throbber
DOUG TYGAR
`
`Personal Information:
`
`Full name: Justin Douglas Tygar
`US Citizen
`
`
`
`
`Address:
`
`University of California.
`739 Soda Hall #1776
`
`Berkeley, CA 94720-1776
`(510) 643-7855
`
`tygar@cs.berkeley.edu
`
`Education:
`
`A.B., 1982
`
`
`
`Ph.D., 1986 Harvard University, Computer Science
`Thesis: An Integrated Toolkit for Operating System Security
`
`
`
`
`Advisor: Michael Rabin
`
`
`NSF Graduate Fellow (1982 – 1985), IBM Graduate Fellow (1985 – 1986)
`
`Academic Appointments:
`
`University of California, Berkeley
`Department of Electrical Engineering and Computer Science
`& School of Information
`Professor (tenured, joint appointment)
`1998 – Present
`
`Carnegie Mellon University
`Computer Science Department
`Adjunct Professor
`2000 – Present
`Associate Professor (tenured 1995, on leave 1998 – 2000)
`1992 – 2000
`
`Assistant Professor
`1986 – 1992
`
`
`Major Awards:
`
`
`NSF Presidential Young Investigator, 1988
`Outstanding Professor Award, Carnegie Magazine, 1989
`Chair, Defense Information Science and Technology Study Group on Security with Privacy
`Member, National Research Council Committee on Information Trustworthiness
`Member, INFOSEC Science and Technology Study Group
`Okawa Foundation Fellow, 2003-4
`Wide consulting for both industry and government
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`University of California, Berkeley, Math/Computer Science
`Bell Labs University Relations Student (1981)
`
`PETITIONERS Ex. 1009 Page 1
`
`

`
`
`
`
`Major speeches:
`
`Keynote addresses:
`
`PODC (1995), ASIAN-96 (1996), NGITS (1997), VLDB (1998), CRYPTEC (1999),
`CAV (2000), Human Authentication (2001), PDSN (2002), ISM (2005), ISC (2005), ASIACCS (2006),
`Croucher ASI (2004, 2006), ISC (2008), AISEC (2010), ISRCS (2013)
`
`Invited addresses:
`
`Harvard Graduate School of Arts and Science 100th Anniversary,
`CMU Computer Science Department 25th Anniversary
`More than 260 talks & 20 professional seminars since 1985
`
`External review activities:
`
`Electronic Commerce Program, City University of Hong Kong
`Information Systems Management Program, Singapore Management University
`Information Technology Program, United Arab Emirates University
`Computer Science Program, University of California, Davis
`
`
`
`PETITIONERS Ex. 1009 Page 2
`
`

`
`
`Publications
`
`
`Books
`1. Adversarial Machine Learning: Computer Security and Statistical Machine Learning.
`A. Joseph, B. Nelson, B. Rubinstein, J. D. Tygar. Cambridge University Press, 2013. (To
`appear).
`
`2. Computer Security in the 21st Century. Eds. D. Lee, S. Shieh, and J. D. Tygar. Springer,
`2005. (This book includes item 10 below as well as a technical introduction by me and the
`other editors.)
`
`3.
`
`Secure Broadcast Communication in Wired and Wireless Networks. A. Perrig and J. D.
`Tygar. Springer (Kluwer), 2003. Also, a Japanese translation with additional material
`appeared as Waiyādo/Waiyaresu Nettowōku ni Okeru Burōdokyasuto Tsūshin no
`Sekyuriti (ワイヤード/ワイヤレスネットワークにおけるブロードキャスト通信の
`セキュリティ). Translated by Fumio Mizoguchi and the Science University of Tokyo
`Information Media Science Research Group. Kyoritsu Shuppan, 2004.
`
`4. Trust in Cyberspace. National Research Council Committee on Information Systems
`Trustworthiness (S. Bellovin, W. E. Boebert, M. Branstad, J. R. Catoe, S. Crocker, C.
`Kaufman, S. Kent, J. Knight, S. McGeady, R. Nelson, A. Schiffman, F. Schneider [ed.], G.
`Spix, and J. D. Tygar). National Academy Press, 1999.
`
`
`
`Book Chapters (does not include items listed above)
`5. “Classifier evasion: Models and open problems.” B. Nelson, B. Rubinstein, L. Huang, A.
`Joseph, and J. D. Tygar. In Privacy and Security Issues in Data Mining and Machine
`Learning, eds. C. Dimitrakakis, et al. Springer, 2011, pp. 92-98.
`
`6. “Misleading learners: Co-opting your spam filter.” B. Nelson, M. Barreno, F. Chi, A. Joseph,
`B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. In Machine Learning in Cyber
`Trust: Security, Privacy, Reliability, eds. J. Tsai and P.Yu. Springer, 2009, pp. 17-51.
`
`7. “Case study: Acoustic keyboard emanations.” L. Zhuang, F. Zhou, and J. D. Tygar. In
`Phishing and Countermeasures: Understanding the Increasing Problem of Electronic
`Identity Theft, eds. M. Jakobsson and S. Myers. Wiley-Interscience, 2007, pp. 221-240.
`(This is a popularized version of item 27.)
`
`8.
`
`“Dynamic security skins.” R. Dhamija and J. D. Tygar.. In Phishing and
`Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft,
`eds. M. Jakobsson and S. Myers. Wiley-Interscience, 2007, pp. 339-351. (This is a
`popularized version of item 67.)
`
`PETITIONERS Ex. 1009 Page 3
`
`

`
`9.
`
`10.
`
`11.
`
`12.
`
`13.
`
`14.
`
`15.
`
`16.
`
`17.
`
`18.
`
`“Why Johnny can’t encrypt: A usability evaluation of PGP 5.0.” A. Whitten and J. D.
`Tygar. In Security and Usability: Designing Secure Systems that People Can Use, eds.
`L. Cranor and G. Simson. O'Reilly, 2005, pp. 679-702. (An earlier version of the paper was
`published in Proceedings of the 8th USENIX Security Symposium, August 1999, pp. 169-
`183. See also item 113.)
`
`“Private matching.” Y. Li, J. D. Tygar, J. Hellerstein. In Computer Security in the 21st
`Century, eds. D. Lee, S. Shieh, and J. D. Tygar. Springer, 2005, pp. 25-50. (See item 2.)
`(An early version of this paper appeared as Intel Research Laboratory Berkeley technical
`report IRB-TR-04-005, February 2004.)
`
`“Digital cash.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction,
`ed. W. Bainbridge. Berkshire Publishing, 2004, pp. 167-170.
`
`“Spamming.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction,
`ed. W. Bainbridge. Berkshire Publishing, 2004, pp. 673-675.
`
`“Viruses.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction, ed.
`W. Bainbridge. Berkshire Publishing, 2004, pp. 788-791.
`
`“Privacy in sensor webs and distributed information systems.” J. D. Tygar. In Software
`Security, eds. M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa. Springer,
`2003, pp. 84-95.
`
`“Atomicity in electronic commerce.” J. D. Tygar. In Internet Besieged, eds. D. Denning
`and P. Denning. ACM Press and Addison-Wesley, 1997, pp. 389-405. (An expanded earlier
`version of this paper was published in Proceedings of the Fifteenth Annual ACM
`Symposium on Principles of Distributed Computing, Keynote paper, May 1996, pp. 8-26;
`and as Carnegie Mellon University Computer Science technical report CMU-CS-96-112,
`January 1996. See also item 37.)
`
`“Cryptographic postage indicia.” J. D. Tygar, B. Yee, and N. Heintze. In Concurrency and
`Parallelism, Programming, Networking, and Security, eds. J. Jaffar and R. Yap. Springer,
`1996, pp. 378-391. (Preprint also available. Early versions appeared as Carnegie Mellon
`University Computer Science technical reports CMU-CS-96-113, January 1996, UC San
`Diego Computer Science technical report UCSD-TR-CS96-485, and in the 1996 Securicom
`Proceedings, Paris, 1996. See also item 115.)
`
`“Dyad: A system for using physically secure coprocessors.” J. D. Tygar and B. Yee. In
`Technological Strategies for the Protection of Intellectual Property in the Networked
`Multimedia Environment. Interactive Multimedia Association, 1994, pp. 121-152. (An
`early version appeared as Carnegie Mellon University Computer Science technical report
`CMU-CS-91-140R, May 1991.)
`
`“A system for self-securing programs.” J. D. Tygar and B. Yee. In Carnegie Mellon
`Computer Science: A 25-Year Commemorative, ed. R. Rashid. ACM Press and Addison-
`Wesley, 1991, pp. 163-197. (Note: The first printing of this volume had incorrect text due to
`a production error.)
`
`19.
`
`“Implementing capabilities without a trusted kernel.” M. Herlihy and J. D. Tygar. In
`Dependable Computing for Critical Applications, eds. A. Avizienis and J. Laprie.
`
`PETITIONERS Ex. 1009 Page 4
`
`

`
`20.
`
`21.
`
`22.
`
`Springer, 1991, pp. 283-300. (Note: An early version appeared in the (IFIP) Proceedings of
`the International Working Conference on Dependable Computing for Critical
`Applications, August 1989.)
`
`“Strongbox.” J. D. Tygar and B. Yee. In Camelot and Avalon: A Distributed Transaction
`Facility, eds. J. Eppinger, L. Mummert, and A. Spector. Morgan-Kaufmann, 1991, pp. 381-
`400.
`
`“ITOSS: An Integrated Toolkit for Operating System Security.” M. Rabin and J. D. Tygar.
` In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek. Springer, 1990, pp.
`2-15. (Preprint also available.) (Note: Earlier, longer versions appeared as Harvard
`University Aiken Computation Laboratory technical report TR-05-87R and my Ph.D.
`dissertation.)
`
`“Formal semantics for visual specification of security.” M. Maimone, J. D. Tygar, and J.
`Wing. In Visual Languages and Visual Programming, ed. S. K. Chang. Plenum, 1990,
`pp. 97-116. (An early version was published in Proceedings of the 1988 IEEE Workshop
`on Visual Programming, pp. 45-51, and as Carnegie Mellon University Computer Science
`technical report CMU-CS-88-173r, December 1988.)
`
`
`
`Journal Articles (does not include items listed above)
`“Query strategies for evading convex-inducing classifiers.” B. Nelson, B. Rubinstein, L.
`23.
`Huang, A. Joseph, S. Lee, S. Rao, and J. D. Tygar. Journal of Machine Learning Research,
`2012 (volume 13) pp. 1293-1332. (Also available as arXiv report 1007.0484v1.)
`
`24. “The security of machine learning.” M. Barreno, B. Nelson, A. Joseph, and J. D. Tygar.
`Machine Learning, 81:2, November 2010, pp. 121-148. (An earlier version appeared as UC
`Berkeley EECS technical report UCB/EECS-2008-43, April 2008.)
`
`25. “Secure encrypted-data aggregation for wireless sensor networks.” S. Huang, S. Shieh and J.
`D. Tygar. Wireless Networks, 16:4, May 2010, pp. 915-927.
`
`26. “Keyboard acoustic emanations revisited.” L. Zhuang, F. Zhou, and J. D. Tygar. ACM
`Transactions on Information and Systems Security, 13:1, October 2009. (An earlier version
`appeared in Proceedings of the 12th ACM Conference on Computer and
`Communications Security, November 2005, pp. 373-382.) (See also item 7.)
`
`27. “Stealthy poisoning attacks on PCA-based anomaly detectors.” B. Rubinstein, B. Nelson, L.
`Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar. In ACM SIGMETRICS
`Performance Evaluation Review, 37:2, October 2009, pp. 73-74.
`
`28. “Injecting heterogeneity through protocol randomization.” L. Zhuang, J. D. Tygar, R.
`Dhamija. In International Journal of Network Security, 4:1, January 2007, pp. 45-58.
`
`29.
`
`“Cyber defense technology networking and evaluation.” Members of the DETER and
`EMIST Projects (R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S.
`Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R.
`
`PETITIONERS Ex. 1009 Page 5
`
`

`
`30.
`
`31.
`
`32.
`
`33.
`
`34.
`
`35.
`
`36.
`
`37.
`
`38.
`
`39.
`
`Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, S. Sastry, D. Sterne, J.
`D. Tygar, and S. Wu). In Communications of the ACM, 47:3, March 2004, pp. 58-61.
`
`“Technological dimensions of privacy in Asia.” J. D. Tygar. In Asia-Pacific Review, 10:2,
`November 2003, pp. 120-145.
`
`“SPINS: Security protocols for sensor networks.” A. Perrig, R. Szewczyk, J. D. Tygar, V.
`Wen, and D. Culler. In [ACM Journal of] Wireless Networks, 8:5, September 2002, pp. 521-
`534. (An early version of this paper appears in Proceedings of the 7th Annual
`International Conference on Mobile Computing and Networks (MOBICOM), July 2001,
`pp. 189-199.)
`
`“The TESLA broadcast authentication protocol.” A. Perrig, R. Canneti, J. D. Tygar, and D.
`Song. In CryptoBytes, 5:2, Summer/Fall 2002, pp. 2-13.
`
`“SAM: A flexible and secure auction architecture using trusted hardware.” A. Perrig, S.
`Smith, D. Song, and J. D. Tygar. In Electronic Journal on E-commerce Tools and
`Applications, 1:1, January 2002 (online journal). (An early version of this paper appeared in
`Proceedings of the 1st IEEE International Workshop on Internet Computing and
`Electronic Commerce, April 2001, pp. 1764-1773.)
`
`“Why isn’t the Internet secure yet?” J. D. Tygar and A. Whitten. In ASLIB Proceedings,
`52:3, March 2000, pp. 93-97.
`
`“Multi-round anonymous auction protocols.” H. Kikuchi, M. Harkavy, and J. D. Tygar. In
`Institute of Electronics, Information, and Communication Engineers Transactions on
`Information and Systems, E82-D:4, April 1999, pp. 769-777. (An early version appeared in
`Proceedings of of the First IEEE Workshop on Dependable and Real-Time E-
`Commerce Systems (DARE ’98), June 1998, pp. 62-69. )
`
`“Atomicity in electronic commerce.” J. D. Tygar. In ACM NetWorker, 2:2, April/May 1998,
`pp. 32-43. (Note: this is a revision of item 15 published together with a new article: “An
`update on electronic commerce.” In ACM NetWorker, Volume 2, Number 2, April/May
`1998, pp. 40-41.)
`
`“A model for secure protocols and their compositions.” N. Heintze and J. D. Tygar. In IEEE
`Transactions on Software Engineering, 22:1, January 1996, pp. 16-30. (An extended abstract
`appeared in Proceedings of the 1994 IEEE Symposium on Security and Privacy, May
`1994, pp. 2-13. Another early version appeared as Carnegie Mellon University Computer
`Science technical report CMU-CS-92-100, January 1992.)
`
`“NetBill: An Internet commerce system optimized for network-delivered services.” M.
`Sirbu and J. D. Tygar. In IEEE Personal Communications, 2:4, August 1995, pp. 34-39. (An
`early version appeared in Proceedings of Uniforum ’96, February 1996, pp. 203-226.
`Another early version appeared in Proceedings of the 40th IEEE Computer Society
`International Conference, Spring 1995, pp. 20-25.)
`
`“Optimal sampling strategies for quicksort.” C. C. McGeoch and J. D. Tygar. In Random
`Structures and Algorithms, 7:4, 1995, pp. 287-300. (An early version appeared in
`Proceedings of the 28th Annual Allerton Conference on Communication, Control, and
`Computing, October 1990, pp. 62-71.)
`
`PETITIONERS Ex. 1009 Page 6
`
`

`
`40.
`
`41.
`
`42.
`
`43.
`
`44.
`
`45.
`
`“Geometric characterization of series-parallel variable resistor networks.” R. Bryant, J. D.
`Tygar, and L. Huang. In IEEE Transactions on Circuits and Systems 1: Fundamental Theory
`and Applications, 41:11, November 1994, pp. 686-698. (Preprint also available.) (An early
`version appeared in Proceedings of the 1993 IEEE International Symposium on Circuits
`and Systems, May 1993, pp. 2678-2681.)
`
`“Computability and complexity of ray tracing.” J. Reif, J. D. Tygar, and A. Yoshida. In
`Discrete and Computational Geometry, 11:3, April 1994, pp. 265-287. (An early version
`appeared in Proceedings of the 31st Annual IEEE Symposium on Foundations of
`Computer Science, October 1990, pp. 106-114.)
`
`“Specifying and checking Unix security constraints.” A. Heydon and J. D. Tygar. In
`Computing Systems, 7:1, Winter 1994, pp. 91-112. (An early version appeared in
`Proceedings of the 3rd USENIX Security Symposium, September 1992, pp. 211-226,
`preprint also available.)
`
`“Protecting privacy while preserving access to data.” L. J. Camp and J. D. Tygar. In The
`Information Society, 10:1, January 1994, pp. 59-71.
`
`“Miro: visual specification of security.” A. Heydon, M. Maimone, J. D. Tygar, J. Wing, and
`A. Zaremski. In IEEE Transactions on Software Engineering, 16:10, October 1990, pp.
`1185-1197. (An early version appeared as Carnegie Mellon University Computer Science
`Department technical report CMU-CS-89-199, December 1989.)
`
`“Efficient parallel pseudo-random number generation.” J. Reif and J. D. Tygar. In SIAM
`Journal of Computation, 17:2, April 1988, pp. 404-411. (An early version appeared in
`Proceedings of CRYPTO-85, eds. E. Brickell and H. Williams, Springer, 1986, pp. 433-
`446.)
`
`46.
`
`“Review of Abstraction and Specification in Program Development.” J. D. Tygar. In
`ACM Computing Reviews, 28:9, September 1987, pp. 454-455.
`
`
`
` Refereed Conference Papers (does not include items listed above)
`47. “Systematic Analysis and Evaluation of Web Privacy Policies and Implementations.” B.
`Miller, K. Buck, and J. D. Tygar. To appear in Proceedings of the 7th International
`Conference for Internet Technology and Secure Transactions, 2012
`
`48. “Robust Detection of Comment Spam Using Entropy Rate.” A. Kantchelian, J. Ma, L.
`Huang, S. Afroz, A. Jospeh, and J. D. Tygar. In Proceedings of 5th ACM Workshop on
`Artificial Intelligence and Security, 2012.
`
`49. “Adversarial Machine Learning.” L. Huang, A. Joseph, B. Nelson, B. Rubenstein, and J.
`D. Tygar. In Proceedings of 4th ACM Workshop on Artificial Intelligence and Security,
`2011.
`
`50. “CAPTCHA: Using strangeness in machine translation.” T. Yamamoto, J. D. Tygar, and M.
`Nishigaki. In Proceedings of the 2010 24th IEEE International Conference on Advanced
`Information Networking and Applications, April 2010, pp.430-437.
`
`PETITIONERS Ex. 1009 Page 7
`
`

`
`51. “Near-optimal evasion of convex-inducing classifiers.” B. Nelson, B. Rubinstein, L. Huang,
`A. Joseph, S. Lau, S. Lee, S. Rao, A. Tran, and J. D. Tygar. In Proceedings of the
`Thirteenth International Conference on Artificial Intelligence and Statistics, May 2010,
`pp. 549-556.
`
`52. “ANTIDOTE: Understanding and defending against poisoning of anomaly detectors.” B.
`Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar. In
`Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement,
`November 2009, pp. 1-14.
`53. “Conditioned-safe ceremonies and a user study of an application to web authentication.” C.
`Karlof, J. D. Tygar, and D. Wagner. In Proceedings of the 5th Symposium on Usable
`Privacy and Security, July 2009.
`
`
`54. “Evading anomaly detection through variance injection attacks on PCA.” (Extended abstract).
`B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, N. Taft, and J. D. Tygar. In
`Proceedings of the 11th International Symposium on Recent Advances in Intrusion
`Detection, 2008, pp. 394-395.
`
`55. “A power-preserving broadcast protocol for WSNs with DoS resistance.” C. Ni, T. Hsiang, J.
`D. Tygar. In Proceedings of 17th International IEEE Conference on Computer
`Communications and Networks. August 2008, pp. 1 – 6.
`
`56. “CITRIC: A low-bandwidth wireless camera network platform.” P. Chen, P. Ahammad, C.
`Boyer, S. Huang, L. Lin, E. Lobaton, M. Meingast, S. Oh, S. Wang, P. Yan, A. Yang, C. Yeo,
`L. Chang, J. D. Tygar, and S. Sastry. In Proceedings of the 2nd ACM/IEEE International
`Conference on Distributed Smart Cameras (ICDSC-08). September 2008.
`
`
`
`
`
`
`57.
`
`“Open problems in the security of learning.” M. Barreno, P. Bartlett, F. Chi, A. Joseph, B.
`Nelson, B. Rubinstein, U. Saini, and J. D. Tygar. In Proceedings of the First ACM
`Workshop on AISec. 2008, pp. 19-26.
`
`58. “SWOON: A testbed for secure wireless overlay networks.” Y. Huang, J. D. Tygar, H. Lin,
`L. Yeh, H. Tsai, K. Sklower, S. Shieh, C. Wu, P. Lu, S. Chien, Z. Lin, L. Hsu, C. Hsu, C.
`Hsu, Y. Wu, and M. Leong. In Proceedings USENIX Workshop on Cyber Security and
`Test, July 2008.
`“Characterizing botnets from email spam records.” L. Zhuang, J. Dunagan, D. Simon, H.
`Wang, I. Osipkov, G. Hulten and J. D. Tygar. In Proceedings of First USENIX Workshop
`on Large Scale Exploits and Emergent Threats (LEET 2008). April 2008.
`
`“Exploiting machine learning to subvert your spam filter. “ B. Nelson, M. Barreno, F. Chi,
`A. D. Joseph, B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and . Xia. In Proceedings of
`the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET
`2008). April 2008.
`
`“Optimal ROC curve for a combination of classifiers.” M. Barreno, A. Cardenas and J.D.
`Tygar. In Advances in Neural Information Processing Systems (NIPS), 2008.
`
`
`59.
`
`60.
`
`61.
`
`PETITIONERS Ex. 1009 Page 8
`
`

`
`62. “Dynamic pharming attacks and locked same-origin policies for web browsers.” C. Karlof,
`U. Shankar, J.D. Tygar, and D. Wagner. In Proceedings of the Fourteenth ACM
`Conference on Computer and Communications Security (CCS 2007), November 2007.
`
`63. “Coexistence proof using chain of timestamps for multiple RFID tags.” C. Lin, Y. Lai, J. D.
`Tygar, C. Yang, and C. Chiang. In Proceedings of Advances in Web and Network
`Technologies and Information Management, 2007, pp. 634-643.
`
`64.
`
`65.
`
`“Why phishing works.” R. Dhamija, J. D. Tygar, and M. Hearst. In Proceedings of CHI-
`2006: Conference on Human Factors in Computing Systems, April 2006.
`
`“Can machine learning be secure?” M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. D.
`Tygar. Invited paper. In Proceedings of the ACM Symposium on Information,
`Computer, and Communication Security, March 2006.
`
`66. “The battle against phishing: Dynamic security skins.” R. Dhamija and J. D. Tygar. In
`SOUPS 2005: Proceedings of the 2005 ACM Symposium on Usable Security and
`Privacy, ACM International Conference Proceedings Series, ACM Press, July 2005, pp. 77-
`88. (See also item 8.)
`
`67.
`
`68.
`
`69.
`
`70.
`
`71.
`
`72.
`
`73.
`
`“Collaborative filtering CAPTCHAs.” M. Chew and J. D. Tygar. In Human Interactive
`Proofs: Second International Workshop (HIP 2005), eds. H. Baird and D. Lopresti,
`Springer, May 2005, pp. 66-81.
`
`“Phish and HIPs: Human interactive proofs to detect phishing attacks.” R. Dhamija and J. D.
`Tygar. In Human Interactive Proofs: Second International Workshop (HIP 2005), eds.
`H. Baird and D. Lopresti, Springer, May 2005, pp. 127-141.
`
`“Image recognition CAPTCHAs.” M. Chew and J. D. Tygar. In Proceedings of the 7th
`International Information Security Conference (ISC 2004), Springer, September 2004, pp.
`268-279. (A longer version appeared as UC Berkeley Computer Science Division technical
`report UCB/CSD-04-1333, June 2004.)
`
`“Side effects are not sufficient to authenticate software.” U. Shankar, M. Chew, and J. D.
`Tygar. In Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 89-
`101. (A version with an additional appendix appeared as UC Berkeley Computer Science
`Division technical report UCB/CSD-04-1363, September 2004.)
`
`“Statistical monitoring + predictable recovery = Self-*.” A Fox, E. Kiciman, D. Patterson, R.
`Katz, M. Jordan, I. Stoica and J. D. Tygar. In Proceedings of the 2nd Bertinoro Workshop
`on Future Directions in Distributed Computing (FuDiCo II), June 2004 (online
`proceedings).
`
`“Distillation codes and their application to DoS resistant multicast authentication.” C. Karlof,
`N. Sastry, Y. Li, A. Perrig, and J. D. Tygar. In Proceedings of the Network and
`Distributed System Security Conference (NDSS 2004), February 2004, pp. 37-56.
`
`“Privacy and security in the location-enhanced World Wide Web.” J. Hong, G. Boriello, J.
`Landay, D. McDonald, B. Schilit, and J. D. Tygar. In Proceedings of the Workshop on
`Privacy at Ubicomp 2003, October 2003 (online proceedings).
`
`PETITIONERS Ex. 1009 Page 9
`
`

`
`74.
`
`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`81.
`
`82.
`
`83.
`
`84.
`
`85.
`
`“The problem with privacy.” J. D. Tygar. Keynote paper. In Proceedings of the 2003
`IEEE Workshop on Internet Applications, June 2003, pp. 2-8.
`
`“Safe staging for computer security.” A. Whitten and J. D. Tygar. In Proceedings of the
`2003 Workshop on Human-Computer Interaction and Security Systems, April 2003
`(online proceedings).
`
`“Expander graphs for digital stream authentication and robust overlay networks.” D. Song,
`D. Zuckerman, and J. D. Tygar. In Proceedings of the 2002 IEEE Symposium on Security
`and Privacy, May 2002, pp. 258-270.
`
`“ELK: A new protocol for efficient large-group key distribution.” A. Perrig, D. Song, and J.
`D. Tygar. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, May
`2001, pp. 247-262.
`
`“Efficient and secure source authentication for multicast.” A. Perrig, R. Canetti, D. Song,
`and J. D. Tygar. In Proceedings of the Internet Society Network and Distributed System
`Security Symposium (NDSS 2001), February 2001, pp. 35-46.
`
`“Efficient authentication and signing of multicast streams over lossy channels.” A. Perrig, R.
`Canetti, J. D. Tygar, and D. Song. In Proceedings of the 2000 IEEE Symposium on
`Security and Privacy, May 2000, pp. 56-73..
`
`“Flexible and scalable credential structures: NetBill implementation and experience.” Y.
`Kawakura, M. Sirbu., I. Simpson, and J. D. Tygar. In Proceedings of the International
`Workshop on Cryptographic Techniques and E-Commerce, July 1999, pp. 231-245.
`
`“Open problems in electronic commerce.” J. D. Tygar. Invited address. In Proceedings of
`the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database
`Systems (PODS 1999), May 1999, p. 101.
`
`“Electronic auctions with private bids.” M. Harkavy, J. D. Tygar, and H. Kikuchi. In
`Proceedings of the 3rd USENIX Workshop on Electronic Commerce, September 1998,
`pp. 61-73.
`
`“Atomicity versus anonymity: Distributed transactions for electronic commerce.” J. D.
`Tygar. In Proceedings of the 24th International Conference on Very Large Data Bases,
`August 1998, pp. 1-12.
`
`“Smart cards in hostile environments.” H. Gobioff, S. Smith, J. D. Tygar, and B. Yee. In
`Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996,
`pp. 23-28. (An early version appeared as Carnegie Mellon University Computer Science
`technical report CMU-CS-95-188, September 1995.)
`
`“Anonymous atomic transactions.” L. J. Camp, M. Harkavy, and B. Yee. In Proceedings of
`the 2nd USENIX Workshop on Electronic Commerce, November 1996, pp. 123-133.
`(Preprint also available.) (An early version appeared as Carnegie Mellon University
`Computer Science technical report CMU-CS-96-156, July 1996.)
`
`PETITIONERS Ex. 1009 Page 10
`
`

`
`86.
`
`87.
`
`88.
`
`89.
`
`90.
`
`91.
`
`92.
`
`93.
`
`94.
`
`95.
`
`96.
`
`97.
`
`“Model checking electronic commerce protocols.” N. Heintze, J. D. Tygar, J. Wing, and H.
`Wong. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce,
`November 1996, pp. 147-164.
`
`“WWW electronic commerce and Java Trojan horses.” J. D. Tygar and A. Whitten. In
`Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996,
`pp. 243-250.
`
`“Building blocks for atomicity in electronic commerce.” J. Su and J. D. Tygar. In
`Proceedings of the 6th USENIX Security Symposium, July 1996, pp. 97-102.
`
`“Token and notational money in electronic commerce.” L. J. Camp, M. Sirbu, and J. D.
`Tygar. In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July
`1995, pp. 1-12. (An early version was presented at the Telecommunications Policy Research
`Conference, October 1994.)
`
`“NetBill security and transaction protocol.” B. Cox, J. D. Tygar, and M. Sirbu. In
`Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 77-
`88.
`
`“Secure coprocessors in electronic commerce applications.” B. Yee and J. D. Tygar. In
`Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 155-
`170.
`
`“Completely asynchronous optimistic recovery with minimal rollbacks.” S. Smith, D.
`Johnson, and J. D. Tygar. In Proceedings of the 25th IEEE Symposium on Fault-Tolerant
`Computing, June 1995, pp. 361-370. (An early version appears as Carnegie Mellon
`University Computer Science technical report CMU-CS-94-130, March 1994.)
`
`“A fast off-line electronic currency protocol.” L. Tang and J. D. Tygar. In CARDIS 94:
`Proceedings of the First IFIP Smart Card Research and Advanced Application
`Conference, October 1994, pp. 89-100.
`
`“Security and privacy for partial order time.” S. Smith and J. D. Tygar. In Proceedings
`1994 Parallel and Distributed Computing Systems Conference, October 1994, pp. 70-79.
`(Early versions appeared as Carnegie Mellon University Computer Science technical reports
`CMU-CS-93-116, October 1991 and February 1993, and CMU-CS-94-135, April 1994.)
`
`“Certified electronic mail.” A. Bahreman and J. D. Tygar. In Proceedings of the 1994
`Network and Distributed Systems Security Conference, February 1994, pp. 3-19.
`
`“Miro tools.” A. Heydon, M. Maimone, A. Moormann, J. D. Tygar and J. Wing. In
`Proceedings of the 3rd IEEE Workshop on Visual Languages, October 1989, pp. 86-91.
`(A preprint appeared as Carnegie Mellon University Computer Science technical report
`CMU-CS-89-159, July 1989.)
`
`“Constraining pictures with pictures.” A. Heydon, M. Maimone, A. Moormann, J. D. Tygar,
`and J. Wing. In Information Processing 89: Proceedings of the 11th World Computer
`Congress, August 1989, pp. 157-162. (An early version appeared as Carnegie Mellon
`University Computer Science technical report CMU-CS-88-185, November 1988.)
`
`PETITIONERS Ex. 1009 Page 11
`
`

`
`98.
`
`“How to make replicated data secure.” M. Herlihy and J. D. Tygar. In Proceedings of
`CRYPTO-87, ed. C. Pomerance, 1988, pp. 379-391. (An early version appeared as Carnegie
`Mellon University Computer Science Technical Report CMU-CS-87-143, August 1987.)
`
`99. “Visual specification of security constraints.” J. D. Tygar and J. Wing. In Proceedings of the
`1987 (First IEEE) Workshop on Visual Languages, August 1987, pp. 288-301. (A
`preprint appeared as Carnegie Mellon University Computer Science Technical Report CMU-
`CS-87-122, May 1987.)
`
`100.
`
` “Efficient netlist comparison using hierarchy and randomization.” J. D. Tygar and R.
`Ellickson. In Proceedings of the 22nd ACM/IEEE Design Automation Conference, Las
`Vegas, NV, July 1985, pp. 702-708.
`
`101.
`
` “Hierarchical logic comparison.” R. Ellickson and J. D. Tygar. In Proceedings of MIDCON
`’84, 1984.
`
`
`
` Other Conference Publications (does not include items listed above)
`“Panel: authentication in constrained environments.” M. Burmester, V. Gligor, E. Kranakis, J.
`102.
`D. Tygar and Y. Zheng . Transcribed by B. de Medeiros. In Proceedings First International
`Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected
`Papers, 2006, pp. 186-191.
`
`103.
`
`104.
`
`105.
`
`106.
`
`107.
`
`“When computer security crashes with multimedia.” [Abstract] J. D. Tygar. In Proceedings
`of the 7th International IEEE Symposium on Multimedia, December 2005, p. 2.
`
` “Notes from the Second USENIX Workshop on Electronic Commerce.” M. Harkavy, A.
`Meyers, J. D. Tygar, A. Whitten, and H. Wong. In Proceedings of the 3rd USENIX
`Workshop on Electronic Commerce, September 1998, pp. 225-242.
`
` “How are we going to pay for this? Fee-for-service in distributed systems -- research and
`policy issues.” C. Clifton, P. Gemmel, E. Means, M. Merges, J. D. Tygar. In Proceedings of
`the 15th International Conference on Distributed Computing Systems, May 1995, pp.
`344-348.
`
` “Miro: A visual language for specifying security.” [Abstract] M. Maimone, A. Moorman, J.
`D. Tygar, J. Wing. In Proceedings of the (First) USENIX UNIX Security Workshop,
`August 1988, p. 49.
`
` “StrongBox: support for self-securing programs.” [Abstract] J. D. Tygar, B. Yee, and A.
`Spector. In Proceedings of the (First) USENIX UNIX Security Workshop, August 1988,
`p. 50.
`
`
`
`Standards Documents (does not include items listed above)
`108. TESLA: Multicast Source Authentication Transform Introduction. A. Perrig, D. Song,
`R. Canetti, J. D. Tygar, B. Briscoe. IETF RFC 4082. June 2005. (Early drafts of this RFC
`were published in October 2002, and in May, August, and December 2004.)
`
`PETITIONERS Ex. 1009 Page 12
`
`

`
`109. Performance Criteria for Information-Based Indicia and Security Architecture for
`Closed IBI Postage Metering Systems (PCIBI-C) (Draft). United States Postal Service.
`January 1999. (Note: I was a major contributor to this document.)
`
`110. Performance Criteria for Information-Based Indicia and Security Architecture for
`Open IBI Postage Evidence Systems (PCIBI-O) (Draft). United States Postal Service.
`February 2000. (Note: I was a major contributor to this document.)
`
`111. Production, Distribution, and Use of Postal Security Devices and Information Based
`Indicia.” United States Postal Service. Federal Register 65:191, October 2, 2000, pp.
`58682-58698. (Note: I was a major contributor to this document.)
`
`
`
`Technical Reports (does not include items listed above)
`112. Usability of Security: A Case Study. A. Whitten and J. D. Tygar. Carnegie Mellon
`University Computer Science technical report CMU-CS-98-155, December 1998. (Note:
`this report partly ove

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket