriation of trade secrets. These engagements
`
`included an analysis of C, C++, Java, Python, and other source code languages in high-
`included an analysis of C, C++, Java, Python, and other source code languages in high-
`
`frequency trading, e-commerce, and other similar systems.
`frequency trading, e-commerce, and other similar systems.
`
`17.
`17. I also assessed the security and privacy technologies and policies provided by a
`I also assessed the security and privacy technologies and policies provided by a
`
`third-party vendor to the Center for Copyright Infringement (CCI). CCI represents content
`third-party vendor to the Center for Copyright Infringement (CCI). CCI represents content
`
`owners, such as the RIAA and the MPAA, in finding and reducing piracy online Because this
`owners, such as the RIAA and the MPAA, in finding and reducing piracy online. Because this
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 5 -
`- 5 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 5
`
`
`
`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`process necessarily involves collecting information about private individuals, I was asked to
`process necessarily involves collecting information about private individuals, I was asked to
`
`investigate and determine that the information collected from online computing devices was
`investigate and determine that the information collected from online computing devices was
`
`adequately safeguarded and protected.
`adequately safeguarded and protected.
`
`18. For other clients, I have “resurrected” or re-created legacy software systems. For
`18. For other clients, I have "resurrected" or re-created legacy software systems. For
`
`example, I assisted one client make code from the mid 90's operational. I helped them identify
`example, I assisted one client make code from the mid 90’s operational. I helped them identify
`
`the most compatible components from an old CVS repository, obtain the necessary legacy
`the most compatible components from an old CVS repository, obtain the necessary legacy
`
`hardware and software to rebuild the source code, and diagnose why the separate components
`hardware and software to rebuild the source code, and diagnose why the separate components
`
`weren't completely compatible with each other. Using tools from the era (i.e., the mid-90's), I
`weren’t completely compatible with each other. Using tools from the era (i.e., the mid-90’s), I
`
`identified and fixed these issues in C++ and Java code, and successfully demonstrated the
`identified and fixed these issues in C++ and Java code, and successfully demonstrated the
`
`operational system. In other similar examples, I re-created basic software in x86 Assembly
`operational system. In other similar examples, I re-created basic software in x86 Assembly
`
`code that mimicked the behavior of 1990's era viruses, wrote a file transfer system similar to
`code that mimicked the behavior of 1990’s era viruses, wrote a file transfer system similar to
`
`FTP in pre-2.0 Java, and demonstrated the use of a command-line antivirus software adapted for
`FTP in pre-2.0 Java, and demonstrated the use of a command-line antivirus software adapted for
`
`router/gateway scanning.
`router/gateway scanning.
`
`19. During my final year at Harbor Labs, I was engaged as the principal consultant
`19. During my final year at Harbor Labs, I was engaged as the principal consultant
`
`with a large biomedical device firm in a twelve-month analysis of the security of their products.
`with a large biomedical device firm in a twelve-month analysis of the security of their products.
`
`Notably, medical devices were for some time not considered significant threats in terms of
`Notably, medical devices were for some time not considered significant threats in terms of
`
`computer security. However, recent demonstrations by security researchers of the various ways
`computer security. However, recent demonstrations by security researchers of the various ways
`
`in which a malicious individual might harm a person using a medical device has shifted the
`in which a malicious individual might harm a person using a medical device has shifted the
`
`thinking in the industry. Accordingly, I was engaged to assist this company in the analysis of
`thinking in the industry. Accordingly, I was engaged to assist this company in the analysis of
`
`their products, their process, and their future roadmap in order to ensure that patients are not
`their products, their process, and their future roadmap in order to ensure that patients are not
`
`harmed. I and my team analyzed design documents, hardware, and a broad range of additional
`harmed. I and my team analyzed design documents, hardware, and a broad range of additional
`
`resources in order to expose potential problems. The security of these systems depends, in part,
`resources in order to expose potential problems. The security of these systems depends, in part,
`
`on the architecture and deployment of the networks in which they operate.
`on the architecture and deployment of the networks in which they operate.
`
`20.
`20. In December of 2015, I joined Ironwood Experts, another consulting firm, as the
`In December of 2015, I joined Ironwood Experts, another consulting firm, as the
`
`Managing Partner. While I am maintaining an affiliation with Ironwood, I have now formed
`Managing Partner. While I am maintaining an affiliation with Ironwood, I have now formed
`
`Crimson Vista, Inc., in March 2016, where I am the Chief Scientist. At Crimson Vista, I
`Crimson Vista, Inc., in March 2016, where I am the Chief Scientist. At Crimson Vista, I
`
`engage in the same types of consulting projects as I did at Harbor Labs, described above.
`engage in the same types of consulting projects as I did at Harbor Labs, described above.
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 6 -
`- 6 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 6
`
`
`
`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`21.
`21. In 2014, I received an appointment as a Lecturer at Johns Hopkins University, and
`In 2014, I received an appointment as a Lecturer at Johns Hopkins University, and
`
`in 2015, I advanced to an Adjunct Associate Research Scientist. My responsibilities at Hopkins
`in 2015, I advanced to an Adjunct Associate Research Scientist. My responsibilities at Hopkins
`
`include teaching classes, mentoring students, and conducting research. More specifically, I
`include teaching classes, mentoring students, and conducting research. More specifically, I
`
`currently teach the Network Security course for which I created the curriculum from scratch.
`currently teach the Network Security course for which I created the curriculum from scratch.
`
`As part of this curriculum, I designed a novel experimentation framework for allowing students
`As part of this curriculum, I designed a novel experimentation framework for allowing students
`
`to both build and attack security protocols. The course covered topics ranging from
`to both build and attack security protocols. The course covered topics ranging from
`
`cryptography and access controls to network architecture and user psychology.
`cryptography and access controls to network architecture and user psychology.
`
`22. One of the components of the students’ lab work is to create a protected “sandbox”
`22. One of the components of the students' lab work is to create a protected "sandbox"
`
`for running untrusted code. The sandbox must provide access to the system in a manner that
`for running untrusted code. The sandbox must provide access to the system in a manner that
`
`cannot be exploited. Conversely, the other half of their assignment is to design exploitative
`cannot be exploited. Conversely, the other half of their assignment is to design exploitative
`
`code that attempts to bypass and/or neutralize the protections of the sandbox environment. This
`code that attempts to bypass and/or neutralize the protections of the sandbox environment. This
`
`experimental framework enables the students to learn about creating, identifying, and
`experimental framework enables the students to learn about creating, identifying, and
`
`neutralizing malware such as viruses.
`neutralizing malware such as viruses.
`
`23.
`23. In addition to my course instruction, I also mentor Masters students at Johns
`In addition to my course instruction, I also mentor Masters students at Johns
`
`Hopkins in their capstone projects. These projects include networking security and privacy
`Hopkins in their capstone projects. These projects include networking security and privacy
`
`concerns across a wide range of technologies including iOS security, BitCoin, SSL
`concerns across a wide range of technologies including iOS security, BitCoin, SSL
`
`vulnerabilities, and Twitter "botnets." These are all contemporary issues in practical computer
`vulnerabilities, and Twitter “botnets.” These are all contemporary issues in practical computer
`
`security.
`security.
`
`24.
`24. I have worked with one group of students, for example, to investigate the known
`I have worked with one group of students, for example, to investigate the known
`
`Heartbleed vulnerability in certain versions of OpenSSL. Under my direction, the students
`Heartbleed vulnerability in certain versions of OpenSSL. Under my direction, the students
`
`created a vulnerable server to test. Once they were able to re-create the known vulnerability,
`created a vulnerable server to test. Once they were able to re-create the known vulnerability,
`
`they explored other ways of testing and finding vulnerabilities of the same sort using, for
`they explored other ways of testing and finding vulnerabilities of the same sort using, for
`
`example, a technique known as "fuzzing."
`example, a technique known as “fuzzing.”
`
`25. Another student performed an analysis on “bots” in social media such as Twitter.
`25. Another student performed an analysis on "bots" in social media such as Twitter.
`
`Twitter relies on advertising that is based, in part, on identifying "influential" individuals (i.e.,
`Twitter relies on ad