throbber
Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 1 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`EXHIBIT 5-A
`(being supplemented to add to
`Ex. 5 – Dkt 0079-2)
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 2 of 18
`Home Vita Teaching Blog Contact
`
`Avi Rubin’s Vita
`
`
`
`Academic Degrees
`- 1994, Ph.D., Computer Science and Engineering, University of Michigan, Ann Arbor
`- 1991, M.S.E., Computer Science and Engineering, University of Michigan, Ann Arbor
`- 1989, B.S., Computer Science (Honors), University of Michigan, Ann Arbor
`Academic Appointments
`- April, 2004 - present
` Professor, Johns Hopkins University
`
`- August, 2010 - July, 2011
` Visiting Research Professor, Fulbright Scholar, Tel Aviv University, Israel
`
`- January, 2003 - April, 2004
` Associate Professor, Johns Hopkins University
`
`- January, 2003 - present
` Technical Director, Johns Hopkins University Information Security Institute
`
`- 2006 - 2010
` Director and Principal Investigator (PI), National Science Foundation's ACCURATE Center
`
`- 1995 - 1999
` Adjunct Professor, New York University
`- Internet and Web Security Spring, 1999 (with Dave Kormann)
`- Privacy in Networks: Attacks and Defenses Spring, 1998 (with Dave Kormann and Mike
`Reiter)
`- Design and Analysis of Cryptographic Protocols Fall, 1996 & Spring, 1997 (with Matt
`Franklin)
`- Cryptography and Computer Security Fall, 1995 & Spring, 1996
`
`https://avirubin.com/Vita.html
`
`1/17
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 3 of 18
`- Summer, 1999
` Visiting Professor, École Normale Supérieure, Paris, France
`
`- 1988 - 1993
` Teaching Assistant, University of Michigan
`- 1993 Intro. to Cryptography
`- 1992 Assembler Language Programming
`- 1991 Software Engineering
`- 1990 IVHS Seminar
`- 1989-1990 Head TA, Intro. to Computer Science
`- 1988-1989 Intro. to Computer Science
`
`- Doctoral Committees
`- Doctoral Thesis Advisor: Gabe Kaptchuk, JHU
`- Doctoral Thesis Advisor: Tushar Jois, JHU
`- Dissertation Committee: Thomas Tantillo, JHU (September, 2018)
`- Doctoral Thesis Advisor: Paul Martin, JHU (February, 2016)
`- Doctoral Thesis Advisor: Michael Rushanan, JHU (May, 2016)
`- Doctoral Thesis Advisor: Ayo Akinyele, JHU (December, 2013)
`- Doctoral Thesis Advisor: Matthew Pagano, JHU (August, 2013)
`- Doctoral Thesis Advisor: Ryan Gardner, JHU (August, 2009)
`- Doctoral Thesis Advisor: Sam Small, JHU (May, 2009)
`- Doctoral Thesis Advisor: Sujata Doshi, JHU (May, 2009)
`- Doctoral Thesis Advisor: Joshua Mason, JHU (June, 2009).
`- Dissertation Committee: J. Alex Halderman, Princeton University (May, 2009).
`- Dissertation Committee: Sophie Qiu (May, 2007).
`- Doctoral Thesis Advisor: Adam Stubblefield (April, 2005).
`- Dissertation Committee: Kevin FU, MIT (February, 2005).
`- Dissertation Committee: Robert Fischer, Harvard University (June, 2003).
`- Dissertation Committee: Marc Waldman, New York University, (April, 2003).
`- Dissertation Committee: Patrick McDaniel, University of Michigan (September, 2001).
`- Doctoral Thesis Advisor: Fabian Monrose, New York University (April, 1999).
`- Dissertation Committee: Mike Just, Carleton University (November, 1998).
`- Dissertation Committee: Trent Jaeger, University of Michigan (October, 1996).
`
`Industry Experience
`- 2011 - present
` Harbor Labs, Managing Member
`- 2005 - 2011
` Independent Security Evaulators, Founder & President
`- 1997 - 2002
` AT&T Labs - Research, Secure Systems Research Department
`- 1994 - 1996
` Bellcore, Cryptography and Network Security Research Group
`- Summer, 1990
` Great Lakes Software Co., Programmer, Howell, MI
`- Summer, 1989
` IBM, Programmer, Meyers Corners Lab, Poughkeepsie, NY
`Books
`- Aviel D. Rubin, Brave New Ballot, Random House, (September, 2006).
`- William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin, Firewalls and Internet
`Security: Repelling the Wily Hacker (2e), Addison Wesley Publishing Company, Inc.,
`(February, 2003).
`
`https://avirubin.com/Vita.html
`
`2/17
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 4 of 18
`- Chapter 4, Communications Policy and Information Technology: Promises, Problems,
`Prospects, MIT Press, Lorrie Faith Cranor and Shane Mitchell Greenstein, eds., (2002).
`- Aviel D. Rubin, White-hat Security Arsenal, Addison Wesley Publishing Company, Inc.,
`(June, 2001).
`- Chapter 8, Publius and Chapter 14, Trust in Distributed Systems,
`Marc Waldman, Lorrie Faith Cranor, and Aviel D. Rubin, Peer-to-Peer, O'Reilly &
`Associates, Inc., (February, 2001).
`- Aviel D. Rubin, Daniel Geer, Marcus J. Ranum, Web Security Sourcebook, John Wiley &
`Sons, Inc , (June, 1997).
`- Ph.D. dissertation: Nonmonotonic Cryptographic Protocols (ps.gz, pdf), University of
`Michigan, Ann Arbor (April, 1994).
`Refereed Journal Publications
`- David Kotz, Kevin Fu, Carl Gunter, Avi Rubin, Security for Mobile and Cloud Frontiers in
`Healthcare, Communications of the ACM (July, 2015).
`- Ayo Akinyele, Christina Garman, Matthew D. Green, Ian Miers, Matthew Pagano, Aviel D.
`Rubin, Michael Rushanan, Charm: A Framework for Rapidly Prototyping Cryptosystems,
`Journal of Cryptographic Engineering (JCEN), (January, 2013).
`- Ryan Gardner, Sujata Garera, and Aviel D. Rubin, Detecting Code Alteration by Creating a
`Temporary Memory Bottleneck, IEEE Transactions on Information Forensics and Security:
`Special Issue on Electronic Voting, (December, 2009).
`- Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Avi Rubin, Anonymity in
`Wireless Broadcast Networks, International Journal of Network Security (IJNS), (January,
`2008).
`- Stephen Bono, Aviel Rubin, Adam Stubblefield, and Matthew Green, Security Through
`Legality, Communications of the ACM (June, 2006).
`- Adam Stubblefield, Dan S. Wallach, and Aviel D. Rubin, Managing the Performance Impact
`of Web Security, Electronic Commerce Research Journal, February, 2005.
`- David Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner, Analyzing Internet Voting
`Security, Communications of the ACM (October, 2004).
`- Simon Byers, Aviel D. Rubin, and David Kormann, Defending Against an Internet-based
`Attack on the Physical World, ACM Transactions on Internet Technology (TOIT), August,
`2004.
`- Adam Stubblefield, John Ioannidis, and Aviel D. Rubin, A Key Recovery Attack on the
`802.11b Wired Equivalent Privacy Protocol (WEP) (pdf), ACM Transactions on Information
`and System Security, May, 2004.
`- Aviel D. Rubin, Security Considerations for Remote Electronic Voting, Communications of
`the ACM (December, 2002).
`- Marc Waldman, Aviel D. Rubin, and Lorrie F. Cranor, The Architecture of Robust Publishing
`Systems, ACM Transactions on Internet Technology (TOIT), (November, 2001).
`- David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol,
`Computer Networks, (July, 2000).
`- Christian Gilmore, David P. Kormann, and Aviel D. Rubin, Secure Remote Access to an
`Internal Web Server, IEEE Network, (November, 1999).
`- Fabian Monrose and Aviel D. Rubin, Keystroke Dynamics as a Biometric for Authentication,
`(pdf) Future Generation Computer Systems, (March, 2000).
`- Michael K. Reiter and Aviel D. Rubin, Anonymity Loves Company: Anonymous Web
`Transactions with Crowds (ps.gz, pdf) Communications of the ACM (February, 1999).
`- Aviel D. Rubin and Daniel E. Geer, Jr., Mobile Code Security (ps.gz, pdf), IEEE Internet
`Computing (November/December, 1998).
`- Aviel D. Rubin and Daniel E. Geer, Jr., A Survey of Web Security, IEEE Computer,
`(September, 1998).
`- Michael K. Reiter and Aviel D. Rubin, Crowds: Anonymity for Web Transactions (ps.gz,
`pdf), ACM Transactions on Information and System Security, (June, 1998).
`- Aviel D. Rubin, An Experience Teaching a Graduate Course in Cryptography (ps, pdf),
`Cryptologia (April, 1997).
`
`https://avirubin.com/Vita.html
`
`3/17
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 5 of 18
`- Aviel D. Rubin, Extending NCP for public Key Protocols, Mobile Networks and Applications
`(ACM/Balzer), 2(3) (April, 1997).
`- Aviel D. Rubin, Independent One-Time Passwords, (ps.gz, pdf) USENIX Journal of
`Computer Systems (February, 1996).
`- Aviel D. Rubin, Secure Distribution of Documents in a Hostile Environment, Computer
`Communications (June, 1995).
`Refereed Conference Publications
`- Gabriel Kaptchuk, Tushar Jois, Matthew Green, Aviel Rubin, Meteor: Cryptographically
`Secure Steganography for Realistic Distributions, 28th ACM Conference on Computer and
`Communications Security (CCS '21), (November, 2021).
`- James Schaffter, Aviel Rubin and Lanier Watkins, A Containerization-Based Backfit
`Approach for Industrial Control System Resiliency, SafeThings '21 Workshop, (May, 2021).
`- Tushar Jois, Claudia Moncaliano, Khir Henderson, Aviel D. Rubin, WDPKR: Wireless
`Device Profiling Kit and Reconnaissance, 2021 Hot Topics in the Science of Security
`(HotSoS) Symposium (April, 2021) .
`- Lanier Watkins, Chang-Hao Cho, John Hurley, Aviel D. Rubin, Collaborative Global Impact
`Cloud Computing Risk Assessment Framework, International IoT, Electronics and
`Mechatronics Conference (IEMTRONICS '21), (April, 2021).
`- Jeffrey S. Chavis, Malcom Doster, Michelle Feng, Syeda Zeeshan, Samantha Fu, Elizabeth
`Aguirre, Antonio Davila, Kofi Nyarko, Aaron Kunz, Tracy Herriotts, Daniel Syed, Lanier
`Watkins, Anna Buczak, Aviel Rubin, A Voice Assistant for IoT Cybersecurity, Integrated
`STEM Education Conference (ISEC '21), (March, 2021).
`- Lanier Watkins, Danzel Hamilton, Kevin Kornegay, Aviel Rubin, Triaging Autonomous
`Drone Faults by Simultaneously Assuring Autonomy and Security in Autonomous Drones,
`55th Annual Conference on Information Sciences and Systems (CISS '21), (March, 2021).
`- Lanier Watkins, James Ballard, Kevin Hamilton, William H. Robinson, Aviel Rubin, Cleon
`Davis, Bio-Inspired, Host-based Firewall (Refereed WIP paper), 23rd IEEE International
`Conference on Computational Science and Engineering (CSE), (December, 2020).
`- Lanier Watkins, Yue Yu, Sifan Li, William H. Robinson, Aviel D. Rubin, Using Deep
`Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks, The
`11th IEEE Annual Ubiquitous Computing, Electronics, and Mobile Communications
`Conference (UEMCON), (October, 2020).
`- Lanier Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, Aviel
`D. Rubin, A Black Box Approach to Inferring Characterizing, and Breaking Native Device
`Tracking Autonomy, The 11th IEEE Annual Ubiquitous Computing, Electronics, and Mobile
`Communications Conference (UEMCON), (October, 2020).
`- Karl Siil, Aviel Rubin, Matthew Elder, Anton Dahbura, Matthew Green, Lanier Watkins,
`Mission Assurance for Autonomous Undersea Vehicles, IEEE Workshop on Assured
`Autonomous Systems (WAAS), (May, 2020).
`- Jeffrey Chavis, Aaron Kunz, Lanier Watkins, Anna Buczak, Aviel Rubin, A Capability for
`Autonomous IoT System Security: Pushing IoT Assurance to the Edge, IEEE Workshop on
`Assured Autonomous Systems (WAAS), (May, 2020).
`- Lanier Watkins, Shane Sartalamacchia, Richard Bradt, Karan Dhareshwar, Harsimar
`Bagga, William H. Robinson, Aviel Rubin, Defending Against Consumer Drone Privacy
`Attacks: A Blueprint For A Counter Autonomous Drone Tool, ISOC Workshop on
`Decentralized IoT Systems and Security (DISS 2020), (February, 2020).
`- Adrian Cartagena, Gerald Rimmer, Thomas Van Dalsen, Lanier Watkins, William H.
`Robinson, Aviel D. Rubin, Privacy Violating Opensource Intelligence Threat Evaluation
`Framework: A Security Assessment Framework for Critical Infrastructure Owners, 10th
`Annual Computing and Communications Workshop and Confefence (IEEE CCWC 2020),
`(January, 2020).
`- Jeffrey Chavis, Lanier Watkins, Anna Buczak, Aviel D. Rubin, Connected Home Automated
`Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning, 10th
`Annual Computing and Communications Workshop and Confefence (IEEE CCWC 2020),
`(January, 2020).
`- Lanier Watkins, Shreya Aggarwal, Omotola Akeredolu, William H. Robinson and Aviel D.
`Rubin, Tattle Tail Security: An Intrusion Detection System for Medical Body Area Networks,
`Workshop on Decentralized IoT Systems and Security (DISS ’19), (February, 2019).
`- Lanier Watkins, Juan Ramon, Gaetano Snow, Jessica Vallejo, William H. Robinson, Aviel
`D. Rubin, Joshua Ciocco, Felix Jedrzejewski, Jinglun Liu, Chengyu Li, Exploiting Multi-
`Vendor Vulnerabilities as Back-Doors to Counter the Threat of Rogue Small Unmanned
`Aerial Systems , ACM Workshop on Mobile IoT Sensing, Security, and Privacy (Mobile IoT
`SSP '18), (June, 2018).
`https://avirubin.com/Vita.html
`
`4/17
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 6 of 18
`- Paul D. Martin, David Russel, Malek Ben Salem, Stephen Checkoway, Aviel D. Rubin,
`Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems, Proc.
`ACM/IEEE International Conference on Internet-of-Things Design and Implementation,
`(April, 2018).
`- Gabriel Kaptchuk, Matthew D. Green and Aviel D. Rubin, Outsourcing Medical Dataset
`Analysis: A Possible Solution, Financial Cryptography Conference, (April, 2017).
`- Michael Rushanan, David Russell and Aviel D. Rubin, MalloryWorker: Stealthy
`Computation and Covert Channels using Web Workers, Proceedings of the 12th
`International Workshop on Security and Trust Management, (September, 2016).
`- Paul Martin, Michael Rushanan, Thomas Tantillo, Christoph Lehmann and Aviel Rubin,
`Applications of Secure Location Sensing in Healthcare, Proceedings of the 7th ACM
`Conference on Bioinformatics, Computational Biology, and Health Informatics, (October,
`2016).
`- Gabriel Kaptchuk and Aviel D. Rubin, A Practical Implementation of a Multi-Device Split
`Application for Protecting Online Poker , Proceedings of the 15th Annual Security
`Conference, (March, 2016).
`- Aviel D. Rubin, Taking Two-Factor to the Next Level: Protecting Online Poker, Banking,
`Healthcare and Other Applications, Proceedings of the 2014 Annual Computer Security
`Applications Conference, Invited Keynote Essay, (December, 2014).
`- Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson, Security and
`Privacy in Implantable Medical Devices and Body Area Networks, IEEE Symposium on
`Security and Privacy - SoK Track (May, 2014).
`- Christina Garman, Matthew Green, Ian Miers, Aviel D. Rubin, Rational Zero: Economic
`Security for Zerocoin with Everlasting Anonymity, 1st Workshop on Bitcoin Research
`(March, 2014).
`- Paul Martin, Avi Rubin and Rafae Bhatti, Enforcing Minimum Necessary Access in
`Healthcare Through Integrated Audit and Access Control, Health Informatics Symposium at
`the ACM Conference on Bioinformatics, Computational Biology, and Biomedical
`Informatics, (September, 2013).
`- Ian M. Miers, Christina Garman, Matthew D. Green, Aviel D. Rubin, Zerocoin: Anonymous
`Distributed e-Cash from Bitcoin, Proc. IEEE Symposium on Security and Privacy (May,
`2013).
`- Ian M. Miers, Matthew D. Green, Christoph U. Lehmann, Aviel D. Rubin, Vis-à-Vis
`Cryptography: Private and Trustworthy In-Person Certifications, In Proceedings of the 3rd
`USENIX/HealthSec Workshop, (August, 2012).
`- Joseph A. Akinyele, Matthew W. Pagano, Matthew D. Green, Christoph U. Lehmann,
`Zachary N. J. Peterson and Aviel D. Rubin, Securing Electronic Medical Records Using
`Attribute-Based Encryption On Mobile Devices, ACM CCS Workshop on Security and
`Privacy in Smartphones and Mobile Devices, (October, 2011).
`- Matthew D. Green, Aviel D. Rubin, A Research Roadmap for Healthcare IT Security
`inspired by the PCAST Health Information Technology Report - 4 page Extended Abstract,
`In Proceedings of the 2nd USENIX/HealthSec Workshop, (August, 2011).
`- Ryan Gardner, Sujata Garera, Aviel D. Rubin, Designing for Audit: A Voting Machine with a
`Tiny TCB, Financial Cryptography Conference, (January , 2010).
`- Ryan Gardner, Sujata Garera, Matthew W. Pagano, Matthew D. Green, Aviel D. Rubin,
`Securing Medical Records on Smart Phones, Workshop on Security and Privacy in Medical
`and Home-Care Systems, (November, 2009).
`- Ryan Gardner, Sujata Garera, Aviel D. Rubin, Coercion Resistant End-to-end Voting,
`Financial Cryptography Conference, (February, 2009).
`- Ryan Gardner, Sujata Garera, Anand Rajan, Carols Rozas, Aviel D. Rubin, Manoj Sastry,
`Protecting Patient Records from Unwarranted Access, Future of Trust in Computing, (July,
`2008).
`- Sujata Garera, Niels Provos, Monica Chew and Aviel D. Rubin, A Framework for Detection
`and Measurement of Phishing Attacks, 5th ACM Workshop on Recurring Malcode (WORM
`2007), (November, 2007).
`- Sujata Garera and Aviel D. Rubin, An Independent Audit Framework for Software
`Dependent Voting Systems, 14th ACM Conference on Computer and Communications
`Security, (November, 2007).
`- Ryan Gardner, Sujata Garera, and Aviel D. Rubin, On the Difficulty of Validating Voting
`Machine Software with Software, In Proceedings of the 2nd USENIX/ACCURATE
`Electronic Voting Technology Workshop (EVT '07), (August, 2007).
`- Sujata Doshi, Fabian Monrose, and Aviel D. Rubin, Efficient Memory Bound Puzzles using
`Pattern Databases, 4th International Conference on Applied Cryptography and Network
`Security (ACNS'06), (June, 2006).
`https://avirubin.com/Vita.html
`
`5/17
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 7 of 18
`- Sophie Qiu, Patrick McDaniel, Fabian Monrose, and Avi Rubin, Characterizing Address
`Use Structure and Stability of Origin Advertisement in Interdomain Routing, 11th IEEE
`Symposium on Computers and Communications, (June 2006).
`- Zachary Peterson, Randal Burns, Joseph Herring, Adam Stubblefield, and Aviel D. Rubin,
`Secure Deletion for a Versioning Filesystem , Proc. USENIX Conference on File and
`Storage Technologies (FAST '05), (December, 2005).
`- Stephen C. Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael
`Szydlo, Security Analysis of a Cryptographically-Enabled RFID Device 14th USENIX
`Security Symposium, (August, 2005).
`- Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, Analysis of an
`Electronic Voting System, Proc. IEEE Symposium on Security and Privacy (May, 2004).
`- Nathanael Paul, David Evans, Aviel D. Rubin and Dan Wallach, Authentication for Remote
`Voting, ACM Workshop on Human-Computer Interaction and Security Systems (April,
`2003).
`- Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, and Aviel Rubin, Protocols
`for Anonymity in Wireless Networks, Proc. 11th International Workshop on Security
`Protocols (April, 2003).
`- Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel, Aviel
`Rubin, Working Around BGP: An Incremental Approach to Improving Security and
`Accuracy of Interdomain Routing , Proc. ISOC Symposium on Network and Distributed
`System Security (February, 2003).
`- Simon Byers, Aviel D. Rubin, David Kormann, Defending Against an Internet-based Attack
`on the Physical World (pdf), ACM Workshop on Privacy in the Electronic Society
`(November, 2002).
`- Adam Stubblefield, John Ioannidis, and Aviel D. Rubin, Using the Fluhrer, Mantin, and
`Shamir Attack to Break WEP, Proc. ISOC Symposium on Network and Distributed System
`Security (February, 2002).
`- Aviel D. Rubin, Security Considerations for Remote Electronic Voting, 29th Research
`Conference on Communication, Information and Internet Policy (TPRC2001), (October,
`2001).
`- Aviel D. Rubin and Rebecca N. Wright, Off-line generation of limited-use credit card
`numbers, (ps.gz, pdf) Financial Cryptography Conference, (February, 2001).
`- Marc Waldman, Aviel D. Rubin, and Lorrie F. Cranor, Publius, A robust, tamper-evident and
`censorship-resistant web publishing system, 9th USENIX Security Symposium, (August,
`2000).
`- David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol, 9th
`International World Wide Web Conference, (May, 2000).
`- Patrick McDaniel and Aviel D. Rubin, A Response to "Can we Eliminate Certificate
`Revocation Lists?", (ps.gz, pdf), Financial Cryptography Conference, (February, 2000).
`- William A. Aiello, Aviel D. Rubin, and Martin J. Strauss, Using smartcards to secure a
`personalized gambling device (ps.gz, pdf), 6th ACM Conference on Computer and
`Communications Security, (November, 1999).
`- Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin, The
`Design and Analysis of Graphical Passwords (ps.gz, pdf) 8th USENIX Security
`Symposium, (August, 1999).
`- Christian Gilmore, David Kormann, and Aviel D. Rubin, Secure Remote Access to an
`Internal Web Server, (ps.gz, pdf), Proc. ISOC Symposium on Network and Distributed
`System Security (February, 1999).
`- Fabian Monrose, Peter Wykoff, and Aviel D. Rubin, Distributed Execution with Remote
`Audit (ps.gz, pdf), Proc. ISOC Symposium on Network and Distributed System Security
`(February, 1999).
`- Dahlia Malkhi, Michael K. Reiter and Aviel D. Rubin, Secure Execution of Java Applets
`using a Remote Playground (ps, pdf) Proc. IEEE Symposium on Security and Privacy
`(May, 1998).
`- Aviel D. Rubin, Dan Boneh, and Kevin Fu, Revocation of Unread E-mail in an Untrusted
`Network (ps.gz, pdf), Second Australasian Conference on Information Security and Privacy
`(July, 1997).
`- Fabian Monrose and Aviel D. Rubin, Authentication via Keystroke Dynamics (ps, pdf), 4th
`ACM Conference on Computer and Communications Security (April, 1997).
`- David M. Martin, Siviramakrishnan Rajagopalan, and Aviel D. Rubin, Blocking Java Applets
`at the Firewall (ps, pdf), Proc. ISOC Symposium on Network and Distributed System
`Security (February, 1997).
`- Trent Jaeger, Aviel D. Rubin and Atul Prakash, A System Architecture for Flexible Control
`of Downloaded Executable Content, 5th International Workshop on Object-Orientation in
`https://avirubin.com/Vita.html
`
`6/17
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 8 of 18
`Operating Systems (October, 1996).
`- Trent Jaeger, Aviel D. Rubin and Atul Prakash, Building Systems that Flexibly Control
`Downloaded Executable Content, Proc. 6th USENIX Security Symposium (July, 1996).
`- Victor Shoup and Aviel D. Rubin, Session Key Distribution Using Smart Cards, (ps, pdf),
`Proc. of Eurocrypt '96 (May, 1996).
`- Trent Jaeger & Aviel D. Rubin, Preserving Integrity in Remote File Location and Retrieval,
`Proc. ISOC Symposium on Network and Distributed System Security (February, 1996).
`- Aviel D. Rubin, Extending NCP for Public Key Protocols, Proc. IEEE 4th International
`Conference on Computer Communications and Networks (September, 1995).
`- Aviel D. Rubin, Pseudo-Random Functions for One-Time Passwords, Proc. 5th USENIX
`UNIX Security Symposium (June, 1995).
`- Aviel D. Rubin, Trusted Distribution of Software Over the Internet, Proc. ISOC Symposium
`on Network and Distributed System Security (February, 1995).
`- Aviel D. Rubin & Peter Honeyman, Nonmonotonic Cryptographic Protocols, Proc. IEEE
`Computer Security Foundations Workshop VII (June, 1994).
`- Aviel D. Rubin & Peter Honeyman, Long Running Jobs in an Authenticated Environment,
`Proc. 4th USENIX UNIX Security Symposium (October, 1993).
`
`Patents
`- Aviel D. Rubin, "Broadband Certified Mail", US Patent Numbers 6,990,581, (January 24,
`2006) and 9,876,769, (January 23, 2018).
`- Aviel D. Rubin, Utilization of multiple devices to secure online transactions, US Patent
`Number 9,064,376, (June 23, 2015).
`- Steven M. Bellovin, Thomas J. Killian, Bruce LaRose, Aviel D. Rubin, Norman L. Schryer,
`Method and apparatus for connection to virtual private networks for secure transactions,
`US Patent Numbers 8,239,531, (August 7, 2012) and 8,676,916 (March 18, 2014).
`- Christian A. Gilmore, David P. Kormann, and Aviel D. Rubin, Method and apparatus for
`secure remote access to an internal web server, US Patent Number 7,334,126, (February
`19, 2008).
`- Aviel D. Rubin, "Method for secure remote backup", US Patent Number 7,222,233, (May
`22, 2007).
`- Frederick Douglis, Michael Rabinovich, Aviel D. Rubin, and Oliver Spatscheck, "Method for
`content distribution in a network supporting a security protocol", US Patent Number
`7,149,803, (December 12, 2006).
`- William A. Aiello, Steven M. Bellovin, Charles Robert Kalmanek, Jr., William T Marshal, and
`Aviel D. Rubin, "Method and apparatus for enhanced security in a broadband telephony
`network", US Patent Number 7,035,410, (April 25, 2006).
`- William A. Aiello, Aviel D. Rubin, and Martin J. Strauss, "Using smartcards to enable
`probabilistic transaction on an untrusted device", US Patent Number 6,496,808,
`(December 17, 2002).
`- Aviel D. Rubin and Victor J. Shoup, "Session Key Distribution Using Smart Cards", US
`Patent Number 5,809,140, (September 15, 1998).
`- Aviel D. Rubin, "Method for the Secure Distribution of Electronic Files in a Distributed
`Environment", US Patent Number 5,638,446, (June 10, 1997).
`Professional Activities
`- Board of Directors
`- Director, Maryland Israel Development Center (MIDC), (2013 - 2018).
`- Director, USENIX Organization, elected by popular vote (2000 - 2004).
`
`- Editorial and Committees
`- Chair: IEEE Security & Privacy Symposium Test of Time Awards Committee for
`2008-2010 Conferences, May, 2020.
`
`https://avirubin.com/Vita.html
`
`7/17
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 9 of 18
`- Associate Editor: IEEE Transactions on Information Forensics and Security (2009-
`2011).
`- Associate Editor: Communications of the ACM (CACM), 2009 - 2017.
`- Guest Co-Editor: IEEE Transactions on Information Forensics and Security: Special
`Issue on Electronic Voting, December 1, 2009.
`- Guest Co-Editor: IEEE Security & Privacy Magazine, Special Issue on Electronic
`Voting, October/November, 2007.
`- Associate Editor: IEEE Transactions on Software Engineering (2005-2006).
`- Editorial and Advisory Board: International Journal of Information and Computer
`Security (IJICS) (2004-2006).
`- Guest Co-Editor: IEEE Computer Networks, Special Issue on Web Security,
`January, 2005.
`- Editorial Board: Journal of Privacy Technology (2004-2006).
`- Guest Co-Editor: IEEE Security & Privacy Magazine, Special Issue on Electronic
`Voting Security, January/February, 2004.
`- Member: Security Peer Review Group (SPRG) of the Federal Voting Assistance
`Program's (FVAP) Secure Electronic Registration and Voting Experiment (SERVE)
`Project, 2003-2004.
`- Member: DARPA Information Science And Technology Study Group (2003-2006).
`- Associate Editor: IEEE Security & Privacy Magazine (2003-present).
`- Guest Editor: Communications of the ACM, Special Issue on Wireless Networking
`Security, May, 2003.
`- Associate Editor: ACM Transactions on Internet Technology (2002-2005).
`- Executive Committee Member: DIMACS Workshop Series with Special Focus on
`Network Security (2002-2004).
`- Advisory Board Member: Information Security and Cryptography Book Series,
`Springer, 2001-2006.
`- Member: Steering Group, ISOC Symposium on Network and Distributed System
`Security, 2001-2004.
`- Member: Government Infosec Science and Technology Study Group on malicious
`code, 1999 - 2000.
`- Member: AT&T Internet Intellectual Property Review Team, 1999 - 2001.
`- Associate Editor: Electronic Commerce Research Journal, Baltzer Science
`Publishers, 1999 - 2002.
`- Co-Editor: Electronic Newsletter of the IEEE Technical Committee on Security &
`Privacy, with Paul Syverson, 1998.
`- Editorial Board: Bellcore Security Update Newsletter, 1995-1996.
`
`- Conference Committees
`- Program Committee member: NDSS Workshop: Innovative Secure IT Technologies
`Against COVID-19, San Diego, CA, February, 2020.
`- Program Committee member: Financial Cryptography '15 Barbados, February, 2015.
`- Program Committee member: USENIX HealthTech Workshop on Health Information
`Technologies (HealthTech ’15), August 11, 2015.
`- Program Co-chair: (w/Eugene Vasserman) USENIX HealthTech Workshop on
`Health Information Technologies (HealthTech ’14), August 19, 2014.
`- Program Committee member: 2nd USENIX Workshop on Health Security and Privacy
`(HealthSec '11), August 9, 2011.
`- Program Co-chair: (w/Kevin Fu & Yoshi Kohno), 1st USENIX Workshop on Health
`Security and Privacy (HealthSec '10), August 10, 2010.
`- Program Committee member: First Security and Privacy in Medical and Home-Care
`Systems Workshop (SPIMACS), Chicago, IL, November 13, 2009.
`- Invited Talks Co-Coordinator: 17th USENIX Security Symposium, San Jose, CA, July
`28 - August 1, 2008.
`- Program Co-chair: (w/Patrick McDaniel): IEEE Symposium on Security and Privacy,
`Oakland, California, May 18-22, 2008.
`- Program Co-chair: (w/Giovani Di Crescenzo): Financial Cryptography '06 Anguilla
`BWI, February, 2006.
`- Program Committee member: IEEE Symposium on Security and Privacy, Oakland,
`California, May 9-12, 2004.
`
`https://avirubin.com/Vita.html
`
`8/17
`
`

`

`5/10/2021
`
`
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 10 of 18
`- Program Committee member: Financial Cryptography '04 Key West, Florida,
`February 9-12, 2004.
`- Program Committee member: 2nd ACM SIGSAC Workshop on Privacy in the
`Electronic Society Washington D.C., October 30, 2003.
`- Program Committee member: 10th ACM Conference on Computer and
`Communications Security, Washington D.C., October 27-30, 2003.
`- Program Committee member: 8th European Symposium on Research in Computer
`Science (ESORICS), Norway, October 13-15, 2002.
`- Program Vice Chair: Security and Privacy Track, The Twelfth International World
`Wide Web Conference, Budapest, Hungary, May 20-24, 2003.
`- Program Committee member: IEEE Symposium on Security and Privacy, Oakland,
`California, May 11-14, 2003.
`- Program Committee member: Workshop on Security and Assurance in Ad hoc
`Networks, Orlando, FL, January 28, 2003.
`- Program Committee member: 4th International Conference on Information and
`Communications Security (ICICS), Kent Ridge Digital Labs (KRDL), Singapore
`December 9-12, 2002.
`- Program Committee member: ACM SIGSAC Workshop on Privacy in the Electronic
`Society Washington D.C., November 21, 2002.
`- Program Committee member: 9th ACM Conference on Computer and
`Communications Security, Washington D.C., November 17-21, 2002.
`- Program Committee member: 5th International Conference on Electronic Commerce
`Research (ICECR-5), Montreal, Canada, October 23-27, 2002.
`- Program Committee member: 2nd Symposium on Requirements Engineering for
`Information Security (SREIS), Raleigh, North Carolina, Oct 14-15, 2002.
`- Program Committee member: 7th European Symposium on Research in Computer
`Science (ESORICS), Zurich, Switzerland, October 14-16, 2002.
`- Program Committee member: 11th USENIX Security Symposium, San Francisco, Ca,
`August 5-9, 2002.
`- Program Committee member: International Workshop on Global and Peer-to-Peer
`Computing at IEEE International Symposium on Cluster Computing and the Grid
`(CCGrid'2002), Berlin, Germany, May 21-24, 2002.
`- Program Committee member: 11th International World Wide Web Conference
`Honolulu, Hawaii, May 7-11, 2002.
`- Program Committee member: 2nd Workshop on Privacy Enhancing Technologies San
`Francisco, CA, April 14-15, 2002.
`- Program Committee member: The 1st International Workshop on Peer-to-Peer
`Systems (IPTPS'02) MIT Faculty Club, Cambridge, MA, March 7-8, 2002.
`- Program Committee member: The 4th International Conference on
`Telecommunications and Electronic Commerce Dallas, TX, November, 2001.
`- Program Committee member: 10th USENIX Security Symposium, Washington D.C.,
`August 13-17, 2001.
`- Program Committee member: Financial Cryptography '01 Grand Cayman, Cayman
`Islands, BWI, February, 2001.
`- Program Co-chair: (w/Paul Van Oorschot): ISOC Symposium on Network and
`Distributed System Security, San Diego, CA, February 7-9, 2001.
`- Program Committee member: The 3rd International Conference on
`Telecommunications and Electronic Commerce Dallas, TX, November 16-19, 2000.
`- Program Committee member: 9th USENIX Security Symposium, Denver, Colorado,
`August 14-17, 2000.
`- Program Committee member: Workshop on Design Issues in Anonymity and
`Unobservability Berkeley, California, July 25-26, 2000.
`- Program Committee member: Performance and Architecture of Web Servers (PAWS),
`Santa Clara, CA, June 18, 2000.
`- Program Co-chair: (w/Gene Tsudik): ISOC Symposium on Network and Distributed
`System Security, San Diego, CA, February 2-4, 2000.
`- Program Committee member: 1999 International Information Security Workshop
`(ISW'99), Kuala Lumpur, Malaysia, November 6-7, 1999.
`- Program Committee member: 2nd Int'l. Conference on Telecommunications and
`Electronic Commerce, Nashville, TN, October 6-8, 1999.
`
`https://avirubin.com/Vita.html
`
`9/17
`
`

`

`5/10/2021
`
`Avi Rubin’s Vita
`Case 6:20-cv-00810-ADA Document 81 Filed 05/12/21 Page 11 of 18
`- Invited Talks coordinator: 8th USENIX Security Symposium, Washington D.C.,
`August, 1999.
`- Program Cha

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket