`
`Avi Rubin’s Vita
`
`Home Vita Teaching Blog Contact
`
`Avi Rubin’s Vita
`
`Academic Degrees
`
` 1994, Ph.D., Computer Science and Engineering, University of Michigan, Ann Arbor
`
` 1991, M.S.E., Computer Science and Engineering, University of Michigan, Ann Arbor
` 1989, B.S., Computer Science (Honors), University of Michigan, Ann Arbor
`Academic Appointments
` April, 2004 present
`
` Professor, Johns Hopkins University
`
` August, 2010 July, 2011
`
` Visiting Research Professor, Fulbright Scholar, Tel Aviv University, Israel
`
` January, 2003 April, 2004
`
` Associate Professor, Johns Hopkins University
`
` January, 2003 present
`
` Technical Director, Johns Hopkins University Information Security Institute
`
` 2006 2010
`
` Director and Principal Investigator (PI), National Science Foundation's ACCURATE Center
`
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`1/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 1
`
`
`
`Avi Rubin’s Vita
`
`3/7/2018
` 1995 1999
`
` Adjunct Professor, New York University
`
` Internet and Web Security Spring, 1999 (with Dave Kormann)
`
` Privacy in Networks: Attacks and Defenses Spring, 1998 (with Dave Kormann and Mike
`Reiter)
`
` Design and Analysis of Cryptographic Protocols Fall, 1996 & Spring, 1997 (with Matt
`Franklin)
`
` Cryptography and Computer Security Fall, 1995 & Spring, 1996
`
`
`
`
` Summer, 1999
`
` Visiting Professor, École Normale Supérieure, Paris, France
`
`
`
`
` 1988 1993
`
` Teaching Assistant, University of Michigan
` 1993 Intro. to Cryptography
`
` 1992 Assembler Language Programming
`
` 1991 Software Engineering
`
` 1990 IVHS Seminar
`
` 19891990 Head TA, Intro. to Computer Science
`
` 19881989 Intro. to Computer Science
`
`
`
`
`
`
` Doctoral Committees
`
` Doctoral Thesis Advisor: Gabe Kaptchuk, JHU
`
` Doctoral Thesis Advisor: David Russell, JHU
`
` Doctoral Thesis Advisor: Paul Martin, JHU (February, 2016)
`
` Doctoral Thesis Advisor: Michael Rushanan, JHU (May, 2016)
`
` Doctoral Thesis Advisor: Ayo Akinyele, JHU (December, 2013)
`
` Doctoral Thesis Advisor: Matthew Pagano, JHU (August, 2013)
`
` Doctoral Thesis Advisor: Ryan Gardner, JHU (August, 2009)
`
` Doctoral Thesis Advisor: Sam Small, JHU (May, 2009)
`
` Doctoral Thesis Advisor: Sujata Doshi, JHU (May, 2009)
`
` Doctoral Thesis Advisor: Joshua Mason, JHU (June, 2009)
`
` Dissertation Committee: J. Alex Halderman, Princeton University (May, 2009)
`
` Dissertation Committee: Sophie Qiu (May, 2007).
`
` Doctoral Thesis Advisor: Adam Stubblefield (April, 2005).
`
` Dissertation Committee: Kevin FU, MIT (February, 2005).
`
` Dissertation Committee: Robert Fischer, Harvard University (June, 2003).
`
` Dissertation Committee: Marc Waldman, New York University, (April, 2003).
`
` Dissertation Committee: Patrick McDaniel, University of Michigan (September, 2001).
`
` Doctoral Thesis Advisor: Fabian Monrose, New York University (April, 1999).
`
` Dissertation Committee: Mike Just, Carleton University (November, 1998).
`
` Dissertation Committee: Trent Jaeger, University of Michigan (October, 1996).
`
`Industry Experience
`
` 2011 present
`
` Harbor Labs, Managing Member
`
` 2005 2011
`
` Independent Security Evaulators, Founder & President
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`2/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 2
`
`
`
`Avi Rubin’s Vita
`
`3/7/2018
` 1997 2002
`
` AT&T Labs Research, Secure Systems Research Department
`
` 1994 1996
`
` Bellcore, Cryptography and Network Security Research Group
`
` Summer, 1990
`
` Great Lakes Software Co., Programmer, Howell, MI
`
` Summer, 1989
`
` IBM, Programmer, Meyers Corners Lab, Poughkeepsie, NY
`
`Books
`
` Aviel D. Rubin, Brave New Ballot, Random House, (September, 2006).
`
` William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin, Firewalls and Internet
`Security: Repelling the Wily Hacker (2e), Addison Wesley Publishing Company, Inc.,
`(February, 2003).
`
` Chapter 4, Communications Policy and Information Technology: Promises, Problems,
`Prospects, MIT Press, Lorrie Faith Cranor and Shane Mitchell Greenstein, eds., (2002).
`
` Aviel D. Rubin, Whitehat Security Arsenal, Addison Wesley Publishing Company, Inc.,
`(June, 2001).
`
` Chapter 8, Publius and Chapter 14, Trust in Distributed Systems,
`
`Marc Waldman, Lorrie Faith Cranor, and Aviel D. Rubin, PeertoPeer, O'Reilly &
`Associates, Inc., (February, 2001).
`
` Aviel D. Rubin, Daniel Geer, Marcus J. Ranum, Web Security Sourcebook, John Wiley &
`Sons, Inc , (June, 1997).
`
` Ph.D. dissertation: Nonmonotonic Cryptographic Protocols (ps.gz, pdf), University of
`Michigan, Ann Arbor (April, 1994).
`Refereed Journal Publications
`
` David Kotz, Kevin Fu, Carl Gunter, Avi Rubin, Security for Mobile and Cloud Frontiers in
`Healthcare, Communications of the ACM (July, 2015).
`
` Ayo Akinyele, Christina Garman, Matthew D. Green, Ian Miers, Matthew Pagano, Aviel D.
`Rubin, Michael Rushanan, Charm: A Framework for Rapidly Prototyping Cryptosystems,
`Journal of Cryptographic Engineering (JCEN), (January, 2013).
`
` Ryan Gardner, Sujata Garera, and Aviel D. Rubin, Detecting Code Alteration by Creating a
`Temporary Memory Bottleneck, IEEE Transactions on Information Forensics and Security:
`Special Issue on Electronic Voting, (December, 2009).
`
` Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Avi Rubin, Anonymity in
`Wireless Broadcast Networks, International Journal of Network Security (IJNS), (January,
`2008).
`
` Stephen Bono, Aviel Rubin, Adam Stubblefield, and Matthew Green, Security Through
`Legality, Communications of the ACM (June, 2006).
`
` Adam Stubblefield, Dan S. Wallach, and Aviel D. Rubin, Managing the Performance Impact
`of Web Security, Electronic Commerce Research Journal, February, 2005.
`
` David Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner, Analyzing Internet Voting
`Security, Communications of the ACM (October, 2004).
`
` Simon Byers, Aviel D. Rubin, and David Kormann, Defending Against an Internetbased
`Attack on the Physical World, ACM Transactions on Internet Technology (TOIT), August,
`2004.
`
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`3/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 3
`
`
`
`3/7/2018
`
`Avi Rubin’s Vita
` Adam Stubblefield, John Ioannidis, and Aviel D. Rubin, A Key Recovery Attack on the
`802.11b Wired Equivalent Privacy Protocol (WEP) (pdf), ACM Transactions on Information
`and System Security, May, 2004.
`
` Aviel D. Rubin, Security Considerations for Remote Electronic Voting, Communications of
`the ACM (December, 2002).
`
` Marc Waldman, Aviel D. Rubin, and Lorrie F. Cranor, The Architecture of Robust Publishing
`Systems, ACM Transactions on Internet Technology (TOIT), (November, 2001).
`
` David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol,
`Computer Networks, (July, 2000).
`
` Christian Gilmore, David P. Kormann, and Aviel D. Rubin, Secure Remote Access to an
`Internal Web Server, IEEE Network, (November, 1999).
`
` Fabian Monrose and Aviel D. Rubin, Keystroke Dynamics as a Biometric for Authentication,
`(pdf) Future Generation Computer Systems, (March, 2000).
`
` Michael K. Reiter and Aviel D. Rubin, Anonymity Loves Company: Anonymous Web
`Transactions with Crowds (ps.gz, pdf) Communications of the ACM (February, 1999).
`
` Aviel D. Rubin and Daniel E. Geer, Jr., Mobile Code Security (ps.gz, pdf), IEEE Internet
`Computing (November/December, 1998).
`
` Aviel D. Rubin and Daniel E. Geer, Jr., A Survey of Web Security, IEEE Computer,
`(September, 1998).
`
` Michael K. Reiter and Aviel D. Rubin, Crowds: Anonymity for Web Transactions (ps.gz,
`pdf), ACM Transactions on Information and System Security, (June, 1998).
`
` Aviel D. Rubin, An Experience Teaching a Graduate Course in Cryptography (ps, pdf),
`Cryptologia (April, 1997).
`
` Aviel D. Rubin, Extending NCP for public Key Protocols, Mobile Networks and Applications
`(ACM/Balzer), 2(3) (April, 1997).
`
` Aviel D. Rubin, Independent OneTime Passwords, (ps.gz, pdf) USENIX Journal of
`Computer Systems (February, 1996).
`
` Aviel D. Rubin, Secure Distribution of Documents in a Hostile Environment, Computer
`Communications (June, 1995).
`Refereed Conference Publications
`
` Paul D. Martin, David Russel, Malek Ben Salem, Stephen Checkoway, Aviel D. Rubin,
`Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems, Proc.
`ACM/IEEE International Conference on InternetofThings Design and Implementation,
`(April, 2018).
`
` Gabriel Kaptchuk, Matthew D. Green and Aviel D. Rubin, Outsourcing Medical Dataset
`Analysis: A Possible Solution, Financial Cryptography Conference, (April, 2017).
`
` Michael Rushanan, David Russell and Aviel D. Rubin, MalloryWorker: Stealthy
`Computation and Covert Channels using Web Workers, Proceedings of the 12th
`International Workshop on Security and Trust Management, (September, 2016).
`
` Paul Martin, Michael Rushanan, Thomas Tantillo, Christoph Lehmann and Aviel Rubin,
`Applications of Secure Location Sensing in Healthcare, Proceedings of the 7th ACM
`Conference on Bioinformatics, Computational Biology, and Health Informatics, (October,
`2016).
`
` Gabriel Kaptchuk and Aviel D. Rubin, A Practical Implementation of a MultiDevice Split
`Application for Protecting Online Poker , Proceedings of the 15th Annual Security
`Conference, (March, 2016).
`
`
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`4/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 4
`
`
`
`3/7/2018
`
`Avi Rubin’s Vita
` Aviel D. Rubin, Taking TwoFactor to the Next Level: Protecting Online Poker, Banking,
`Healthcare and Other Applications, Proceedings of the 2014 Annual Computer Security
`Applications Conference, Invited Keynote Essay, (December, 2014).
`
` Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson, Security and
`Privacy in Implantable Medical Devices and Body Area Networks, IEEE Symposium on
`Security and Privacy SoK Track (May, 2014).
`
` Christina Garman, Matthew Green, Ian Miers, Aviel D. Rubin, Rational Zero: Economic
`Security for Zerocoin with Everlasting Anonymity, 1st Workshop on Bitcoin Research
`(March, 2014).
`
` Paul Martin, Avi Rubin and Rafae Bhatti, Enforcing Minimum Necessary Access in
`Healthcare Through Integrated Audit and Access Control, Health Informatics Symposium at
`the ACM Conference on Bioinformatics, Computational Biology, and Biomedical
`Informatics, (September, 2013).
`
` Ian M. Miers, Christina Garman, Matthew D. Green, Aviel D. Rubin, Zerocoin: Anonymous
`Distributed eCash from Bitcoin, Proc. IEEE Symposium on Security and Privacy (May,
`2013).
`
` Ian M. Miers, Matthew D. Green, Christoph U. Lehmann, Aviel D. Rubin, VisàVis
`Cryptography: Private and Trustworthy InPerson Certifications, In Proceedings of the 3rd
`USENIX/HealthSec Workshop, (August, 2012).
`
` Joseph A. Akinyele, Matthew W. Pagano, Matthew D. Green, Christoph U. Lehmann,
`Zachary N. J. Peterson and Aviel D. Rubin, Securing Electronic Medical Records Using
`AttributeBased Encryption On Mobile Devices, ACM CCS Workshop on Security and
`Privacy in Smartphones and Mobile Devices, (October, 2011).
`
` Matthew D. Green, Aviel D. Rubin, A Research Roadmap for Healthcare IT Security
`inspired by the PCAST Health Information Technology Report 4 page Extended Abstract,
`In Proceedings of the 2nd USENIX/HealthSec Workshop, (August, 2011).
`
` Ryan Gardner, Sujata Garera, Aviel D. Rubin, Designing for Audit: A Voting Machine with a
`Tiny TCB, Financial Cryptography Conference, (January , 2010).
`
` Ryan Gardner, Sujata Garera, Matthew W. Pagano, Matthew D. Green, Aviel D. Rubin,
`Securing Medical Records on Smart Phones, Workshop on Security and Privacy in Medical
`and HomeCare Systems, (November, 2009).
`
` Ryan Gardner, Sujata Garera, Aviel D. Rubin, Coercion Resistant Endtoend Voting,
`Financial Cryptography Conference, (February, 2009).
`
` Ryan Gardner, Sujata Garera, Anand Rajan, Carols Rozas, Aviel D. Rubin, Manoj Sastry,
`Protecting Patient Records from Unwarranted Access, Future of Trust in Computing, (July,
`2008).
`
` Sujata Garera, Niels Provos, Monica Chew and Aviel D. Rubin, A Framework for Detection
`and Measurement of Phishing Attacks, 5th ACM Workshop on Recurring Malcode (WORM
`2007), (November, 2007).
`
` Sujata Garera and Aviel D. Rubin, An Independent Audit Framework for Software
`Dependent Voting Systems, 14th ACM Conference on Computer and Communications
`Security, (November, 2007).
`
` Ryan Gardner, Sujata Garera, and Aviel D. Rubin, On the Difficulty of Validating Voting
`Machine Software with Software, In Proceedings of the 2nd USENIX/ACCURATE
`Electronic Voting Technology Workshop (EVT '07), (August, 2007).
`
` Sujata Doshi, Fabian Monrose, and Aviel D. Rubin, Efficient Memory Bound Puzzles using
`Pattern Databases, 4th International Conference on Applied Cryptography and Network
`Security (ACNS'06), (June, 2006).
`
`
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`5/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 5
`
`
`
`3/7/2018
`
`Avi Rubin’s Vita
` Sophie Qiu, Patrick McDaniel, Fabian Monrose, and Avi Rubin, Characterizing Address
`Use Structure and Stability of Origin Advertisement in Interdomain Routing, 11th IEEE
`Symposium on Computers and Communications, (June 2006).
`
` Zachary Peterson, Randal Burns, Joseph Herring, Adam Stubblefield, and Aviel D. Rubin,
`Secure Deletion for a Versioning Filesystem , Proc. USENIX Conference on File and
`Storage Technologies (FAST '05), (December, 2005).
`
` Stephen C. Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael
`Szydlo, Security Analysis of a CryptographicallyEnabled RFID Device 14th USENIX
`Security Symposium, (August, 2005).
`
` Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, Analysis of an
`Electronic Voting System, Proc. IEEE Symposium on Security and Privacy (May, 2004).
`
` Nathanael Paul, David Evans, Aviel D. Rubin and Dan Wallach, Authentication for Remote
`Voting, ACM Workshop on HumanComputer Interaction and Security Systems (April,
`2003).
`
` Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, and Aviel Rubin, Protocols
`for Anonymity in Wireless Networks, Proc. 11th International Workshop on Security
`Protocols (April, 2003).
`
` Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel, Aviel
`Rubin, Working Around BGP: An Incremental Approach to Improving Security and
`Accuracy of Interdomain Routing , Proc. ISOC Symposium on Network and Distributed
`System Security (February, 2003).
`
` Simon Byers, Aviel D. Rubin, David Kormann, Defending Against an Internetbased Attack
`on the Physical World (pdf), ACM Workshop on Privacy in the Electronic Society
`(November, 2002).
`
` Adam Stubblefield, John Ioannidis, and Aviel D. Rubin, Using the Fluhrer, Mantin, and
`Shamir Attack to Break WEP, Proc. ISOC Symposium on Network and Distributed System
`Security (February, 2002).
`
` Aviel D. Rubin, Security Considerations for Remote Electronic Voting, 29th Research
`Conference on Communication, Information and Internet Policy (TPRC2001), (October,
`2001).
`
` Aviel D. Rubin and Rebecca N. Wright, Offline generation of limiteduse credit card
`numbers, (ps.gz, pdf) Financial Cryptography Conference, (February, 2001).
`
` Marc Waldman, Aviel D. Rubin, and Lorrie F. Cranor, Publius, A robust, tamperevident and
`censorshipresistant web publishing system, 9th USENIX Security Symposium, (August,
`2000).
`
` David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol, 9th
`International World Wide Web Conference, (May, 2000).
`
` Patrick McDaniel and Aviel D. Rubin, A Response to "Can we Eliminate Certificate
`Revocation Lists?", (ps.gz, pdf), Financial Cryptography Conference, (February, 2000).
`
` William A. Aiello, Aviel D. Rubin, and Martin J. Strauss, Using smartcards to secure a
`personalized gambling device (ps.gz, pdf), 6th ACM Conference on Computer and
`Communications Security, (November, 1999).
`
` Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin, The
`Design and Analysis of Graphical Passwords (ps.gz, pdf) 8th USENIX Security
`Symposium, (August, 1999).
`
` Christian Gilmore, David Kormann, and Aviel D. Rubin, Secure Remote Access to an
`Internal Web Server, (ps.gz, pdf), Proc. ISOC Symposium on Network and Distributed
`System Security (February, 1999).
`
`
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`6/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 6
`
`
`
`3/7/2018
`
`Avi Rubin’s Vita
` Fabian Monrose, Peter Wykoff, and Aviel D. Rubin, Distributed Execution with Remote
`Audit (ps.gz, pdf), Proc. ISOC Symposium on Network and Distributed System Security
`(February, 1999).
`
` Dahlia Malkhi, Michael K. Reiter and Aviel D. Rubin, Secure Execution of Java Applets
`using a Remote Playground (ps, pdf) Proc. IEEE Symposium on Security and Privacy
`(May, 1998).
`
` Aviel D. Rubin, Dan Boneh, and Kevin Fu, Revocation of Unread Email in an Untrusted
`Network (ps.gz, pdf), Second Australasian Conference on Information Security and Privacy
`(July, 1997).
`
` Fabian Monrose and Aviel D. Rubin, Authentication via Keystroke Dynamics (ps, pdf), 4th
`ACM Conference on Computer and Communications Security (April, 1997).
`
` David M. Martin, Siviramakrishnan Rajagopalan, and Aviel D. Rubin, Blocking Java Applets
`at the Firewall (ps, pdf), Proc. ISOC Symposium on Network and Distributed System
`Security (February, 1997).
`
` Trent Jaeger, Aviel D. Rubin and Atul Prakash, A System Architecture for Flexible Control
`of Downloaded Executable Content, 5th International Workshop on ObjectOrientation in
`Operating Systems (October, 1996).
`
` Trent Jaeger, Aviel D. Rubin and Atul Prakash, Building Systems that Flexibly Control
`Downloaded Executable Content, Proc. 6th USENIX Security Symposium (July, 1996).
`
` Victor Shoup and Aviel D. Rubin, Session Key Distribution Using Smart Cards, (ps, pdf),
`Proc. of Eurocrypt '96 (May, 1996).
`
` Trent Jaeger & Aviel D. Rubin, Preserving Integrity in Remote File Location and Retrieval,
`Proc. ISOC Symposium on Network and Distributed System Security (February, 1996).
`
` Aviel D. Rubin, Extending NCP for Public Key Protocols, Proc. IEEE 4th International
`Conference on Computer Communications and Networks (September, 1995).
`
` Aviel D. Rubin, PseudoRandom Functions for OneTime Passwords, Proc. 5th USENIX
`UNIX Security Symposium (June, 1995).
`
` Aviel D. Rubin, Trusted Distribution of Software Over the Internet, Proc. ISOC Symposium
`on Network and Distributed System Security (February, 1995).
`
` Aviel D. Rubin & Peter Honeyman, Nonmonotonic Cryptographic Protocols, Proc. IEEE
`Computer Security Foundations Workshop VII (June, 1994).
`
` Aviel D. Rubin & Peter Honeyman, Long Running Jobs in an Authenticated Environment,
`Proc. 4th USENIX UNIX Security Symposium (October, 1993).
`Patents
`
` Aviel D. Rubin, "Broadband Certified Mail", US Patent Numbers 6,990,581, (January 24,
`2006) and 9,876,769, (January 23, 2018).
`
` Aviel D. Rubin, Utilization of multiple devices to secure online transactions, US Patent
`Number 9,064,376, (June 23, 2015).
`
` Steven M. Bellovin, Thomas J. Killian, Bruce LaRose, Aviel D. Rubin, Norman L. Schryer,
`Method and apparatus for connection to virtual private networks for secure transactions,
`US Patent Numbers 8,239,531, (August 7, 2012) and 8,676,916 (March 18, 2014).
`
` Christian A. Gilmore, David P. Kormann, and Aviel D. Rubin, Method and apparatus for
`secure remote access to an internal web server, US Patent Number 7,334,126, (February
`19, 2008).
`
` Aviel D. Rubin, "Method for secure remote backup", US Patent Number 7,222,233, (May
`22, 2007).
`
` Frederick Douglis, Michael Rabinovich, Aviel D. Rubin, and Oliver Spatscheck, "Method for
`content distribution in a network supporting a security protocol", US Patent Number
`
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`7/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 7
`
`
`
`3/7/2018
`
`Avi Rubin’s Vita
`
`7,149,803, (December 12, 2006).
`
` William A. Aiello, Steven M. Bellovin, Charles Robert Kalmanek, Jr., William T Marshal, and
`Aviel D. Rubin, "Method and apparatus for enhanced security in a broadband telephony
`network", US Patent Number 7,035,410, (April 25, 2006).
`
` William A. Aiello, Aviel D. Rubin, and Martin J. Strauss, "Using smartcards to enable
`probabilistic transaction on an untrusted device", US Patent Number 6,496,808,
`(December 17, 2002).
`
` Aviel D. Rubin and Victor J. Shoup, "Session Key Distribution Using Smart Cards", US
`Patent Number 5,809,140, (September 15, 1998).
`
` Aviel D. Rubin, "Method for the Secure Distribution of Electronic Files in a Distributed
`Environment", US Patent Number 5,638,446, (June 10, 1997).
`Professional Activities
`
` Board of Directors
`
` Director, Maryland Israel Development Center (MIDC), (2013 present).
`
` Director, USENIX Organization, elected by popular vote (2000 2004).
`
`
` Editorial and Committees
`
` Associate Editor: IEEE Transactions on Information Forensics and Security (2009
`2011).
`
` Associate Editor: Communications of the ACM (CACM), 2009 present.
`
` Guest CoEditor: IEEE Transactions on Information Forensics and Security: Special
`Issue on Electronic Voting, December 1, 2009.
`
` Guest CoEditor: IEEE Security & Privacy Magazine, Special Issue on Electronic
`Voting, October/November, 2007.
`
` Associate Editor: IEEE Transactions on Software Engineering (20052006).
`
` Editorial and Advisory Board: International Journal of Information and Computer
`Security (IJICS) (20042006).
`
` Guest CoEditor: IEEE Computer Networks, Special Issue on Web Security,
`January, 2005.
`
` Editorial Board: Journal of Privacy Technology (20042006).
`
` Guest CoEditor: IEEE Security & Privacy Magazine, Special Issue on Electronic
`Voting Security, January/February, 2004.
`
` Member: Security Peer Review Group (SPRG) of the Federal Voting Assistance
`Program's (FVAP) Secure Electronic Registration and Voting Experiment (SERVE)
`Project, 20032004.
`
` Member: DARPA Information Science And Technology Study Group (20032006).
`
` Associate Editor: IEEE Security & Privacy Magazine (2003present).
`
` Guest Editor: Communications of the ACM, Special Issue on Wireless Networking
`Security, May, 2003.
`
` Associate Editor: ACM Transactions on Internet Technology (20022005).
`
` Executive Committee Member: DIMACS Workshop Series with Special Focus on
`Network Security (20022004).
`
` Advisory Board Member: Information Security and Cryptography Book Series,
`Springer, 20012006.
`
` Member: Steering Group, ISOC Symposium on Network and Distributed System
`Security, 20012004.
`
` Member: Government Infosec Science and Technology Study Group on malicious
`code, 1999 2000.
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`8/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 8
`
`
`
`3/7/2018
`
`
`
`Avi Rubin’s Vita
` Member: AT&T Internet Intellectual Property Review Team, 1999 2001.
`
` Associate Editor: Electronic Commerce Research Journal, Baltzer Science
`Publishers, 1999 2002.
`
` CoEditor: Electronic Newsletter of the IEEE Technical Committee on Security &
`Privacy, with Paul Syverson, 1998.
`
` Editorial Board: Bellcore Security Update Newsletter, 19951996.
`
`
` Conference Committees
`
` Program Committee member: Financial Cryptography '15 Barbados, February, 2015.
`
` Program Committee member: USENIX HealthTech Workshop on Health Information
`Technologies (HealthTech ’15), August 11, 2015.
`
` Program Cochair: (w/Eugene Vasserman) USENIX HealthTech Workshop on
`Health Information Technologies (HealthTech ’14), August 19, 2014.
`
` Program Committee member: 2nd USENIX Workshop on Health Security and Privacy
`(HealthSec '11), August 9, 2011.
`
` Program Cochair: (w/Kevin Fu & Yoshi Kohno), 1st USENIX Workshop on Health
`Security and Privacy (HealthSec '10), August 10, 2010.
`
` Program Committee member: First Security and Privacy in Medical and HomeCare
`Systems Workshop (SPIMACS), Chicago, IL, November 13, 2009.
`
` Invited Talks CoCoordinator: 17th USENIX Security Symposium, San Jose, CA, July
`28 August 1, 2008.
`
` Program Cochair: (w/Patrick McDaniel): IEEE Symposium on Security and Privacy,
`Oakland, California, May 1822, 2008.
`
` Program Cochair: (w/Giovani Di Crescenzo): Financial Cryptography '06 Anguilla
`BWI, February, 2006.
`
` Program Committee member: IEEE Symposium on Security and Privacy, Oakland,
`California, May 912, 2004.
`
` Program Committee member: Financial Cryptography '04 Key West, Florida,
`February 912, 2004.
`
` Program Committee member: 2nd ACM SIGSAC Workshop on Privacy in the
`Electronic Society Washington D.C., October 30, 2003.
`
` Program Committee member: 10th ACM Conference on Computer and
`Communications Security, Washington D.C., October 2730, 2003.
`
` Program Committee member: 8th European Symposium on Research in Computer
`Science (ESORICS), Norway, October 1315, 2002.
`
` Program Vice Chair: Security and Privacy Track, The Twelfth International World
`Wide Web Conference, Budapest, Hungary, May 2024, 2003.
`
` Program Committee member: IEEE Symposium on Security and Privacy, Oakland,
`California, May 1114, 2003.
`
` Program Committee member: Workshop on Security and Assurance in Ad hoc
`Networks, Orlando, FL, January 28, 2003.
`
` Program Committee member: 4th International Conference on Information and
`Communications Security (ICICS), Kent Ridge Digital Labs (KRDL), Singapore
`December 912, 2002.
`
` Program Committee member: ACM SIGSAC Workshop on Privacy in the Electronic
`Society Washington D.C., November 21, 2002.
`
` Program Committee member: 9th ACM Conference on Computer and
`Communications Security, Washington D.C., November 1721, 2002.
`
`
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`9/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 9
`
`
`
`3/7/2018
`
`Avi Rubin’s Vita
` Program Committee member: 5th International Conference on Electronic Commerce
`Research (ICECR5), Montreal, Canada, October 2327, 2002.
`
` Program Committee member: 2nd Symposium on Requirements Engineering for
`Information Security (SREIS), Raleigh, North Carolina, Oct 1415, 2002.
`
` Program Committee member: 7th European Symposium on Research in Computer
`Science (ESORICS), Zurich, Switzerland, October 1416, 2002.
`
` Program Committee member: 11th USENIX Security Symposium, San Francisco, Ca,
`August 59, 2002.
`
` Program Committee member: International Workshop on Global and PeertoPeer
`Computing at IEEE International Symposium on Cluster Computing and the Grid
`(CCGrid'2002), Berlin, Germany, May 2124, 2002.
`
` Program Committee member: 11th International World Wide Web Conference
`Honolulu, Hawaii, May 711, 2002.
`
` Program Committee member: 2nd Workshop on Privacy Enhancing Technologies San
`Francisco, CA, April 1415, 2002.
`
` Program Committee member: The 1st International Workshop on PeertoPeer
`Systems (IPTPS'02) MIT Faculty Club, Cambridge, MA, March 78, 2002.
`
` Program Committee member: The 4th International Conference on
`Telecommunications and Electronic Commerce Dallas, TX, November, 2001.
`
` Program Committee member: 10th USENIX Security Symposium, Washington D.C.,
`August 1317, 2001.
`
` Program Committee member: Financial Cryptography '01 Grand Cayman, Cayman
`Islands, BWI, February, 2001.
`
` Program Cochair: (w/Paul Van Oorschot): ISOC Symposium on Network and
`Distributed System Security, San Diego, CA, February 79, 2001.
`
` Program Committee member: The 3rd International Conference on
`Telecommunications and Electronic Commerce Dallas, TX, November 1619, 2000.
`
` Program Committee member: 9th USENIX Security Symposium, Denver, Colorado,
`August 1417, 2000.
`
` Program Committee member: Workshop on Design Issues in Anonymity and
`Unobservability Berkeley, California, July 2526, 2000.
`
` Program Committee member: Performance and Architecture of Web Servers (PAWS),
`Santa Clara, CA, June 18, 2000.
`
` Program Cochair: (w/Gene Tsudik): ISOC Symposium on Network and Distributed
`System Security, San Diego, CA, February 24, 2000.
`
` Program Committee member: 1999 International Information Security Workshop
`(ISW'99), Kuala Lumpur, Malaysia, November 67, 1999.
`
` Program Committee member: 2nd Int'l. Conference on Telecommunications and
`Electronic Commerce, Nashville, TN, October 68, 1999.
`
` Invited Talks coordinator: 8th USENIX Security Symposium, Washington D.C.,
`August, 1999.
`
` Program Chair: 24th USENIX Annual Technical Conference, Monterey, CA, June 7
`11, 1999.
`
` Program Committee member: 8th International World Wide Web Conference ,
`Toronto, Canada, May 1114, 1999.
`
` Program Committee member: 3rd USENIX workshop on Electronic Commerce ,
`Boston, MA, August 31 September 3, 1998.
`
` Program Committee member: 5th ACM Conference on Computer and
`Communications Security, San Francisco, CA, November 35, 1998.
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`10/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 10
`
`
`
`3/7/2018
`
`Avi Rubin’s Vita
` Program Chair: 7th USENIX Security Symposium, San Antonio, TX, Jan. 2629,
`1998.
`
` Program Committee member: 4th ACM Conference on Computer and
`Communications Security, Zurich, Switzerland, April 24, 1997.
`
` Program Committee member: 6th USENIX Security Symposium, San Jose, CA, July
`2225, 1996.
`
` Program Committee member: ISOC Symposium on Network and Distributed System
`Security, San Diego, CA, February 2223, 1996.
`
`
` Panels
`
` Panelist: Washington Post panel: Hacking Health, Washington DC (June 14, 2016).
`
` Panelist: Financial Cryptography Conference, Security & Privacy, Barbados
`(February 24, 2016).
`
` Panelist: RSA Conference, Social Networks Security Panel, San Francisco, CA (April
`21, 2015).
`
` Panelist: Expert Witness in Mock Trial: FTC Data Security, 63rd American Bar
`Association Section of Antitrust Law Spring Meeting Washington DC, (April 15, 2015).
`
` Panelist: Security in Electronic Medical Records Databases, Medicine 2.0
`Workshop, Haifa, Israel, (April 7, 2011).
`
` Panelist: Security in the Cloud, Workshop on Cloud Security, Israeli Defense Ministry,
`Tel Aviv, Israel, (February 15, 2011).
`
` Panelist: Securing Information Technology in Healthcare (SITH), Security and
`Usability of Electronic Health Records, Dartmouth College, NH, (May 17, 2010).
`
` Panelist: First Security and Privacy in Medical and HomeCare Systems Workshop
`(SPIMACS), Authentication in iHealthcare, Chicago, IL, (November 13, 2009).
`
` Panelist: Computers, Freedom, and Privacy Conference, Internet Voting for
`Overseas Americans, Washington DC, (June 4, 2009).
`
` Panelist: Workshop on Electronic Voting, Electronic Voting: Future Aspirations, Tel
`Aviv, Israel (May 18, 2009).
`
` Panelist: RSA Conference, Exploiting Online Games, San Francisco, CA (April 23,
`2009).
`
` Panelist: American Association for the Advancement of Science, Revisiting the U.S.
`Voting System: A Research Inventory, Technology, Usability, and Security panel,
`Washington DC, (November 27, 2006).
`
` Panelist: California Secretary of State's Voting System Testing Summit, Security
`Panel, Sacramento, CA, (November 2829, 2005).
`
` Panelist: NIST Symposium on Voting System Threats, Configuration and Usability
`Threats, Gaithersburg, MD, (October 7, 2005).
`
` Panelist: Conference of State Supreme Court Chief Justices, Voting Technologies,
`Charleston, SC (August 1, 2005).
`
` Panelist: Workshop on observation of automated elections, The Carter Center,
`Atlanta, GA (March 18, 2005).
`
` Panelist: The Carter Center Venezuela Virtual Panel, (November, 2004).
`
` Panelist: Workshop on Voting, Vote Capture and Vote Counting, Harvard Kennedy
`School of Government, The Technologies of Voting, Cambridge, MA (June 1, 2004).
`
` Panelist: Computer Science and Telecommunications Board of The National
`Academy of Science Workshop on Dependable Software Systems, Case Study:
`Electronic Voting Washington D.C. (April 20, 2004).
`
`
`http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
`
`11/17
`
`IPR2018-00884
`Apple Inc. EX1010 Page 11
`
`
`
`3/7/2018
`
`Avi Rubin’s Vita
` Panelist: USENIX Security 2003, Electronic Voting, Washington D.C. (August 6,
`2003).
`
` Panelist: Democracy Now, 2003, VoterVerifiable Elections: How Do We Get There?,
`Washington D.C. (November 23, 2003).
`
` Panelist: USENIX Security 2003, Electronic Voting, Washington D.C. (August 6,
`2003).
`
` Panelist: IEEE Infocom 2002, Securing Wireless and Mobile Networks Is It
`Possible?, New York City (June 25, 2002).
`
` Participant: 2002 Security Visionary Roundtable: A Roadmap for a Safer Wireless
`World, Washington D.C., (May 57,2002).
`
` Panelist: Computers Freedom and Privacy 2002, Who Goes There? Privacy in
`Identity and Location Services, San Francisco (April 18, 2002).
`
` Panel moderator: Conference on Democracy and the Internet in an