throbber
Steven M. Bellovin
`smb at cs.columbia.edu
`http://www.cs.columbia.edu/˜ smb
`
`Education
`1982 Ph.D., University of North Carolina at Chapel Hill. Dissertation: Verifiably Cor-
`rect Code Generation Using Predicate Transformers; advisor: David L. Parnas.
`
`1977 M.S., University of North Carolina at Chapel Hill.
`
`1972 B.A., Columbia University.
`
`Employment
`2012-2013
`
`Chief Technologist, Federal Trade Commission.
`
`2005-now
`
`2002-2004
`
`1998-2004
`
`1987-1998
`
`Professor of Computer Science, Columbia University.
`
`Adjunct Professor of Computer Science, University of Pennsylvania.
`
`AT&T Fellow, AT&T Labs—Research.
`
`Distinguished Member of the Technical Staff, AT&T Bell Laboratories
`and AT&T Labs—Research.
`
`1982-1987 Member of the Technical Staff, AT&T Bell Laboratories.
`
`1977-1978
`
`Instructor, Dept. of Computer Science, University of North Carolina at
`Chapel Hill.
`
`Honors
`2006 Received the 2007 NIST/NSA National Computer Systems Security Award
`
`2001 Elected to the National Academy of Engineering.
`
`1998 Named an AT&T Fellow.
`
`1995 Received the Usenix Lifetime Achievement Award (“The Flame”), along with
`Tom Truscott and Jim Ellis, for our role in creating Usenet.
`
`1
`
`

`

`Books and Chapters
`• Salvatore Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Sean
`Smith, and Shlomo Hershkop, editors. Insider Attack and Cyber Security: Be-
`yond the Hacker (Advances in Information Security). Springer, 2008.
`• Seymour E. Goodman and Herbert S. Lin, editors. Toward a Safer and More
`Secure Cyberspace. National Academy Press, 2007.
`• Stephen T. Kent and Lynette I. Millett, editors. Who Goes There? Authentication
`Through the Lens of Privacy. National Academies Press, 2003.
`• John L. Hennessy, David A. Patterson, and Herbert S. Lin, editors. Information
`Technology for Counterterrorism: Immediate Actions and Future Possibilities.
`National Academies Press, 2003.
`• William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin. Firewalls and
`Internet Security; Repelling the Wily Hacker. Addison-Wesley, Reading, MA,
`second edition, 2003.
`• Making the Nation Safer: The Role of Science and Technology in Countering
`Terrorism. National Academies Press, 2002.
`• Stephen T. Kent and Lynette I. Millett, editors. IDs—Not That Easy: Questions
`About Nationwide Identity Systems. National Academies Press, 2002.
`• Fred B. Schneider, editor. Trust in Cyberspace. National Academy Press, 1999.
`• Network security issues. In Peter Denning and Dorothy Denning, editors, Inter-
`net Besieged: Countering Cyberspace Scofflaws. ACM Press, 1997.
`• Network security issues.
`In A. Tucker, editor, CRC Computer Science and
`Engineering Handbook. CRC Press, 1996.
`• Security and software engineering. In B. Krishnamurthy, editor, Practical Reusable
`UNIX Software. John Wiley & Sons, 1995.
`• William R. Cheswick and Steven M. Bellovin. Firewalls and Internet Security:
`Repelling the Wily Hacker. Addison-Wesley, Reading, MA, first edition, 1994.
`
`Papers
`Host and Internet Security
`• Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. A study of pri-
`vacy setting errors in an online social network. In Proceedings of SESOC 2012,
`2012. An earlier version is available as Technical Report CUCS-010-11.
`
`2
`
`

`

`IEEE
`
`• Carl Landwehr, Dan Boneh, John Mitchell, Steven M. Bellovin, Susan Landau,
`and Mike Lesk. Privacy and cybersecurity: The next 100 years. Proceedings of
`the IEEE, PP(99):1–15, 2012.
`• Maritza Johnson, Serge Egelman, and Steven M. Bellovin. Facebook and pri-
`vacy: It’s complicated. In Symposium On Usable Privacy and Security (SOUPS),
`July 2012.
`• Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. The failure of
`online social network privacy settings. Technical Report CUCS-010-11, Depart-
`ment of Computer Science, Columbia University, February 2011.
`• Hang Zhao, Jorge Lobo, Arnab Roy, and Steven M Bellovin. Policy refinement
`In The 12th IFIP/IEEE International Sym-
`of network services for MANETs.
`posium on Integrated Network Management (IM 2011), Dublin, Ireland, May
`2011.
`• Sal Stolfo, Steven M. Bellovin, and David Evans. Measuring security.
`Security & Privacy, 9(3):88, May–June 2011.
`• Shreyas Srivatsan, Maritza Johnson, and Steven M. Bellovin.
`Simple-VPN:
`Simple IPsec configuration. Technical Report CUCS-020-10, Department of
`Computer Science, Columbia University, July 2010.
`• Hang Zhao and Steven M. Bellovin. High performance firewalls in MANETs.
`In International Conference on Mobile Ad-hoc and Sensor Networks, pages 154–
`160, Los Alamitos, CA, USA, December 2010. IEEE Computer Society.
`• Yuu-Heng Cheng, Mariana Raykova, Alex Poylisher, Scott Alexander, Martin
`Eiger, and Steve M. Bellovin. The Zodiac policy subsystem: a policy-based
`In IEEE Policy 2009, July
`management system for a high-security MANET.
`2009. Longer version issued as CUCS-023-09.
`• Steven M. Bellovin and Randy Bush. Configuration management and security.
`IEEE Journal on Selected Areas in Communications, 27(3):268–274, April 2009.
`• Maritza Johnson, Steven M. Bellovin, Robert W. Reeder, and Stuart Schechter.
`Laissez-faire file sharing: Access control designed for individuals at the end-
`points. In New Security Paradigms Workshop, September 2009.
`• Shaya Potter, Steven M. Bellovin, and Jason Nieh. Two person control admin-
`In LISA ’09,
`istration: Preventing administration faults through duplication.
`November 2009.
`• Yuu-Heng Cheng, Scott Alexander, Alex Poylisher, and Mariana Raykova Steven M.
`Bellovin. The Zodiac policy subsystem: a policy-based management system for
`a high-security MANET. Technical Report CUCS-023-09, Department of Com-
`puter Science, Columbia University, May 2009.
`
`3
`
`

`

`• Hang Zhao and Steven M. Bellovin. Source prefix filtering in ROFL. Technical
`Report CUCS-033-09, Department of Computer Science, Columbia University,
`July 2009.
`• Kyle Dent and Steven M. Bellovin. Newspeak: A secure approach for designing
`web applications. Technical Report CUCS-008-08, Department of Computer
`Science, Columbia University, February 2008.
`• Hang Zhao, Jorge Lobo, and Steven M. Bellovin. An algebra for integration
`In Proceeding of the 9th IEEE Workshop on
`and analysis of Ponder2 policies.
`Policies for Distributed Systems and Networks, June 2008.
`• Maritza Johnson, Chaitanya Atreya, Adam Aviv, Mariana Raykova, Steven M.
`Bellovin, and Gail Kaiser. RUST: A retargetable usability testbed for website
`authentication technologies. In Usenix Workshop on Usability, Psychology, and
`Security, April 2008.
`• Maritza Johnson and Steven M. Bellovin. Security assurance for web device
`In Security for Access to Device APIs from the Web - W3C Workshop,
`APIs.
`December 2008.
`• Hang Zhao, Chi-Kin Chau, and Steven M. Bellovin. ROFL: Routing as the
`In New Security Paradigms Workshop, September 2008. A
`firewall layer.
`version is available as Technical Report CUCS-026-08.
`• Hang Zhao and Steven M. Bellovin. Policy algebras for hybrid firewalls. Tech-
`nical Report CUCS-017-07, Department of Computer Science, Columbia Uni-
`versity, March 2007. Also presented at the Annual Conference of the ITA, 2007.
`• Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis,
`Kostas Anagnostakis, and Jonathan M. Smith. Coordinated policy enforcement
`for distributed applications. International Journal of Network Security, 4(1):69–
`80, January 2007.
`• Steven M. Bellovin. Virtual machines, virtual security. Communications of the
`ACM, 49(10), October 2006. “Inside RISKS” column.
`• Steven M. Bellovin, Angelos Keromytis, and Bill Cheswick. Worm propagation
`strategies in an IPv6 Internet. ;login:, pages 70–76, February 2006.
`• Ka-Ping Yee, David Wagner, Marti Hearst, and Steven M. Bellovin. Prerendered
`In Usenix/ACCURATE
`user interfaces for higher-assurance electronic voting.
`Electronic Voting Technology Workshop, August 2006. An earlier version ap-
`peared as Technical Report UCB/EECS-2006-35.
`• Steven M. Bellovin. A look back at “Security problems in the TCP/IP protocol
`suite”. In Annual Computer Security Applications Conference, December 2004.
`Invited paper.
`
`4
`
`

`

`• Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis,
`and Jonathan M. Smith. Design and implementation of virtual private services.
`In Proceedings of the IEEE International Workshops on Enabling Technologies:
`Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise
`Security, Linz, Austria, June 2003.
`• Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson,
`and Scott Shenker. Controlling high bandwidth aggregates in the network. Com-
`puter Communications Review, 32(3):62–73, July 2002.
`• John Ioannidis and Steven M. Bellovin. Implementing pushback: Router-based
`defense against DDoS attacks. In Proc. Internet Society Symposium on Network
`and Distributed System Security, 2002.
`• Sotiris Ioannidis, Steven M. Bellovin, and Jonathan Smith. Sub-operating sys-
`tems: A new approach to application security. In SIGOPS European Workshop,
`September 2002.
`• Steven M. Bellovin. Computer security—an end state? Communications of the
`ACM, 44(3), March 2001.
`• Sotiris Ioannidis and Steven M. Bellovin. Building a secure web browser.
`Usenix Conference, June 2001.
`• Peter M. Gleitz and Steven M. Bellovin. Transient addressing for related pro-
`cesses: Improved firewalling by using IPv6 and multiple addresses per host. In
`Proceedings of the Eleventh Usenix Security Symposium,, August 2001.
`• Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, and Jonathan M.
`Smith. Implementing a distributed firewall. In ACM Conference on Computer
`and Communications Security, Athens, Greece, November 2000.
`• Steven M. Bellovin. Distributed firewalls.
`1999.
`• J. S. Denker, S. M. Bellovin, H. Daniel, N. L. Mintz, T. Killian, and M. A.
`Plotnick. Moat: A virtual private network appliance and services platform. In
`Proceedings of LISA XIII, November 1999.
`• Peter Gregory. Why systems administration is hard.
`Prentice-Hall, 1999. (Foreword).
`• William Cheswick and Steven M. Bellovin. How computer security works:
`Firewalls. Scientific American, pages 106–107, October 1998.
`• Bill Cheswick and Steven M. Bellovin. A DNS filter and switch for packet-
`filtering gateways. In Proceedings of the Sixth Usenix Unix Security Symposium,
`pages 15–19, San Jose, CA, 1996.
`
`;login:, pages 39–47, November
`
`In
`
`In Solaris Security.
`
`5
`
`

`

`In Proceedings of the
`
`• Steven M. Bellovin. Using the domain name system for system break-ins.
`In
`Proceedings of the Fifth Usenix Unix Security Symposium, pages 199–208, Salt
`Lake City, UT, June 1995.
`• Steven M. Bellovin. Security and uses of the Internet.
`North American Serials Interest Group, June 1995.
`• Steven M. Bellovin. There be dragons. In Proceedings of the Third Usenix Unix
`Security Symposium, pages 1–16, September 1992.
`• Steven M. Bellovin. Towards a commercial IP security option. In Commercial
`IPSO Workshop, INTEROP ’89, 1989.
`• Steven M. Bellovin. Security problems in the TCP/IP protocol suite. Computer
`Communications Review, 19(2):32–48, April 1989.
`• Steven M. Bellovin. The “session tty” manager.
`Summer 1988.
`
`In Proc. Usenix Conference,
`
`Networking
`• Olaf Maennel, Randy Bush, Luca Cittadini, and Steven M. Bellovin. A better
`approach than carrier-grade-NAT. Technical Report CUCS-041-08, Department
`of Computer Science, Columbia University, September 2008.
`• Steven M. Bellovin. Spamming, phishing, authentication, and privacy. Commu-
`nications of the ACM, 47(12), December 2004. “Inside RISKS” column.
`• Steven M. Bellovin. A technique for counting NATted hosts. In Proc. Second
`Internet Measurement Workshop, pages 267–272, Marseille, 2002.
`• Steven M. Bellovin. Packets found on an internet. Computer Communications
`Review, 23(3):26–31, July 1993.
`• Steven M. Bellovin. Pseudo-network drivers and virtual networks. In USENIX
`Conference Proceedings, pages 229–244, Washington, D.C., January 22–26,
`1990.
`• Peter Honeyman and Steven M. Bellovin. PATHALIAS or the care and feeding
`of relative addresses. In Proc. Summer Usenix Conference, 1986.
`
`Cryptography
`• Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin,
`and Salvatore J. Stolfo. Usable secure private search. IEEE Security & Privacy,
`2012. To appear.
`• Mariana Raykova, Hang Zhao, and Steven M. Bellovin. Privacy enhanced ac-
`cess control for outsourced data sharing. In Financial Cryptography and Data
`Security, March 2012.
`
`6
`
`

`

`• Steven M. Bellovin. Frank Miller: Inventor of the one-time pad. Cryptologia,
`35(3):203–222, July 2011. An earlier version is available as technical report
`CUCS-009-11.
`• Steven M. Bellovin. Frank Miller: Inventor of the one-time pad. Technical
`Report CUCS-009-11, Department of Computer Science, Columbia University,
`March 2011. A revised version appeared in Cryptologia 35(3), July 2011.
`• Vasilis Pappas, Mariana Raykova, Binh Vo, Steven M. Bellovin, and Tal Malkin.
`Private search in the real world. In Proceedings of the 2011 Annual Computer
`Security Applications Conference, December 2011.
`• Mariana Raykova, Hang Zhao, and Steven M. Bellovin. Privacy enhanced access
`control for outsourced data sharing. Technical Report CUCS-039-11, Depart-
`ment of Computer Science, Columbia University, 2011.
`• Vasilis Pappas, Mariana Raykova, Binh Vo, Steven M. Bellovin, and Tal Malkin.
`Trade-offs in private search. Technical Report CUCS-022-10, Department of
`Computer Science, Columbia University, September 2010.
`• Elli Androulaki and Steven M. Bellovin. A secure and privacy-preserving tar-
`In Proceedings of the 1st Workshop on Real-Life Crypto-
`geted ad-system.
`graphic Protocols and Standardization, January 2010.
`• Elli Androulaki, Binh Vo, and Steven M. Bellovin. A real-world identity man-
`agement system with master secret revocation. Technical Report CUCS-008-10,
`Department of Computer Science, Columbia University, April 2010.
`• Elli Androulaki, Binh Vo, and Steven M. Bellovin. Privacy-preserving, taxable
`In Proceedings of the European Symposium on Research in
`bank accounts.
`Computer Security (ESORICS), Athens, September 2010. Longer version issued
`as Tech Report CUCS-005-10.
`• Elli Androulaki, Binh Vo, and Steven M. Bellovin. Privacy-preserving, tax-
`able bank accounts. Technical Report CUCS-005-10, Department of Computer
`Science, Columbia University, April 2010.
`• Elli Androulaki and Steven M. Bellovin. An anonymous credit card system.
`In Proceedings of 6th International Conference on Trust, Privacy & Security in
`Digital Business (TrustBus), September 2009. Longer version issued as Tech
`Report CUCS-010-09.
`• Elli Androulaki and Steven M. Bellovin. An anonymous credit card system.
`Technical Report CUCS-010-09, Department of Computer Science, Columbia
`University, February 2009.
`• Elli Androulaki and Steven M. Bellovin. Anonymous delivery of physical ob-
`jects. In Symposium on Privacy-Enhancing Technologies (PET), July 2009.
`
`7
`
`

`

`• Mariana Raykova, Binh Vo, Tal Malkin, and Steven M. Bellovin. Secure anony-
`In Proceedings of the ACM Cloud Computing Security
`mous database search.
`Workshop, November 2009.
`• Elli Androulaki and Steven M. Bellovin. A secure and privacy-preserving tar-
`geted ad-system. Technical Report CUCS-044-09, Department of Computer
`Science, Columbia University, October 2009. A revised version will appear at
`the 1st Workshop on Real-Life Cryptographic Protocols and Standardization.
`• Elli Androulaki, Mariana Raykova, Angelos Stavrou, and Steven M. Bellovin.
`In Proceedings of the 8th Privacy En-
`PAR: Payment for anonymous routing.
`hancing Technologies Symposium, July 2008.
`• Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, and Tal Malkin. Rep-
`In Proceedings of the 8th Privacy
`utation systems for anonymous networks.
`Enhancing Technologies Symposium, July 2008.
`• Steven M. Bellovin and William R. Cheswick. Privacy-enhanced searches us-
`ing encrypted Bloom filters. Technical Report CUCS-034-07, Department of
`Computer Science, Columbia University, September 2007.
`• Elli Androulaki, Mariana Raykova, Angelos Stavrou, and Steven M. Bellovin.
`Opentor: Anonymity as a commodity service. Technical Report CUCS-031-07,
`Department of Computer Science, Columbia University, September 2007.
`• Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, and Tal Malkin. Repu-
`tation systems for anonymous networks. Technical Report CUCS-029-07, De-
`partment of Computer Science, Columbia University, September 2007.
`• Steven M. Bellovin and Eric K. Rescorla. Deploying a new hash algorithm. In
`Proceedings of NDSS ’06, 2006.
`• William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis,
`Angelos D. Keromytis, and Omer Reingold.
`Just fast keying: Key agreement
`in a hostile Internet. ACM Transactions on Information and System Security
`(TISSEC), 7(2):1–32, May 2004.
`• William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis,
`Angelos D. Keromytis, and Omer Reingold. Efficient, DoS-resistant, secure
`key exchange for internet protocols. In Proceedings of the ACM Computer and
`Communications Security (CCS) Conference, November 2002.
`• S.M. Bellovin and M.A. Blaze. Cryptographic modes of operation for the Inter-
`net. In Second NIST Workshop on Modes of Operation, August 2001.
`• Steven M. Bellovin. Cryptography and the internet. In Advances in Cryptology:
`Proceedings of CRYPTO ’98, August 1998.
`• Steven M. Bellovin. Probable plaintext cryptanalysis of the IP security protocols.
`In Proceedings of the Symposium on Network and Distributed System Security,
`pages 155–160, 1997.
`
`8
`
`

`

`• Steven M. Bellovin. Problem areas for the IP security protocols. In Proceedings
`of the Sixth Usenix Unix Security Symposium, pages 205–214, July 1996.
`• David A. Wagner and Steven M. Bellovin. A “bump in the stack” encryptor
`In Proceedings of the Symposium on Network and Dis-
`for MS-DOS systems.
`tributed System Security, pages 155–160, San Diego, February 1996.
`• Uri Blumenthal and Steven M. Bellovin. A better key schedule for DES-like
`ciphers. In Proceedings of PRAGOCRYPT ’96, Prague, 1996.
`• Matt Blaze and Steven M. Bellovin. Session-layer encryption.
`In Proc. 5th
`USENIX UNIX Security Symposium, Salt Lake City, UT, June 1995.
`• Steven M. Bellovin and Michael Merritt. An attack on the Interlock Proto-
`col when used for authentication.
`IEEE Transactions on Information Theory,
`40(1):273–275, January 1994.
`• Steven M. Bellovin and Michael Merritt. Augmented encrypted key exchange.
`In Proceedings of the First ACM Conference on Computer and Communications
`Security, pages 244–250, Fairfax, VA, November 1993.
`• Steven M. Bellovin and Michael Merritt. Encrypted key exchange: Password-
`IEEE Computer
`In Proc.
`based protocols secure against dictionary attacks.
`Society Symposium on Research in Security and Privacy, pages 72–84, Oakland,
`CA, May 1992.
`• Steven M. Bellovin and Michael Merritt. Limitations of the Kerberos authen-
`In USENIX Conference Proceedings, pages 253–267, Dallas,
`tication system.
`TX, Winter 1991.
`
`Public Policy
`• Steven M. Bellovin, Matt Blaze, Sandy Clark, and Susan Landau. Going bright:
`Wiretapping without weakening communications infrastructure. IEEE Security
`& Privacy, 11(1):62–72, January–February 2013.
`• Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, and Jen-
`nifer Rexford. Can it really work? Problems with extending EINSTEIN 3 to
`critical infrastructure. National Security Journal, 3, 2012.
`• Maritza L. Johnson, Steven M. Bellovin, and Angelos D. Keromytis. Computer
`security research with human subjects: Risks, benefits and informed consent. In
`Financial Cryptography and Data Security, Lecture Notes in Computer Science.
`Springer Berlin / Heidelberg, 2011.
`• Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, and Jen-
`nifer Rexford. As simple as possible — but not more so. Communications of
`the ACM, 2011. Note: this is a shorter version of “Can it really work?”.
`
`9
`
`

`

`• Elli Androulaki, Binh Vo, and Steven M. Bellovin. Cybersecurity through iden-
`tity management. In Engaging Data: First International Forum on the Applica-
`tion and Management of Personal Electronic Information, October 2009.
`• Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neu-
`mann, and Jennifer Rexford. Risking communications security: Potential haz-
`ards of the “Protect America Act”. IEEE Security & Privacy, 6(1):24–33, Jan-
`uary/February 2008.
`• Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter G. Neu-
`mann, and Jennifer Rexford. Internal surveillance, external risks. Communica-
`tions of the ACM, 50(12), December 2007.
`• Steven M. Bellovin, Matt Blaze, and Susan Landau. The real national-security
`needs for VoIP. Communications of the ACM, 48(11), November 2005. “Inside
`RISKS” column.
`• Matt Blaze and Steven M. Bellovin. Tapping on my network door. Communica-
`tions of the ACM, 43(10), October 2000.
`• Steven M. Bellovin. Wiretapping the Net. The Bridge, 20(2):21–26, Summer
`2000.
`• Fred Schneider, Steven M. Bellovin, and Alan Inouye. Critical infrastructures
`In Telecommunications Policy
`you can trust: Where telecommunications fits.
`Research Conference, October 1998.
`• Yakov Rekhter, Paul Resnick, and Steven M. Bellovin. Financial incentives for
`route aggregation and efficient address utilization in the Internet. In Proceedings
`of Telecommunications Policy Research Conference, 1997.
`
`IETF RFCs and Internet Drafts
`• F. Gont and S. Bellovin. Defending against Sequence Number Attacks. RFC
`6528, RFC Editor, February 2012.
`• S. Bellovin. Guidelines for Specifying the Use of IPsec Version 2. RFC 5406,
`RFC Editor, February 2009.
`• S. Bellovin. Key Change Strategies for TCP-MD5. RFC 4808, RFC Editor,
`March 2007.
`• S. Bellovin and A. Zinin. Standards Maturity Variance Regarding the TCP MD5
`Signature Option (RFC 2385) and the BGP-4 Specification. RFC 4278, RFC
`Editor, January 2006.
`• S. Bellovin and R. Housley. Guidelines for Cryptographic Key Management.
`RFC 4107, RFC Editor, June 2005.
`
`10
`
`

`

`• S. Bellovin. The Security Flag in the IPv4 Header. RFC 3514, RFC Editor,
`April 1, 2003.
`• S. Bellovin, J. Ioannidis, A. Keromytis, and R. Stewart. On the Use of Stream
`Control Transmission Protocol (SCTP) with IPsec. RFC 3554, RFC Editor, July
`2003.
`• S. Bellovin. Report of the IAB Security Architecture Workshop. RFC 2316,
`RFC Editor, April 1998.
`• H. Lu, M. Krishnaswamy, L. Conroy, S. Bellovin, F. Burg, A. DeSimone, K. Tewani,
`P. Davidson, H. Schulzrinne, and K. Vishwanathan. Toward the PSTN/Internet
`Inter-Networking–Pre-PINT Implementations. RFC 2458, RFC Editor, Novem-
`ber 1998.
`• S. Bellovin. Defending Against Sequence Number Attacks. RFC 1948, RFC
`Editor, May 1996.
`• S. Bellovin. Firewall-Friendly FTP. RFC 1579, RFC Editor, February 1994.
`• S. Bellovin. Security Concerns for IPng. RFC 1675, RFC Editor, August 1994.
`• S. Bellovin. On Many Addresses per Host. RFC 1681, RFC Editor, August
`1994.
`
`Miscellaneous Documents
`• Maritza Johnson and Steven M. Bellovin.
`Policy management for e-health
`records. Usenix HealthSec, August 2010. Position paper.
`• Maritza Johnson, Chaitanya Atreya, Adam Aviv, Mariana Raykova, Steven M.
`Bellovin, and Gail Kaiser. RUST: The reusable security toolkit, 2008. Draft.
`• Paula Hawthorn, Barbara Simons, Chris Clifton, David Wagner, Steven M. Bellovin,
`Rebecca Wright, Arnold Rosenthal, Ralph Poore, Lillie Coney, Robert Gellman,
`and Harry Hochheiser. Statewide databases of registered voters: Study of accu-
`racy, privacy, usability, security, and reliability issues, February 2006. Report
`commissioned by the U.S. Public Policy Committee of the Association for Com-
`puting Machinery.
`• Steven M. Bellovin, David D. Clark, Adrian Perrig, and Dawn Song. Workshop
`report: Clean-slate design for the next-generation secure Internet, March 2006.
`NSF workshop report.
`• Steven M. Bellovin, Matt Blaze, Ernest Brickell, Clinton Brooks, Vint Cerf,
`Whitfield Diffie, Susan Landau, Jon Peterson, and John Treichler.
`Security
`implications of applying the Communications Assistance to Law Enforcement
`Act to Voice over IP, 2006.
`
`11
`
`

`

`• Steven M. Bellovin. Cybersecurity research needs, July 2003. Testimony before
`the House Select Committee on Homeland Security, Subcommittee on Cyberse-
`curity, Science, Research, & Development, hearing on “Cybersecurity—Getting
`it Right”.
`• Steven M. Bellovin and Emden R. Gansner. Using link cuts to attack Internet
`routing, 2003. Draft.
`• Steven M. Bellovin. Access control prefix router advertisement option for IPv6.
`Obsolete Internet draft, February 2003.
`• Steven M. Bellovin, Marcus Leech, and Tom Taylor. ICMP traceback messages.
`Obsolete Internet draft, February 2003.
`• Steven M. Bellovin and Randy Bush. Security through obscurity considered
`dangerous. Obsolete Internet draft, February 2002.
`• Steven M. Bellovin. A “Reason” field for ICMP “Administratively Prohibited”
`messages. Obsolete Internet draft, December 2001.
`• Steven M. Bellovin. Using Bloom Filters for authenticated yes/no answers in
`the DNS. Obsolete Internet draft, December 2001.
`• Steven M. Bellovin, C. Cohen, J. Havrilla, S. Herman, B. King, J. Lanza, L. Pe-
`sante, R. Pethia, S. McAllister, G. Henault, R. T. Goodden, A. P. Peterson,
`S. Finnegan, K. Katano, R. M. Smith, and R. A. Lowenthal. Results of the
`“Security in ActiveX Workshop”, December 2000.
`• D. Whiting, B. Schneier, and S. Bellovin. AES key agility issues in high-speed
`IPsec implementations, 2000.
`• Steven M. Bellovin, Matt Blaze, David Farber, Peter Neumann, and Gene Spaf-
`ford. Comments on the Carnivore system technical review draft, December
`2000.
`• Matt Blaze and Steven M. Bellovin. Open Internet wiretapping, July 2000.
`Written testimony for a hearing on “Fourth Amendment Issues Raised by the
`FBI’s ‘Carnivore’ Program” by the Subcommittee on the Constitution, House
`Judiciary Committee.
`• Steven M. Bellovin and Robert G. Moskowitz. Client certificate and key retrieval
`for IKE. Obsolete Internet draft, November 2000.
`• Steven M. Bellovin, Adam Buchsbaum, and S. Muthukrishnan. TCP compres-
`sion filter. Obsolete Internet draft, October 1999.
`• Steven M. Bellovin, Adam Buchsbaum, and S. Muthukrishnan. TCP filters.
`Obsolete Internet draft, October 1999.
`
`12
`
`

`

`• Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze,
`Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I.
`Schiller, and Bruce Schneier. The risks of key recovery, key escrow, and trusted
`third-party encryption, May 1997. A report by an ad hoc group of cryptographers
`and computer scientists.
`• David A. Wagner and Steven M. Bellovin. A programmable plaintext recognizer,
`1994. Unpublished.
`• Steven M. Bellovin. A best-case network performance model, 1992. Unpub-
`lished.
`• Steven M. Bellovin and Michael Merritt. Encrypted key exchange: Password-
`based protocols secure against dictionary attacks, August 1991.
`• Steven M. Bellovin, November 1990. Internal report.
`
`Major Positions
`2010-now Member, Computer Science and Telecommunications Board of the Na-
`tional Academies
`
`2009-now Member, Technical Guidelines Development Committee of the Elections
`Assistance Commission
`
`2008
`
`2006
`
`Co-chair, Applied Cryptography and Network Security (ACNS)
`
`Chair, Steps Towards Reducing Unwanted Traffic in the Internet (SRUTI)
`
`2005-now Member, Department of Homeland Security Science and Technology
`Advisory Committee
`
`2004-2007 Member, National Research Council study committee on cybersecurity
`research needs.
`
`2002-2004 Member, ICANN DNS Security and Stability Advisory Committee.
`
`2002-2004
`
`Security Area co-director, Internet Engineering Task Force (IETF).
`
`2002
`
`2002
`
`Chair, program committee, IEEE Symposium on Security and Privacy.
`
`Member, Information Technology sub-committee, National Research Coun-
`cil study committee on science and technology against terrorism.
`
`2001-2003 Member, ACM Advisory Committee on Security and Privacy.
`
`2001
`
`Vice-chair, program committee, IEEE Symposium on Security and Pri-
`vacy.
`
`2001-2003 Member, National Research Council study committee on authentication
`technologies and their privacy implications.
`
`13
`
`

`

`2000-2002
`
`Chair, IETF ITRACE working group.
`
`2000
`
`1999-2002
`
`1999-now
`
`1997-2001
`
`Co-chair, Usenix Security Symposium.
`
`IETF representative, ICANN Protocol Supporting Organization
`
`Co-chair, IETF SPIRITS working group.
`
`Co-chair, IETF PINT working group.
`
`1996-1998 Member, National Research Council study committee on information
`systems trustworthiness.
`
`1996-2002 Member, Internet Architecture Board.
`
`1996
`
`Co-chair, Usenix Security Symposium.
`
`1993-1995 Member, IETF IPng Directorate.
`
`U.S. Patents
`
`8,261,069 Privacy-Enhanced Searches Using Encryption
`
`8,239,531 Method and Apparatus for Connection to Virtual Private Networks for Se-
`cure Transactions
`
`8,145,793 System and Method for Distributed Content Transformation
`
`8,107,479 Method and System for Telephony and High Speed Data Access on a Broad-
`band Access Network
`
`8,037,167 Method for Detecting Hosts behind Network Address Translators
`
`7,907,517 Routing Protocols with Predicted Outage Notification
`
`7,756,008 Routing Protocols with Predicted Outage Notification
`
`7,676,224 Enhanced Communication Service for Predicting and Handling Communi-
`cation Interruption (2010).
`
`7,558,970 Full-Text Privacy-enhanced searches using encryption
`
`7,227,843 Method for reducing congestion in packet-switched networks (2007).
`
`7,051,365 Method and apparatus for a distributed firewall (2006).
`
`7,035,410 Method and apparatus for enhanced security in a broadband telephony net-
`work (2006).
`
`6,870,845 Method for providing privacy by network address translation (2005).
`
`6,665,299 Method and system for telephony and high speed data access on a broadband
`access network (2003).
`
`14
`
`

`

`5,958,052 Method and apparatus for restricting access to private information in domain
`name systems by filtering information (1999).
`
`5,870,557 Method for determining and reporting a level of network activity on a com-
`munications network using a routing analyzer and advisor (1999).
`
`5,805,820 Method and apparatus for restricting access to private information in domain
`name systems by redirecting query requests (1998).
`
`5,440,635 Cryptographic protocol for remote authentication (1995).
`
`5,241,599 Cryptographic protocol for secure communications (1993).
`
`Numerous other patent applications are pending.
`
`15
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket