throbber
1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`SHOOK, HARDY & BACON L.L.P.
`SHOOK, HARDY & BACON L.L.P.
`Gary Miller (Appearance Pro Hac Vice)
`Gary Miller (Appearance Pro Hac Vice)
`gmiller@ shb.com
`gmiller@shb.com
`111 S. Wacker Drive, 51st Floor
`111 S. Wacker Drive, 51st Floor
`Chicago, Illinois 60606
`Chicago, Illinois 60606
`Telephone: 312-704-7700
`Telephone: 312-704-7700
`Facsimile• 312-558-1195
`Facsimile: 312-558-1195
`
`Jesse J. Camacho (Appearance Pro Hac Vice)
`Jesse J. Camacho (Appearance Pro Hac Vice)
`jcamacho@shb.com
`jcamacho@shb.com
`Mary J. Peal (Appearance Pro Hac Vice)
`Mary J. Peal (Appearance Pro Hac Vice)
`mpeal@ shb.com
`mpeal@shb.com
`Ryan D. Dykal (Appearance Pro Hac Vice)
`Ryan D. Dykal (Appearance Pro Hac Vice)
`rdykal@ shb.com
`rdykal@shb.com
`Daniel M. Staren (Appearance Pro Hac Vice)
`Daniel M. Staren (Appearance Pro Hac Vice)
`dstaren@shb.com
`dstaren@shb.com
`2555 Grand Boulevard
`2555 Grand Boulevard
`Kansas City, Missouri 64108
`Kansas City, Missouri 64108
`Telephone: 816-474-6550
`Telephone: 816-474-6550
`Facsimile• 816-421-5547
`Facsimile: 816-421-5547
`
`Mayela C. Montenegro (SBN: 304471)
`Mayela C. Montenegro (SBN: 304471)
`mmontenegro@shb.com
`mmontenegro@shb.com
`5 Park Plaza, Suite 1600
`5 Park Plaza, Suite 1600
`Irvine, California 92614
`Irvine, California 92614
`Telephone:
`949-475-1500
`Telephone:
`949-475-1500
`Facsimile•
`949-475-0016
`Facsimile:
`949-475-0016
`
`Attorneys for Defendant
`Attorneys for Defendant
`TELESIGN CORPORATION
`TELESIGN CORPORATION
`
`
`UNITED STATES DISTRICT COURT
`UNITED STATES DISTRICT COURT
`
`Plaintiff,
`Plaintiff,
`
`v.
`v.
`
`TWILIO INC.,
`TWILIO INC.,
`
`
`
`
`
`TELESIGN CORPORATION
`TELESIGN CORPORATION
`
`
`
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
` )
`
`NORTHERN DISTRICT OF CALIFORNIA — SAN JOSE DIVISION
`NORTHERN DISTRICT OF CALIFORNIA – SAN JOSE DIVISION
`
`CASE NO.: 5:16-cv-6925-LHK
`CASE NO.: 5:16-cv-6925-LHK
`
`JUDGE: Hon. Lucy H. Koh
`JUDGE: Hon. Lucy H. Koh
`
`DECLARATION OF SETH NIELSON, Ph. D
`DECLARATION OF SETH NIELSON, Ph. D.
`
`JURY TRIAL DEMANDED
`JURY TRIAL DEMANDED
`
`
`
`Defendant.
`Defendant.
`
`
`
`
`
`
`
`
`
`
`DECLARATION OF SETH NIELSON, Ph.D.
`DECLARATION OF SETH NIELSON, Ph.D.
`
`
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 1
`
`

`

`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`I, SETH NIELSON, declare as follows:
`I, SETH NIELSON, declare as follows:
`
`1.
`1.
`
`I have been engaged by TeleSign Corporation and asked to opine on issues stated
`I have been engaged by TeleSign Corporation and asked to opine on issues stated
`
`herein related to the Claim Construction proceeding involving U.S. Patent Nos. 8,306,021 (the
`herein related to the Claim Construction proceeding involving U.S. Patent Nos. 8,306,021 (the
`
`"'021 Patent"); 8,837,465 (the "'465 Patent"); and 8,755,376 (the '376 Patent") ("Asserted
`“’021 Patent”); 8,837,465 (the “’465 Patent”); and 8,755,376 (the “’376 Patent”) (“Asserted
`
`Patents"). I am being compensated at a rate of $400 per hour. No part of my compensation is
`Patents”). I am being compensated at a rate of $400 per hour. No part of my compensation is
`
`dependent on my opinions or the outcome of this proceeding, and I have no financial or
`dependent on my opinions or the outcome of this proceeding, and I have no financial or
`
`beneficial interest in any of the parties to this Claim Construction proceeding.
`beneficial interest in any of the parties to this Claim Construction proceeding.
`
`2.
`2. This declaration is based on the information that was available to me as of the date
`This declaration is based on the information that was available to me as of the date
`
`of this declaration. I may revise, supplement, or expand my opinions based on further review
`of this declaration. I may revise, supplement, or expand my opinions based on further review
`
`and analysis of information and opinions provided to me subsequent to the filing of this
`and analysis of information and opinions provided to me subsequent to the filing of this
`
`declaration, including information and opinions submitted by Twilio or its expert(s).
`declaration, including information and opinions submitted by Twilio or its expert(s).
`
`3.
`3.
`
`I received a B.S. in Computer Science in 2000 and an M.S. in Computer Science in
`I received a B.S. in Computer Science in 2000 and an M.S. in Computer Science in
`
`2004, both from Brigham Young University in Provo, Utah. I received my Ph.D. in Computer
`2004, both from Brigham Young University in Provo, Utah. I received my Ph.D. in Computer
`
`Science in 2009 from Rice University in Houston, Texas. A copy of my C.V. is included as Ex.
`Science in 2009 from Rice University in Houston, Texas. A copy of my C.V. is included as Ex.
`
`A, including a list of all cases in which, during the previous four years, I have testified as an
`A, including a list of all cases in which, during the previous four years, I have testified as an
`
`expert at trial or by deposition. Ex. A also includes a list of all publications that I have authored
`expert at trial or by deposition. Ex. A also includes a list of all publications that I have authored
`
`in the previous ten years.
`in the previous ten years.
`
`4.
`4.
`
`I am the recipient of the Brown Fellowship and a Graduate Fellowship from the
`I am the recipient of the Brown Fellowship and a Graduate Fellowship from the
`
`Rice University Computer Science Department. I was also a John and Eileen Tietze Fellow at
`Rice University Computer Science Department. I was also a John and Eileen Tietze Fellow at
`
`Rice University.
`Rice University.
`
`5. During my final undergraduate semester, I worked both as a teaching assistant for
`5. During my final undergraduate semester, I worked both as a teaching assistant for
`
`a Computer Networking course and as a researcher in the Networked Computing Lab. In these
`a Computer Networking course and as a researcher in the Networked Computing Lab. In these
`
`capacities, I assisted students in debugging and designing TCP/IP protocol stacks, Address
`capacities, I assisted students in debugging and designing TCP/IP protocol stacks, Address
`
`Resolution Protocol implementations, and Remote Procedure Call projects. I have collaborated
`Resolution Protocol implementations, and Remote Procedure Call projects. I have collaborated
`
`on investigations of statistical traffic engineering for bandwidth allocation, including a
`on investigations of statistical traffic engineering for bandwidth allocation, including a
`
`published paper entitled, "Effective Bandwidth for Traffic Engineering."
`published paper entitled, “Effective Bandwidth for Traffic Engineering.”
`
`6. My initial research work as a graduate student related to software engineering
`6. My initial research work as a graduate student related to software engineering
`
`topics, with a special emphasis on how programmers think while creating and modifying code.
`topics, with a special emphasis on how programmers think while creating and modifying code.
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 2 -
`- 2 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 2
`
`

`

`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`During my course work, I took a special topics class called "Programmer Cognition" as well as
`During my course work, I took a special topics class called “Programmer Cognition” as well as
`
`a graduate-level neuroscience class from the Psychology department. Based on my research, I
`a graduate-level neuroscience class from the Psychology department. Based on my research, I
`
`proposed a concept called "Design Dysphasia," wherein a programmer or software developer
`proposed a concept called “Design Dysphasia,” wherein a programmer or software developer
`
`becomes trapped in their approach to solving problems based on the paradigms and design
`becomes trapped in their approach to solving problems based on the paradigms and design
`
`approaches of the programming language. My research was published as "Design dysphasia
`approaches of the programming language. My research was published as “Design dysphasia
`
`and the pattern maintenance cycle," in the Journal Information and Software Technology
`and the pattern maintenance cycle,” in the Journal Information and Software Technology
`
`August 2006. This work also was a major component of my Master's thesis.
`August 2006. This work also was a major component of my Master’s thesis.
`
`7. Another part of my Master’s thesis was the identification of how certain
`7. Another part of my Master's thesis was the identification of how certain
`
`programming language concepts can be "mixed" together. I investigated practical mechanisms
`programming language concepts can be “mixed” together. I investigated practical mechanisms
`
`whereby the Python programming language could be extended to support features known as
`whereby the Python programming language could be extended to support features known as
`
`"functional programming" and "logic (or declarative) programming " Languages with this mix
`“functional programming” and “logic (or declarative) programming.” Languages with this mix
`
`of features are known as "multi-paradigm" programming languages.
`of features are known as “multi-paradigm” programming languages.
`
`8. While working towards my Ph.D. at Rice University, I studied and published
`8. While working towards my Ph.D. at Rice University, I studied and published
`
`research related to networking and computer security. In 2005, I published a paper entitled, "A
`research related to networking and computer security. In 2005, I published a paper entitled, “A
`
`Taxonomy of Rational Attacks." This paper categorized and described the various types of
`Taxonomy of Rational Attacks.” This paper categorized and described the various types of
`
`attacks that one might see in a decentralized, peer-to-peer network. When there is no
`attacks that one might see in a decentralized, peer-to-peer network. When there is no
`
`centralized authority, users have to cooperate to obtain service. The term "rational attacks"
`centralized authority, users have to cooperate to obtain service. The term “rational attacks”
`
`refers to the economic incentives to not cooperate while still exploiting the system for service.
`refers to the economic incentives to not cooperate while still exploiting the system for service.
`
`9. My Ph.D. Thesis was entitled “Designing Incentives for Peer-to-Peer Systems,”
`9. My Ph.D. Thesis was entitled "Designing Incentives for Peer-to-Peer Systems,"
`
`and it built on this concept. Given a network where participants cannot be forced to cooperate,
`and it built on this concept. Given a network where participants cannot be forced to cooperate,
`
`the operation of said network must induce cooperation by design of the outcomes. In other
`the operation of said network must induce cooperation by design of the outcomes. In other
`
`words, it must be in each participant's best interest to contribute to the cooperative operation. I
`words, it must be in each participant’s best interest to contribute to the cooperative operation. I
`
`conducted experiments included simulated extensions to the BitTorrent peer-to-peer protocol
`conducted experiments included simulated extensions to the BitTorrent peer-to-peer protocol
`
`for long-term identities and mechanisms for cooperative anonymity. I constructed my own
`for long-term identities and mechanisms for cooperative anonymity. I constructed my own
`
`simulator of the BitTorrent protocol, and simulated thousands of hours of operations. I built the
`simulator of the BitTorrent protocol, and simulated thousands of hours of operations. I built the
`
`core simulator in C++ and integrated the Python scripting language for the rapid specification
`core simulator in C++ and integrated the Python scripting language for the rapid specification
`
`of actual simulations.
`of actual simulations.
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 3 -
`- 3 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 3
`
`

`

`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`10.
`10. I have more than 15 years working in industry as an engineer and consultant.
`I have more than 15 years working in industry as an engineer and consultant.
`
`From 2001 through 2003, I worked as a software engineer at Metrowerks (formerly Lineo,
`From 2001 through 2003, I worked as a software engineer at Metrowerks (formerly Lineo,
`
`Inc.), where I had substantial responsibilities relating to software architecture, computer
`Inc.), where I had substantial responsibilities relating to software architecture, computer
`
`networking, and technical project management. In particular, I developed and maintained the
`networking, and technical project management. In particular, I developed and maintained the
`
`GUI for the Embedix SDK (Software Development Kit), ported the Linx GUI of the Embedix
`GUI for the Embedix SDK (Software Development Kit), ported the Linx GUI of the Embedix
`
`SDK to Windows, created an automated system to forward Linux python scripts to a Windows
`SDK to Windows, created an automated system to forward Linux python scripts to a Windows
`
`GUI, and developed a packaging and automated updating system for client software. To
`GUI, and developed a packaging and automated updating system for client software. To
`
`complete these assignments, I wrote tens of thousands of lines of computer code in C++, C,
`complete these assignments, I wrote tens of thousands of lines of computer code in C++, C,
`
`Python, and Perl. I also used various tools such as CVS source control and libraries such as the
`Python, and Perl. I also used various tools such as CVS source control and libraries such as the
`
`QT framework.
`QT framework.
`
`11. The Embedix SDK was a tool designed for creating third-party embedded systems
`11. The Embedix SDK was a tool designed for creating third-party embedded systems
`
`and deploying them to devices. The SDK provided guidance, tools, and graphical
`and deploying them to devices. The SDK provided guidance, tools, and graphical
`
`representations for third-party developers to use in creating their own BSP's (Board Support
`representations for third-party developers to use in creating their own BSP’s (Board Support
`
`Packages).
`Packages).
`
`12. During the 2004 fall semester of my Ph.D. program at Rice University, I identified
`12. During the 2004 fall semester of my Ph.D. program at Rice University, I identified
`
`a security vulnerability in the Google Desktop Search that could have allowed hackers to
`a security vulnerability in the Google Desktop Search that could have allowed hackers to
`
`compromise users' computers and obtain private information. After contacting Google and
`compromise users’ computers and obtain private information. After contacting Google and
`
`assisting them in closing the vulnerability, we published the details of our investigation.
`assisting them in closing the vulnerability, we published the details of our investigation.
`
`13.
`13. In 2005, I completed an internship at Google, where I designed and implemented a
`In 2005, I completed an internship at Google, where I designed and implemented a
`
`solution to privacy loss in Google Web Accelerator. The Google Web Accelerator was
`solution to privacy loss in Google Web Accelerator. The Google Web Accelerator was
`
`designed to increase the speed of browsing the Internet. Once installed on a user's computer,
`designed to increase the speed of browsing the Internet. Once installed on a user’s computer,
`
`the browser would request all content through a Google Proxy. The proxy performed pre-
`the browser would request all content through a Google Proxy. The proxy performed pre-
`
`fetching and extensive caching in order to provide fast and responsive service to the user. At
`fetching and extensive caching in order to provide fast and responsive service to the user. At
`
`the time of my internship, news reports had identified odd problems in which users of the
`the time of my internship, news reports had identified odd problems in which users of the
`
`Accelerator were accessing other individual's private pages. During my internship, I designed
`Accelerator were accessing other individual’s private pages. During my internship, I designed
`
`and implemented a prototype solution for this issue in C++.
`and implemented a prototype solution for this issue in C++.
`
`14. From 2005 through 2011, I worked as a Security Analyst and later a Senior
`14. From 2005 through 2011, I worked as a Security Analyst and later a Senior
`
`Security Analyst for Independent Security Evaluators. There, I developed a parallel-processing
`Security Analyst for Independent Security Evaluators. There, I developed a parallel-processing
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 4 -
`- 4 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 4
`
`

`

`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`based security tool, developed a FIPS-certified encryption library, developed hardware-
`based security tool, developed a FIPS-certified encryption library, developed hardware-
`
`accelerated encryption algorithms, developed encrypted file-system prototypes, developed an
`accelerated encryption algorithms, developed encrypted file-system prototypes, developed an
`
`encryption library for an ISE client, performed port-scanning analyses, evaluated security
`encryption library for an ISE client, performed port-scanning analyses, evaluated security
`
`protocols using formal methods and hand analysis, and evaluated security failures. I also
`protocols using formal methods and hand analysis, and evaluated security failures. I also
`
`designed and managed the implementation of a secure communication technology that splits
`designed and managed the implementation of a secure communication technology that splits
`
`trust between multiple SSL Certificate Authorities (CA), so that if one CA is compromised, the
`trust between multiple SSL Certificate Authorities (CA), so that if one CA is compromised, the
`
`communication stream can still be safely authenticated. My work on the secure
`communication stream can still be safely authenticated. My work on the secure
`
`communications technology project led to the issuance of multiple patents. In total, I wrote
`communications technology project led to the issuance of multiple patents. In total, I wrote
`
`hundreds of thousands of lines of code in C, C++, and Python, including projects where I had to
`hundreds of thousands of lines of code in C, C++, and Python, including projects where I had to
`
`implement the same functionality in two separate languages.
`implement the same functionality in two separate languages.
`
`15.
`15. In 2011, I began work as a Research Scientist at Harbor Labs and continued with
`In 2011, I began work as a Research Scientist at Harbor Labs and continued with
`
`that consulting firm until fall 2015. I worked with a wide range of clients, specializing in
`that consulting firm until fall 2015. I worked with a wide range of clients, specializing in
`
`network security, network communications, software architecture, and programming languages.
`network security, network communications, software architecture, and programming languages.
`
`I analyzed an extensive collection of commercial software, including software related to secure
`I analyzed an extensive collection of commercial software, including software related to secure
`
`email, cloud-based multimedia delivery, document signing, anti-virus and anti-intrusion, high-
`email, cloud-based multimedia delivery, document signing, anti-virus and anti-intrusion, high-
`
`performance routing, networking protocol stacks in mobile devices, PBX telecommunications
`performance routing, networking protocol stacks in mobile devices, PBX telecommunications
`
`software, VoIP, and peer-to-peer communications. I also analyzed security considerations for
`software, VoIP, and peer-to-peer communications. I also analyzed security considerations for
`
`potential technology acquisitions, re-created heuristic signatures for 1995-era viruses, and re-
`potential technology acquisitions, re-created heuristic signatures for 1995-era viruses, and re-
`
`created a 1995-era network for testing virus scanners of that time period in gateway virus
`created a 1995-era network for testing virus scanners of that time period in gateway virus
`
`scanning. I managed teams that reviewed technologies for compliance with various standards,
`scanning. I managed teams that reviewed technologies for compliance with various standards,
`
`such as HIF'AA, and for security vulnerabilities.
`such as HIPAA, and for security vulnerabilities.
`
`16. Also at Harbor Labs, I reviewed technology and source code for multiple clients
`16. Also at Harbor Labs, I reviewed technology and source code for multiple clients
`
`related to accusations of theft and/or misappropriation of trade secrets. These engagements
`related to accusations of theft and/or misappropriation of trade secrets. These engagements
`
`included an analysis of C, C++, Java, Python, and other source code languages in high-
`included an analysis of C, C++, Java, Python, and other source code languages in high-
`
`frequency trading, e-commerce, and other similar systems.
`frequency trading, e-commerce, and other similar systems.
`
`17.
`17. I also assessed the security and privacy technologies and policies provided by a
`I also assessed the security and privacy technologies and policies provided by a
`
`third-party vendor to the Center for Copyright Infringement (CCI). CCI represents content
`third-party vendor to the Center for Copyright Infringement (CCI). CCI represents content
`
`owners, such as the RIAA and the MPAA, in finding and reducing piracy online Because this
`owners, such as the RIAA and the MPAA, in finding and reducing piracy online. Because this
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 5 -
`- 5 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 5
`
`

`

`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`process necessarily involves collecting information about private individuals, I was asked to
`process necessarily involves collecting information about private individuals, I was asked to
`
`investigate and determine that the information collected from online computing devices was
`investigate and determine that the information collected from online computing devices was
`
`adequately safeguarded and protected.
`adequately safeguarded and protected.
`
`18. For other clients, I have “resurrected” or re-created legacy software systems. For
`18. For other clients, I have "resurrected" or re-created legacy software systems. For
`
`example, I assisted one client make code from the mid 90's operational. I helped them identify
`example, I assisted one client make code from the mid 90’s operational. I helped them identify
`
`the most compatible components from an old CVS repository, obtain the necessary legacy
`the most compatible components from an old CVS repository, obtain the necessary legacy
`
`hardware and software to rebuild the source code, and diagnose why the separate components
`hardware and software to rebuild the source code, and diagnose why the separate components
`
`weren't completely compatible with each other. Using tools from the era (i.e., the mid-90's), I
`weren’t completely compatible with each other. Using tools from the era (i.e., the mid-90’s), I
`
`identified and fixed these issues in C++ and Java code, and successfully demonstrated the
`identified and fixed these issues in C++ and Java code, and successfully demonstrated the
`
`operational system. In other similar examples, I re-created basic software in x86 Assembly
`operational system. In other similar examples, I re-created basic software in x86 Assembly
`
`code that mimicked the behavior of 1990's era viruses, wrote a file transfer system similar to
`code that mimicked the behavior of 1990’s era viruses, wrote a file transfer system similar to
`
`FTP in pre-2.0 Java, and demonstrated the use of a command-line antivirus software adapted for
`FTP in pre-2.0 Java, and demonstrated the use of a command-line antivirus software adapted for
`
`router/gateway scanning.
`router/gateway scanning.
`
`19. During my final year at Harbor Labs, I was engaged as the principal consultant
`19. During my final year at Harbor Labs, I was engaged as the principal consultant
`
`with a large biomedical device firm in a twelve-month analysis of the security of their products.
`with a large biomedical device firm in a twelve-month analysis of the security of their products.
`
`Notably, medical devices were for some time not considered significant threats in terms of
`Notably, medical devices were for some time not considered significant threats in terms of
`
`computer security. However, recent demonstrations by security researchers of the various ways
`computer security. However, recent demonstrations by security researchers of the various ways
`
`in which a malicious individual might harm a person using a medical device has shifted the
`in which a malicious individual might harm a person using a medical device has shifted the
`
`thinking in the industry. Accordingly, I was engaged to assist this company in the analysis of
`thinking in the industry. Accordingly, I was engaged to assist this company in the analysis of
`
`their products, their process, and their future roadmap in order to ensure that patients are not
`their products, their process, and their future roadmap in order to ensure that patients are not
`
`harmed. I and my team analyzed design documents, hardware, and a broad range of additional
`harmed. I and my team analyzed design documents, hardware, and a broad range of additional
`
`resources in order to expose potential problems. The security of these systems depends, in part,
`resources in order to expose potential problems. The security of these systems depends, in part,
`
`on the architecture and deployment of the networks in which they operate.
`on the architecture and deployment of the networks in which they operate.
`
`20.
`20. In December of 2015, I joined Ironwood Experts, another consulting firm, as the
`In December of 2015, I joined Ironwood Experts, another consulting firm, as the
`
`Managing Partner. While I am maintaining an affiliation with Ironwood, I have now formed
`Managing Partner. While I am maintaining an affiliation with Ironwood, I have now formed
`
`Crimson Vista, Inc., in March 2016, where I am the Chief Scientist. At Crimson Vista, I
`Crimson Vista, Inc., in March 2016, where I am the Chief Scientist. At Crimson Vista, I
`
`engage in the same types of consulting projects as I did at Harbor Labs, described above.
`engage in the same types of consulting projects as I did at Harbor Labs, described above.
`
`DECLARATION OF SETH NIELSON, Ph.D
`DECLARATION OF SETH NIELSON, Ph.D
`
`- 6 -
`- 6 -
`
`5:16-CV-6925-LHK
`5:16-CV-6925-LHK
`
`TWILIO INC., EX 2007, Page 6
`
`

`

`1
`1
`
`2
`2
`
`3
`3
`
`4
`4
`
`5
`5
`
`6
`6
`
`7
`7
`
`8
`8
`
`9
`9
`
`10
`10
`
`11
`11
`
`12
`12
`
`13
`13
`
`14
`14
`
`15
`15
`
`16
`16
`
`17
`17
`
`18
`18
`
`19
`19
`
`20
`20
`
`21
`21
`
`22
`22
`
`23
`23
`
`24
`24
`
`25
`25
`
`26
`26
`
`27
`27
`
`28
`28
`
`
`
`
`
`
`
`21.
`21. In 2014, I received an appointment as a Lecturer at Johns Hopkins University, and
`In 2014, I received an appointment as a Lecturer at Johns Hopkins University, and
`
`in 2015, I advanced to an Adjunct Associate Research Scientist. My responsibilities at Hopkins
`in 2015, I advanced to an Adjunct Associate Research Scientist. My responsibilities at Hopkins
`
`include teaching classes, mentoring students, and conducting research. More specifically, I
`include teaching classes, mentoring students, and conducting research. More specifically, I
`
`currently teach the Network Security course for which I created the curriculum from scratch.
`currently teach the Network Security course for which I created the curriculum from scratch.
`
`As part of this curriculum, I designed a novel experimentation framework for allowing students
`As part of this curriculum, I designed a novel experimentation framework for allowing students
`
`to both build and attack security protocols. The course covered topics ranging from
`to both build and attack security protocols. The course covered topics ranging from
`
`cryptography and access controls to network architecture and user psychology.
`cryptography and access controls to network architecture and user psychology.
`
`22. One of the components of the students’ lab work is to create a protected “sandbox”
`22. One of the components of the students' lab work is to create a protected "sandbox"
`
`for running untrusted code. The sandbox must provide access to the system in a manner that
`for running untrusted code. The sandbox must provide access to the system in a manner that
`
`cannot be exploited. Conversely, the other half of their assignment is to design exploitative
`cannot be exploited. Conversely, the other half of their assignment is to design exploitative
`
`code that attempts to bypass and/or neutralize the protections of the sandbox environment. This
`code that attempts to bypass and/or neutralize the protections of the sandbox environment. This
`
`experimental framework enables the students to learn about creating, identifying, and
`experimental framework enables the students to learn about creating, identifying, and
`
`neutralizing malware such as viruses.
`neutralizing malware such as viruses.
`
`23.
`23. In addition to my course instruction, I also mentor Masters students at Johns
`In addition to my course instruction, I also mentor Masters students at Johns
`
`Hopkins in their capstone projects. These projects include networking security and privacy
`Hopkins in their capstone projects. These projects include networking security and privacy
`
`concerns across a wide range of technologies including iOS security, BitCoin, SSL
`concerns across a wide range of technologies including iOS security, BitCoin, SSL
`
`vulnerabilities, and Twitter "botnets." These are all contemporary issues in practical computer
`vulnerabilities, and Twitter “botnets.” These are all contemporary issues in practical computer
`
`security.
`security.
`
`24.
`24. I have worked with one group of students, for example, to investigate the known
`I have worked with one group of students, for example, to investigate the known
`
`Heartbleed vulnerability in certain versions of OpenSSL. Under my direction, the students
`Heartbleed vulnerability in certain versions of OpenSSL. Under my direction, the students
`
`created a vulnerable server to test. Once they were able to re-create the known vulnerability,
`created a vulnerable server to test. Once they were able to re-create the known vulnerability,
`
`they explored other ways of testing and finding vulnerabilities of the same sort using, for
`they explored other ways of testing and finding vulnerabilities of the same sort using, for
`
`example, a technique known as "fuzzing."
`example, a technique known as “fuzzing.”
`
`25. Another student performed an analysis on “bots” in social media such as Twitter.
`25. Another student performed an analysis on "bots" in social media such as Twitter.
`
`Twitter relies on advertising that is based, in part, on identifying "influential" individuals (i.e.,
`Twitter relies on ad

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket