`
`Whitespace Associates
`225 East 57th Street, Suite 19F
`New York, NY 10022
`(917) 207-1892 (cell)
`SteveRichardWhite@gmail.com
`Curriculum Vitae
`
`Professional Experience
`
`2013 -
`Present
`
`Whitespace Associates
`President
`
`• Whitespace Associates specializes in technology consulting.
`Our core strengths are the future of technology, and technical
`expertise in patent strategy and litigation.
`o 2015-2016: Retained by Bartlit Beck Herman
`Palenchar & Scott LLP as an expert technology
`consultant for Amazon.
`o 2014-2015: Retained by Sidley Austin LLP as an
`expert witness for the defense in ContentGuard v.
`Apple. I was deposed and testified at trial.
`o 2013-2014: Retained by Kirkland & Ellis LLP as an
`expert technology consultant for the defense in
`Intertrust v. Apple.
`
`2009 -
`2013
`
`Consultant
`
`• Retained by counsel as an expert technology consultant in a
`confidential patent litigation matter.
`
`2007 -
`2009
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Patent Strategist
`
`• Led a team of domain experts and patent attorneys in the
`evaluation of dozens of patentable ideas, in almost every case
`
`1
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 1
`
`Petitioner Valve - Ex. 1008, Page 1
`
`
`
`
`
`
`
`2006
`
`creating patent applications that greatly generalized the
`original ideas of the inventors. Asked to be a co-author on
`several patent applications because my ideas had so
`significantly changed the patents.
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Corporate Strategist
`
`
`• Led the Research Division software strategy for the 2006
`Technology Outlook, outlining the most important areas of
`technology to IBM in the subsequent years. Predicted
`pervasive virtualization to optimize large systems use and
`management, and the rise of applications that take advantage
`of multiple web services (e.g. maps, friend lists).
`
`1994 -
`2006
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Senior Manager, Massively Distributed Systems
`
`
`
`• Created and led the Research Division effort on Autonomic
`Computing, the goal of which is the dramatic simplification of
`the management of large IT systems by making IT resources
`self-managing. Developed an agent-based architecture in
`which IT resources continually adapt themselves to optimize
`the overall system according to high-level administrative
`goals.
`• Created a long-term research project to examine the
`implications of billions of economically motivated software
`agents interacting as part of a global digital economy. Results
`included the discovery of endemic price wars and other
`undesirable behaviors, which can be mitigated by giving the
`agents the ability to learn from their actions; a prototype
`environment for economic agents that is fundamentally
`decentralized and distributed; and work within the FIPA
`standards organization to standardize agent communications.
`• Turned IBM AntiVirus into a multi-million dollar business,
`doubling revenue every year for several years. IBM AntiVirus
`was licensed to millions of computers worldwide, making it
`one of the most widely licensed IBM products ever.
`• Responsible for IBM AntiVirus R&D management, a peer
`business executive position alongside Marketing and Sales.
`
`2
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 2
`
`Petitioner Valve - Ex. 1008, Page 2
`
`
`
`
`
`
`
`Grew R&D staff to 50 people, including a number of world-
`renowned scientists and technologists.
`• Led technical negotiations to license our anti-virus technology
`to Intel and Symantec, resulting in multi-million dollar deals
`for IBM.
`• Led anti-virus R&D for incorporation of our immune system
`technology into Symantec products, which shipped in 4Q
`2000. The immune system is a completely automated
`response to new viruses, capable of deriving and distributing a
`cure for a new virus in a matter of minutes after its first
`appearance anywhere in the world. This is all done
`automatically and is both faster and safer than the
`corresponding manual processes. Our immune system
`technology became Symantec’s corporate direction.
`
`1988 -
`1994
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Manager, Distributed Security Systems
`
`• Performed the first research into the epidemiology of
`computer viruses, predicting that the problem would become
`much worse as the world moved onto the Internet.
`• Led the development of anti-virus technology designed to
`meet the growing threat, including a unique immune system
`for the Internet.
`• Created the IBM AntiVirus product line on Windows,
`Netware, Lotus Notes, DOS and OS/2, and made it into an
`entrepreneurial business inside IBM.
`
`
`
`1984 -
`1988
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Research Staff Member
`
`
`
`•
`
`Invented architecture for physically secure cryptographic
`coprocessors and applied it to protecting rights to use digital
`media.
`• Created the organizing framework for NIST’s FIPS 140-1
`standard for the physical security of cryptographic systems.
`• Led the development of successful prototypes based on this
`architecture, resulting in the Integrated Cryptographic Feature
`
`3
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 3
`
`Petitioner Valve - Ex. 1008, Page 3
`
`
`
`
`
`
`
`for IBM System 390 and the IBM 4758 Cryptographic
`Coprocessor, the first systems rated at Security Level 4 (the
`highest) of the FIPS 140-1 standard.
`
`1982 -
`1984
`
`IBM Watson Research Center,
`Yorktown Heights, NY
`Postdoctoral Fellow
`
`• Created a physics-based analysis of the simulated annealing
`optimization algorithm, providing the first method for
`adapting the algorithm to a wide range of problems.
`
`
`
`Education
`
`
`1982 University of California, San Diego, CA
`Ph.D. Theoretical Condensed Matter Physics
`
`• Thesis: “Electronic Structure of Semiconductor
`Heterostructures”
`• Advisor: Lu J. Sham
`
`
`
`
`
`
`
`Awards
`
`2007 Research Accomplishment for making autonomic computing into a
`recognized academic discipline.
`
`2006 Elected to the Technical Council, the governing body of the IBM
`Academy of Technology.
`
`1996
`
`IBM Corporate Technical Award for IBM AntiVirus Technology and
`System Design. This is the highest technical award given in IBM and
`is given each year only to a handful of people.
`
`4
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 4
`
`Petitioner Valve - Ex. 1008, Page 4
`
`
`
`
`
`
`
`1996 Elected a member of the IBM Academy of Technology, an elite group
`that advises senior executives on technology issues.
`
`1995
`
`1987
`
`1986
`
`IBM Outstanding Technical Achievement Award for IBM AntiVirus
`Products.
`
`IBM Outstanding Technical Achievement Award for Enhancements to
`Simulated Annealing.
`
`IBM Outstanding Innovation Award for ABYSS – A Basic Yorktown
`Security System.
`
`
`
`Media Highlights
`
`Coverage of my work, along with interviews, has appeared regularly in the
`major media: Forbes, NBC, ABC, CNBC, CNNfn, Bloomberg TV, NPR,
`Wall Street Journal, New York Times, Washington Post, San Jose Mercury-
`News, Times (London), Financial Times (London), Los Angeles Times,
`Boston Globe, Philadelphia Inquirer, Atlanta Journal-Constitution, Nikkei
`Shinbun (Tokyo) and various Web sites. Other selected highlights include:
`
`• Time Magazine (August, 2000) “The New Hot Zone,” pp. 30-37.
`And (Nov. 11, 1996) “The Next Big Thing: Curing Digital Disease,”
`pp. TD 49, Two Cover Articles.
`• Science News (July 31, 1999) “Do Computers Need Immune
`Systems?” pp. 76-78. Cover Article.
`• Atlantic Monthly (April 1999) “The Virus Wars,” pp. 32-37. Cover
`Article.
`• US News & World Report (April 12, 1999) “Why Melissa Is So
`Scary,” pp. 34-36.
`• New Scientist (24 May 1997) “The Internet Strikes Back,” pp. 35-
`37. Cover Article.
`
`Patents
`
`The following is a list of my issued patents and pending patent applications.
`
`
`
`5
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 5
`
`Petitioner Valve - Ex. 1008, Page 5
`
`
`
`
`
`
`
`
`
`U.S. Patent 9058438 (6/16/2015): “Application-requirement based
`configuration designer for distributed computing systems”
`
`U.S. Patent 8458694 (6/4/2013): “Hypervisor with cloning-awareness
`notifications”
`
`U.S. Patent 8434077 (4/30/2013): “Upgrading virtual resources”
`
`U.S. Patent 8407439 (3/26/2013): “Discovering and identifying
`manageable information technology resources”
`
`U.S. Patent 8392567 (3/5/2013): “Discovering and identifying manageable
`information technology resources”
`
`U.S. Patent 7996353 (8/9/2011): “Policy-based management system with
`automatic policy selection and creation capabilities by using singular value
`decomposition technique”
`
`U.S. Patent 7987461 (7/26/2011): “Automated design for deployment of a
`distributed application using constraint propagation”
`
`U.S. Patent 7928907 (4/19/2011): “Method for mapping machine rooms and
`locating machines within machine rooms”
`
`U.S. Patent 7861300 (12/28/2010): “Method and apparatus for
`determination of the non-replicative behavior of a malicious program”
`
`U.S. Patent 7515105 (4/7/2009): “Method for mapping machine rooms and
`locating machines within machine rooms”
`
`U.S. Patent 7487543 (2/3/2009): “Method and apparatus for the automatic
`determination of potentially worm-like behavior of a program”
`
`Chinese Patent CN 1318932 C (5/30/2007): “Method and Apparatus for the
`Automatic Determination of Potentially Worm-Like Behavior”
`
`U.S. Patent 7216343 (5/8/2007): “Method and apparatus for automatic
`updating and testing of software”
`
`U.S. Patent 7203662 (4/10/2007): “Apparatus, system and method for
`automatically making operational selling decisions”
`
`6
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 6
`
`Petitioner Valve - Ex. 1008, Page 6
`
`
`
`
`
`
`
`U.S. Patent 7117182 (10/3/2006): “Method for disaggregating customer data
`in online transactions to preserve privacy”
`
`U.S. Patent 7103913 (9/5/2006): “Method and apparatus for determination
`of the non-replicative behavior of a malicious program”
`
`U.S. Patent 7069585 (6/27/2006): “Physical key security management
`method and apparatus for information systems”
`
`U.S. Patent Application 20060112286 (5/25/2006): “Method for
`dynamically reprovisioning applications and other server resources in a
`computer center in response to power and heat dissipation requirements”
`
`U.S. Patent 7051277 (5/23/2006): “Automated assistant for organizing
`electronic documents”
`
`U.S. Patent 6900590 (1/24/2006): “Strategic internet persona assumption”
`
`U.S. Patent 6981279 (12/27/2005): “Method and apparatus for replicating
`and analyzing worm programs”
`
`U.S. Patent Application 20050198530 (9/8/2005): “Methods and apparatus
`for adaptive server reprovisioning under security assault”
`
`U.S. Patent 6772346 (8/3/2004): “System and method for managing files in
`a distributed system using filtering”
`
`U.S. Patent Application 20040059704 (3/25/2004): “Self-managing
`computing system”
`
`U.S. Patent 6678822 (1/13/2004): “Method and apparatus for securely
`transporting an information container from a trusted environment to an
`unrestricted environment”
`
`U.S. Patent 6560632 (5/6/2003): “System and method for managing files in
`a distributed system using prioritization”
`
`U.S. Patent Application 20030023499 (1/30/2003): “Apparatus, system and
`method for automatically making operational purchasing decisions”
`
`U.S. Patent Application 20030018551 (1/23/2003): “Method of hosting
`digital businesses”
`
`7
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 7
`
`Petitioner Valve - Ex. 1008, Page 7
`
`
`
`
`
`
`
`U.S. Patent Application 20020111818 (8/15/2002): “Method and apparatus
`for providing independent filtering of e-commerce transactions”
`
`U.S. Patent 6279128 (8/21/2001): “Autonomous system for recognition of
`patterns formed by stored data during computer memory scrubbing”
`
`U.S. Patent 6275937 (8/14/2001): “Collaborative server processing of
`content and meta-information with application to virus checking in a server
`network”
`
`U.S. Patent 05907834 (5/25/1999): “Method and apparatus for detecting a
`presence of a computer virus”
`
`U.S. Patent 05802592 (9/01/1998): “System and method for protecting
`integrity of alterable ROM using digital signatures”
`
`U.S. Patent 05675711 (10/07/1997): “Adaptive statistical regression and
`classification of data strings, with application to the generic detection of
`computer viruses” This patent received an IBM top 5% patent award as
`one of the most valuable patents in IBM’s portfolio.
`
`European Patent EP 0354770 (3/27/1996): “Secure management of keys
`using extended control vectors”
`
`European Patent EP 0356065 (3/20/1996): “Secure management of keys
`using control vectors”
`
`U.S. Patent 05440723 (8/08/1995): “Automatic immune system for
`computers and computer networks” This patent was the focus of a major
`IBM ad campaign, including a full-page ad in the New York Times, in
`which IBM proclaimed five straight years of being first in the number of
`U.S. patents issued. The immune system was chosen as the sole example of
`innovative IBM technology.
`
`U.S. Patent 05442699 (8/15/1995): “Searching for patterns in encrypted
`data”
`
`U.S. Patent 05117457 (5/26/1992): “Tamper resistant packaging for
`information protection in electronic circuitry”
`
`U.S. Patent 05109413 (4/28/1992): “Manipulating rights-to-execute in
`connection with a software copy protection mechanism”
`
`8
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 8
`
`Petitioner Valve - Ex. 1008, Page 8
`
`
`
`
`
`
`
`U.S. Patent 04924515 (5/08/1990): “Secure management of keys using
`extended control vectors”
`
`U.S. Patent 04916738 (4/10/1990): “Remote access terminal security”
`
`U.S. Patent 04903296 (2/20/1990): “Implementing a shared higher level of
`privilege on personal computers for copy protection of software”
`
`U.S. Patent 04817140 (3/28/1989): “Software protection system using a
`single-key cryptosystem, a hardware-based authorization system and a
`secure coprocessor”
`
`U.S. Patent 04644493 (2/17/1987): “Implementing a shared higher level of
`privilege on personal computers for copy protection of software”
`
`U.S. Patent 04577289 (3/18/1986): “Hardware key-on-disk system for copy-
`protecting magnetic storage media”
`
`Presentations and Publications
`
`
`
`•
`
`Jeffrey O. Kephart, Gerald Tesauro, David M. Chess, William E.
`Walsh, Rajarshi Das, Alla Segal, Ian Whalley, Steve R. White. “An
`Architectural Blueprint for Autonomic Computing,” IEEE Internet
`Computing 18(21) (2007).
`• David M. Chess, James E. Hanson, John A. Pershing Jr., Steve R.
`White, “Prospects for Simplifying ITSM-Based Management
`Through Self-Managing Resources,” IBM Systems Journal 46(3)
`(2007), pp. 599-608.
`• Steve R. White, “Biologically-Inspired Design: Getting It Wrong
`and Getting It Right,” Invited Book Chapter in Biologically
`Inspired Cooperative Computing, IFIP International Federation for
`Information Processing Vol. 216, (2006) pp. 21-32.
`• Steve R. White, James E. Hanson, Ian Whalley, David M. Chess,
`Alla Segal, Jeffrey O. Kephart, “Autonomic computing:
`Architectural Approach and Prototype,” Integrated Computer-Aided
`Engineering 13(2) (2006), pp. 173-188.
`Jeff Kephart, Steve White, Edith Stern, “A Research Agenda for
`Business-Driven Information Technology,” HotAC I: Hot Topics in
`Autonomic Computing 40 (2005), pp. 41.
`• Steve Weingart, Steve R. White, “Mind the Gap: Updating FIPS
`140,” IBM Thomas J. Watson Research Center (2005), accessed as
`
`•
`
`9
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 9
`
`Petitioner Valve - Ex. 1008, Page 9
`
`
`
`
`
`
`
`http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-
`3/physec/papers/physecpaper18.pdf (March 2013). This paper
`formed the basis for an update to NIST’s FIPS 140 standard for
`physical security of electronic systems.
`• David M. Chess, Steve R. White, Ian Whalley, and Alla Segal,
`“Designing and Implementing a Prototype Autonomic Computing
`System,” (2005) accessed as
`http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5386561
`(March 2013).
`• Gerald Tesauro, David M Chess, William Walsh, Raja Das, Ian
`Whalley, Jeffrey O. Kephart, Steve R. White, “A Multi-Agent
`Systems Approach to Autonomic Computing,” IJCAI 2004, pp. 464-
`471.
`• David M. Chess, Alla Segal, Ian Whalley, Steve R. White, “Unity:
`Experiences with a Prototype Autonomic Computing System,” in
`Proceedings of the International Conference on Autonomic
`Computing, IEEE (2004), pp. 140-147
`• Steve R. White, James E. Hanson, Ian Whalley, David M. Chess,
`Jeffrey O. Kephart. “An Architectural Approach to Autonomic
`Computing," in Proceedings of the International Conference on
`Autonomic Computing, IEEE (2004) pp. 2-9.
`• Peter G. Capek, David M. Chess, Steve R. White, Alan Fedeli,
`“Merry Christma: an Early Network Worm,” Security & Privacy,
`IEEE 1(5) (2003), pp. 26-34.
`• David M. Chess, Charles C. Palmer, Steve R. White, “Security in an
`Autonomic Computing Environment,” IBM Systems Journal 42(1)
`(2003), pp. 107-118.
`• Steve R. White, “Virus Bulletin 2010: A Retrospective,”
`International Virus Bulletin Conference, Orlando, FL (Oct. 4-6,
`2000). This Invited Keynote Talk projected the virus problem, and
`anti-virus technology, ten years into the future.
`• David M. Chess, Steve R. White, “An Undetectable Computer
`Virus,” International Virus Bulletin Conference, Orlando, FL (Oct.
`4-6, 2000).
`• M.D. Durand, Steve R. White, “Trading Accuracy for Speed in
`Parallel Simulated Annealing with Simultaneous Moves,” Parallel
`Computing 26(1) (2000), pp. 135-150. This paper was the result of
`Durand’s Ph.D. thesis from Columbia University, which I
`supervised informally.
`• Steve R. White, Morton Swimmer, Edward J. Pring, William C.
`Arnold, David M. Chess, John F. Morar, “Anatomy of a
`Commercial-Grade Immune System,” International Virus Bulletin
`Conference, Vancouver, Canada (Sept. 28-30, 1999). This was the
`
`10
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 10
`
`Petitioner Valve - Ex. 1008, Page 10
`
`
`
`
`
`
`
`•
`
`•
`
`first live, public demonstration of the product-ready version of the
`immune system.
`Jeffrey O. Kephart, Gregory B. Sorkin, William C. Arnold, David M.
`Chess, Gerald J. Tesauro, Steve R. White, “Biologically Inspired
`Defenses Against Computer Viruses,” Book Chapter in Machine
`Learning and Data Mining: Methods and Applications, R.S.
`Michalski (ed.), John Wiley & Sons, Ltd., ISBN: 0471971995
`(1998)
`Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R.
`White, “Blueprint for a Computer Immune System,” Book Chapter
`in Artificial Immune Systems and Their Applications by D.
`Dasgupta (ed.), Springer-Verlag, ISBN 3540643907 (1998)
`• Steve R. White, Jeffrey O. Kephart, John Morar, “Active Planet,”
`Demo 98, Palm Springs, CA (Feb. 1-3, 1998). This was one of only
`two Invited Talks and Demos on forward-looking technology. We
`gave a live demonstration of our immune system prototype.
`• Steve R. White, “Open Problems in Computer Virus Research,”
`International Virus Bulletin Conference, Munich, Germany (Oct. 22-
`23, 1998).
`• Steve R. White, Jeffrey O. Kephart, David M. Chess, “Five Great
`Ages of Computer Viruses,” International Virus Prevention
`Conference, Orlando, FL (April 28-29, 1998).
`Jeffrey O. Kephart, James E. Hanson, David W. Levine, Benjamin
`N. Grosof, Jakka Sairamesh, Richard B. Segal, Steve R. White,
`“Dynamics of an Information-Filtering Economy,” Second
`International Workshop on Cooperative Information Agents, Paris,
`France (July 4-7, 1998).
`Jeffrey O. Kephart, James E. Hanson, David W. Levine, Benjamin
`N. Grosof, Jakka Sairamesh, Richard B. Segal, Steve R. White,
`“Emergent Behavior in Information Economies,” International
`Conference on Multi-Agent Systems (ICMAS '98), Paris, France,
`(July 3-8, 1998).
`Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess, Steve R.
`White, “Fighting Computer Viruses,” Scientific American, (Nov.
`1997), pp. 88-93. Invited cover article.
` Steve R. White, David M. Chess, Jeffrey O. Kephart, “Five Great
`Ages of Computer Viruses,” Symposium on the Future of
`Distributed Information Systems, Aspen, CO (June, 1997). Invited
`Talk.
`Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R.
`White, “Blueprint for a Computer Immune System,” International
`Virus Bulletin Conference, San Francisco, CA (Oct. 1997). This was
`the first live, public demonstration of our immune system prototype.
`
`•
`
`•
`
`•
`
`•
`
`•
`
`11
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 11
`
`Petitioner Valve - Ex. 1008, Page 11
`
`
`
`
`
`
`
`•
`
`•
`
`•
`
`• Steve R. White, David M. Chess, Jeffrey O. Kephart, “Five Great
`Ages of Computer Viruses,” International Virus Bulletin
`Conference, San Francisco, CA (Oct. 1997)
`• Steve R. White, David M. Chess, Jeffrey O. Kephart, “Five Great
`Ages of Computer Viruses”, International Virus Prevention
`Conference, Washington DC (1997).
`• Steve R. White, Jeffrey O. Kephart, David M. Chess, “Computer
`Viruses - A Global Perspective,” International Virus Bulletin
`Conference, Boston, MA (1995). Invited Talk.
`Jeffrey O. Kephart, William C. Arnold, David M. Chess, Gerald J.
`Tesauro, Steve R. White, “Biologically Inspired Defenses Against
`Computer Viruses,” International Joint Conference on Artificial
`Intelligence, Montreal, Canada (1995). Invited Talk.
`• Steve R. White, “Computer Viruses - A Global View,” International
`Virus Bulletin Conference, Jersey, UK (1994). Invited Keynote
`Talk.
`• Steve R. White, “Computer Virus Prevalence,” Conference of the
`National Computer Security Association, Washington, D.C. Invited
`Talk.
`• Steve R. White, “Viruses and Anti-Virus Technology: A Vision of
`the Future,” International Virus Bulletin Conference, Amsterdam,
`the Netherlands (1993). Invited Talk.
`• Steve R. White, “Virus Trends in Distributed Environments,”
`Conference of the International Society of Security Auditors, New
`York, NY (1993). Invited Talk.
`Jeffrey O. Kephart, Steve R. White, David M. Chess, “Computer
`Viruses and Epidemiology,” IEEE Spectrum magazine (May 1993)
`pp. 20-26. Cover Article.
`Jeffrey O. Kephart, Steve R. White, “Measuring and Modeling
`Computer Virus Prevalence,” Proceedings IEEE Symposium on
`Research in Security and Privacy, Oakland, CA (1993), pp. 2-15.
`Jeffrey O. Kephart, Steve R. White, “Directed-Graph
`Epidemiological Models of Computer Viruses,” Proceedings, 1991
`IEEE Computer Society Symposium on Research in Security and
`Privacy (May 20-22, 1991).
`• Steve H. Weingart, Steve R. White, William C. Arnold, Glen P.
`Double, “An Evaluation System for the Physical Security of
`Computing Systems,” Proceedings of the Sixth Annual Computer
`Security Applications Conference, (Dec. 3-7 1990) pp. 232-243.
`This paper formed the basis for the leveled evaluation system of the
`original NIST FIPS 140 standard for the physical security of
`electronic systems.
`• Steve R. White, Liam Comerford, “ABYSS: An Architecture for
`
`•
`
`12
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 12
`
`Petitioner Valve - Ex. 1008, Page 12
`
`
`
`
`
`
`
`
`
`Software Protection,” IEEE Transactions on Software Engineering
`16(6), (June 1990), pp. 619-629.
`• Steve R. White, Liam Comerford, “ABYSS: A Trusted Architecture
`for Software Protection,” in Proceedings of the IEEE Computer
`Society Conference on Security and Privacy (1987) pp. 38–51. This
`and subsequent work formed the basis for a Ph.D. from CMU by
`Bennet Yee.
`• Steve R. White, “Concepts of Scale in Simulated Annealing,” AIP
`Conference Proceedings 122 (1984), pp. 261-270.
`
`• S.R. White, G.E. Margues, L.J. Sham, “Effective‐Mass Theory for
`
`Electrons in Heterostructures,” Journal of Vacuum Science and
`Technology 21(2) (July 1982), pp. 544-547.
`• S.R. White, L.J. Sham, “Electronic Properties of Flat-Band
`Semiconductor Heterostructures,” Physical Review Letters 47
`(1981), pp. 879–882.
`
`13
`
`Petitioner Riot Games, Inc. - Ex. 1008, p. 13
`
`Petitioner Valve - Ex. 1008, Page 13
`
`