throbber
DOUG TYGAR
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Personal Information:
`
`Full name: Justin Douglas Tygar
`US Citizen
`
`
`
`
`
`
`Address:
`
`University of California.
`739 Soda Hall #1776
`
`Berkeley, CA 94720-1776
`(510) 643-7855
`
`tygar@berkeley.edu
`
`
`Education:
`
`A.B., 1982
`
`
`
`Ph.D., 1986 Harvard University, Computer Science
`
`
`Thesis: An Integrated Toolkit for Operating System Security
`
`
`Advisor: Michael Rabin
`
`
`NSF Graduate Fellow (1982 – 1985), IBM Graduate Fellow (1985 – 1986)
`
`Academic Appointments:
`
`University of California, Berkeley
`Department of Electrical Engineering and Computer Science
`& School of Information
`1998 – Present
`Professor (tenured, joint appointment)
`
`Carnegie Mellon University
`Computer Science Department
`2000 – 2005
`
`Adjunct Professor
`1992 – 2000
`
`Associate Professor (tenured 1995, on leave 1998 – 2000)
`1986 – 1992
`
`Assistant Professor
`
`Major Awards:
`
`
`NSF Presidential Young Investigator, 1988
`Outstanding Professor Award, Carnegie Magazine, 1989
`Chair, Defense Information Science and Technology Study Group on Security with Privacy
`Member, National Research Council Committee on Information Trustworthiness
`Member, INFOSEC Science and Technology Study Group
`Okawa Foundation Fellow, 2003-4
`Test of Time Award, USENIX Security, 2015
`Wide consulting for both industry and government
`
`
`University of California, Berkeley, Math/Computer Science
`Bell Labs University Relations Student (1981)
`
`Curriculum Vitae (September 2017)
`
`1
`
`Doug Tygar
`
`VISA - EXHIBIT 1003
`
`

`

`
`
`
`
`Major speeches:
`
`Keynote addresses:
`
`PODC (1995), ASIAN-96 (1996), NGITS (1997), VLDB (1998), CRYPTEC (1999),
`CAV (2000), Human Authentication (2001), PDSN (2002), ISM (2005), ISC (2005), ASIACCS (2006),
`Croucher ASI (2004, 2006), ISC (2008), AISEC (2010), ISRCS (2013), SERE (2014), IWSPA (2016)
`
`Invited addresses:
`
`Harvard Graduate School of Arts and Science 100th Anniversary,
`CMU Computer Science Department 25th Anniversary
`More than 260 talks & 20 professional seminars since 1985
`
`External review activities:
`
`Electronic Commerce Program, City University of Hong Kong
`Information Systems Management Program, Singapore Management University
`Information Technology Program, United Arab Emirates University
`Computer Science Program, University of California, Davis
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Curriculum Vitae (September 2017)
`
`Doug Tygar
`
`2
`
`

`

`Publications
`
`
`
`
`Books
`1. Adversarial Machine Learning: Computer Security and Statistical Machine Learning.
`A. Joseph, B. Nelson, B. Rubinstein, J. D. Tygar. Cambridge University Press, 2017. (To
`appear).
`
`2. Computer Security in the 21st Century. Eds. D. Lee, S. Shieh, and J. D. Tygar. Springer,
`March 2005. (This book includes item 12 below as well as a technical introduction by me
`and the other editors.)
`
`3. Waiyādo/Waiyaresu Nettowōku ni Okeru Burōdokyasuto Tsūshin no Sekyuriti
`ワイヤード/ワイヤレスネットワークにおけるブロードキャスト通信のセキュリテ.
`A. Perrig and J. D. Tygar; translated by Fumio Mizoguchi and the the Science University of
`Tokyo Information Media Science Research Group with the assistance of J. D. Tygar.
`Kyoritsu Shuppan, October 2004. (This is a Japanese translation of item 4 which also
`contains new and additional material written by me in Japanese.)
`
`4.
`
`Secure Broadcast Communication in Wired and Wireless Networks. A. Perrig and J. D.
`Tygar. Springer, October 2002. (See also item 3.)
`
`5. Trust in Cyberspace. National Research Council Committee on Information Systems
`Trustworthiness (S. Bellovin, W. E. Boebert, M. Branstad, J. R. Catoe, S. Crocker, C.
`Kaufman, S. Kent, J. Knight, S. McGeady, R. Nelson, A. Schiffman, F. Schneider [ed.], G.
`Spix, and J. D. Tygar). National Academy Press, January 1999.
`
`
`
`Book Chapters (does not incude items listed above)
`6.
`“Classifier evasion: Models and open problems.” B. Nelson, B. Rubinstein, L. Huang, A.
`Joseph, and J. D. Tygar. In Privacy and Security Issues in Data Mining and Machine
`Learning, eds. C. Dimitrakakis, et al. Springer, July 2011, pp. 92-98.
`7. “Misleading learners: Co-opting your spam filter.” B. Nelson, M. Barreno, F. Chi, A. Joseph,
`B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. In Machine Learning in Cyber
`Trust: Security, Privacy, Reliability, eds. J. Tsai and P.Yu. Springer, April 2009, pp. 17-
`51.
`
`8. “Preface.” J. D. Tygar. In 從DIGIart@eTaiwan談互動創意 (Interaction and Creation in
`DIGIart@eTaiwan),ed. S. Hsu. Ylib Publisher, July 2007.
`9. “Case study: Acoustic keyboard emanations.” L. Zhuang, F. Zhou, and J. D. Tygar. In
`Phishing and Countermeasures: Understanding the Increasing Problem of Electronic
`Identity Theft, eds. M. Jakobsson and S. Myers. Wiley-Interscience, December 2006, pp.
`221-240. (This is a popularized version of item 31.)
`
`Curriculum Vitae (September 2017)
`
`3
`
`Doug Tygar
`
`

`

`10.
`
`11.
`
`12.
`
`13.
`
`14.
`
`15.
`
`16.
`
`17.
`
`18.
`
`19.
`
`“Dynamic security skins.” R. Dhamija and J. D. Tygar. In Phishing and
`Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft,
`eds. M. Jakobsson and S. Myers. Wiley-Interscience, December 2006, pp. 339-351. (This is
`a popularized version of item 84.)
`
`
`
`“Why Johnny can’t encrypt: A usability evaluation of PGP 5.0.” A. Whitten and J. D.
`Tygar. In Security and Usability: Designing Secure Systems that People Can Use, eds.
`L. Cranor and G. Simson. O'Reilly, September 2005, pp. 679-702. (An earlier version of this
`paper was published in Proceedings of the 8th USENIX Security Symposium, August
`1999, pp. 169-183. See also item 134.)
`
`“Private matching.” Y. Li, J. D. Tygar, J. Hellerstein. In Computer Security in the 21st
`Century, eds. D. Lee, S. Shieh, and J. D. Tygar. Springer, March 2005, pp. 25-50. (See item
`2.) (An early version of this paper appeared as Intel Research Laboratory Berkeley technical
`report IRB-TR-04-005, February 2004.)
`
`“Digital cash.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction,
`ed. W. Bainbridge. Berkshire Publishing, October 2004, pp. 167-170.
`
`“Spamming.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction,
`ed. W. Bainbridge. Berkshire Publishing, October 2004, pp. 673-675.
`
`“Viruses.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction, ed.
`W. Bainbridge. Berkshire Publishing, October 2004, pp. 788-791.
`
`“Privacy in sensor webs and distributed information systems.” J. D. Tygar. In Software
`Security: Theories and Systems, eds. M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A.
`Yonezawa. Springer, 2003, pp. 84-95.
`
`“Atomicity in electronic commerce.” J. D. Tygar. In Internet Besieged, eds. D. Denning
`and P. Denning. ACM Press and Addison-Wesley, October 1997, pp. 389-405. (An
`expanded earlier version of this paper was published in Proceedings of the Fifteenth
`Annual ACM Symposium on Principles of Distributed Computing, Keynote paper, May
`1996, pp. 8-26; and as Carnegie Mellon University Computer Science technical report CMU-
`CS-96-112, January 1996. See also item 41.)
`
`“Cryptographic postage indicia.” J. D. Tygar, B. Yee, and N. Heintze. In Concurrency and
`Parallelism, Programming, Networking, and Security, eds. J. Jaffar and R. Yap. Springer,
`1996, pp. 378-391. (Preprint also available. Early versions appeared as Carnegie Mellon
`University Computer Science technical reports CMU-CS-96-113, January 1996, UC San
`Diego Computer Science technical report UCSD-TR-CS96-485, and in the 1996 Securicom
`Proceedings, Paris, June 1996. See also item 136.)
`
`“Dyad: A system for using physically secure coprocessors.” J. D. Tygar and B. Yee. In
`Technological Strategies for the Protection of Intellectual Property in the Networked
`Multimedia Environment. Interactive Multimedia Association, 1994, pp. 121-152. (An
`early version appeared as Carnegie Mellon University Computer Science technical report
`CMU-CS-91-140R, May 1991.)
`
`20.
`
`“A system for self-securing programs.” J. D. Tygar and B. Yee. In Carnegie Mellon
`Computer Science: A 25-Year Commemorative, ed. R. Rashid. ACM Press and Addison-
`4
`Curriculum Vitae (September 2017)
`Doug Tygar
`
`

`

`21.
`
`22.
`
`23.
`
`24.
`
`
`Wesley, 1991, pp. 163-197. (Note: The first printing of this volume had incorrect text due to
`a production error.)
`
`“Implementing capabilities without a trusted kernel.” M. Herlihy and J. D. Tygar. In
`Dependable Computing for Critical Applications, eds. A. Avizienis and J. Laprie.
`Springer, January 1991, pp. 283-300. (Note: An early version appeared in the (IFIP)
`Proceedings of the International Working Conference on Dependable Computing for
`Critical Applications, August 1989.)
`“Strongbox.” J. D. Tygar and B. Yee. In Camelot and Avalon: A Distributed Transaction
`Facility, eds. J. Eppinger, L. Mummert, and A. Spector. Morgan-Kaufmann, February 1991,
`pp. 381-400.
`
`“ITOSS: An Integrated Toolkit for Operating System Security.” M. Rabin and J. D. Tygar.
` In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek. Springer, June 1989,
`pp. 2-15. (Preprint also available.) (Note: Earlier, longer versions appeared as Harvard
`University Aiken Computation Laboratory technical report TR-05-87R and my Ph.D.
`dissertation.)
`
`“Formal semantics for visual specification of security.” M. Maimone, J. D. Tygar, and J.
`Wing. In Visual Languages and Visual Programming, ed. S. K. Chang. Plenum, 1990,
`pp. 97-116. (An early version was published in Proceedings of the 1988 IEEE Workshop
`on Visual Programming, pp. 45-51, and as Carnegie Mellon University Computer Science
`technical report CMU-CS-88-173r, December 1988.)
`
`
`
`Journal Articles (does not include items listed above)
`“Organisational Culture, Procedural Countermeasures, and Employee Security Behaviour: A
`25.
`Qualitative Study. L. Connolly, M. Lang, J. Gathegi, J. D. Tygar. Information & Computer
`Security. 25:2, April 2017, pp. 118-136.
`
`26.
`
`“Machine Learning Methods for Computer Security.” A. Joseph, P. Laskov, F. Roli, J. D.
`Tygar, B. Nelson. Dagstuhl Manifestos 3:1, December 2013, pp. 1-30.
`
`27. “A low-bandwidth camera sensor platform with applications in smart camera networks.” P.
`Chen, K. Hong, N. Naikal, S. Sastry, J. D. Tygar, P. Yan, A. Yan, L. Chang, L. Lin, Leon S.
`Wang, E. Lobaton, S. Oh, and P. Ahammad. ACM Transactions on Sensor Networks, 9:2,
`March 2013, pp. 21:1-21:23.
`
`28. “Query strategies for evading convex-inducing classifiers.” B. Nelson, B. Rubinstein, L.
`Huang, A. Joseph, S. Lee, S. Rao, and J. D. Tygar. Journal of Machine Learning Research,
`May 2012 (volume 13) pp. 1293-1332. (Also available as arXiv report 1007.0484v1, July
`2010.)
`
`29. “The security of machine learning.” M. Barreno, B. Nelson, A. Joseph, and J. D. Tygar.
`Machine Learning, 81:2, November 2010, pp. 121-148. (An earlier version appeared as UC
`Berkeley EECS technical report UCB/EECS-2008-43, April 2008.)
`
`Curriculum Vitae (September 2017)
`
`5
`
`Doug Tygar
`
`

`

`30. “Secure encrypted-data aggregation for wireless sensor networks.” S. Huang, S. Shieh and J.
`D. Tygar. Wireless Networks, 16:4, May 2010, pp. 915-927.
`
`
`
`31. “Keyboard acoustic emanations revisited.” L. Zhuang, F. Zhou, and J. D. Tygar. ACM
`Transactions on Information and Systems Security, 13:1, October 2009, pp 3:1-3:26. (An
`earlier version appeared in Proceedings of the 12th ACM Conference on Computer and
`Communications Security, November 2005, pp. 373-382.) (See also item 9.)
`“Stealthy poisoning attacks on PCA-based anomaly detectors.” B. Rubinstein, B. Nelson, L.
`Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar. ACM SIGMETRICS Performance
`Evaluation Review, 37:2, October 2009, pp. 73-74.
`
`32.
`
`33.
`
`34.
`
`35.
`
`36.
`
`37.
`
`38.
`
`39.
`
`40.
`
`“Injecting heterogeneity through protocol randomization.” L. Zhuang, J. D. Tygar, R.
`Dhamija. In International Journal of Network Security, 4:1, January 2007, pp. 45-58.
`
`“Cyber defense technology networking and evaluation.” Members of the DETER and
`EMIST Projects (R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S.
`Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R.
`Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, S. Sastry, D. Sterne, J.
`D. Tygar, and S. Wu). In Communications of the ACM, 47:3, March 2004, pp. 58-61.
`
`“Technological dimensions of privacy in Asia.” J. D. Tygar. In Asia-Pacific Review, 10:2,
`November 2003, pp. 120-145.
`
`“SPINS: Security protocols for sensor networks.” A. Perrig, R. Szewczyk, J. D. Tygar, V.
`Wen, and D. Culler. In [ACM Journal of] Wireless Networks, 8:5, September 2002, pp. 521-
`534. (An early version of this paper appears in Proceedings of the 7th Annual
`International Conference on Mobile Computing and Networks (MOBICOM), July 2001,
`pp. 189-199.)
`
`“The TESLA broadcast authentication protocol.” A. Perrig, R. Canneti, J. D. Tygar, and D.
`Song. In CryptoBytes, 5:2, Summer/Fall 2002, pp. 2-13.
`
`“SAM: A flexible and secure auction architecture using trusted hardware.” A. Perrig, S.
`Smith, D. Song, and J. D. Tygar. In Electronic Journal on E-commerce Tools and
`Applications, 1:1, January 2002 (online journal). (An early version of this paper appeared in
`Proceedings of the 1st IEEE International Workshop on Internet Computing and
`Electronic Commerce, April 2001, pp. 1764-1773.)
`
`“Why isn’t the Internet secure yet?” J. D. Tygar and A. Whitten. In ASLIB Proceedings,
`52:3, March 2000, pp. 93-97.
`
`“Multi-round anonymous auction protocols.” H. Kikuchi, M. Harkavy, and J. D. Tygar. In
`Institute of Electronics, Information, and Communication Engineers Transactions on
`Information and Systems, E82-D:4, April 1999, pp. 769-777. (An early version appeared in
`Proceedings of of the First IEEE Workshop on Dependable and Real-Time E-
`Commerce Systems (DARE ’98), June 1998, pp. 62-69. )
`
`41.
`
`“Atomicity in electronic commerce.” J. D. Tygar. In ACM NetWorker, 2:2, April/May 1998,
`pp. 32-43. (Note: this is a revision of item 17 published together with a new article: “An
`
`Curriculum Vitae (September 2017)
`
`6
`
`Doug Tygar
`
`

`

`42.
`
`43.
`
`44.
`
`45.
`
`46.
`
`47.
`
`48.
`
`49.
`
`50.
`
`update on electronic commerce.” In ACM NetWorker, Volume 2, Number 2, April/May
`1998, pp. 40-41.)
`
`
`
`“A model for secure protocols and their compositions.” N. Heintze and J. D. Tygar. In IEEE
`Transactions on Software Engineering, 22:1, January 1996, pp. 16-30. (An extended abstract
`appeared in Proceedings of the 1994 IEEE Symposium on Security and Privacy, May
`1994, pp. 2-13. Another early version appeared as Carnegie Mellon University Computer
`Science technical report CMU-CS-92-100, January 1992.)
`
`“NetBill: An Internet commerce system optimized for network-delivered services.” M.
`Sirbu and J. D. Tygar. In IEEE Personal Communications, 2:4, August 1995, pp. 34-39. (An
`early version appeared in Proceedings of Uniforum ’96, February 1996, pp. 203-226.
`Another early version appeared in Proceedings of the 40th IEEE Computer Society
`International Conference, March 1995, pp. 20-25.)
`“Optimal sampling strategies for quicksort.” C. C. McGeoch and J. D. Tygar. In Random
`Structures and Algorithms, 7:4, December 1995, pp. 287-300. (An early version appeared in
`Proceedings of the 28th Annual Allerton Conference on Communication, Control, and
`Computing, October 1990, pp. 62-71.)
`
`“Geometric characterization of series-parallel variable resistor networks.” R. Bryant, J. D.
`Tygar, and L. Huang. In IEEE Transactions on Circuits and Systems 1: Fundamental Theory
`and Applications, 41:11, November 1994, pp. 686-698. (Preprint also available.) (An early
`version appeared in Proceedings of the 1993 IEEE International Symposium on Circuits
`and Systems, May 1993, pp. 2678-2681.)
`
`“Computability and complexity of ray tracing.” J. Reif, J. D. Tygar, and A. Yoshida. In
`Discrete and Computational Geometry, 11:3, April 1994, pp. 265-287. (An early version
`appeared in Proceedings of the 31st Annual IEEE Symposium on Foundations of
`Computer Science, October 1990, pp. 106-114.)
`
`“Specifying and checking Unix security constraints.” A. Heydon and J. D. Tygar. In
`Computing Systems, 7:1, Winter 1994, pp. 91-112. (An early version appeared in
`Proceedings of the 3rd USENIX Security Symposium, September 1992, pp. 211-226,
`preprint also available.)
`
`“Protecting privacy while preserving access to data.” L. J. Camp and J. D. Tygar. In The
`Information Society, 10:1, January 1994, pp. 59-71.
`
`“Miro: visual specification of security.” A. Heydon, M. Maimone, J. D. Tygar, J. Wing, and
`A. Zaremski. In IEEE Transactions on Software Engineering, 16:10, October 1990, pp.
`1185-1197. (An early version appeared as Carnegie Mellon University Computer Science
`Department technical report CMU-CS-89-199, December 1989.)
`
`“Efficient parallel pseudo-random number generation.” J. Reif and J. D. Tygar. In SIAM
`Journal of Computation, 17:2, April 1988, pp. 404-411. (An early version appeared in
`Proceedings of CRYPTO-85, eds. E. Brickell and H. Williams, Springer, 1986, pp. 433-
`446.)
`
`51.
`
`“Review of Abstraction and Specification in Program Development.” J. D. Tygar. In
`ACM Computing Reviews, 28:9, September 1987, pp. 454-455.
`7
`Curriculum Vitae (September 2017)
`
`Doug Tygar
`
`

`

`
`
`Refereed Conference Papers (does not include items listed above)
`“The Impact of Procedural Security Countermeasures on Employee Security Behaviour: A
`52.
`Qualitative Study.” A. Connolly, M. Lang, J. D. Tygar. To appear in Proceedings of the
`26th International Conference on Information Systems Development. September 2017.
`
`
`
`53. B. Miller, A. Kantchelian, M. Tschantz, S. Afroz, R. Bachwani, R Faizullabhoy, L. Huang,
`V. Shankar, T. Wu, G. Yiu, A. Joseph, J. D. Tygar. In Proceedings of the 13th Conference
`on Detection of Intrusions and Malware & Vulnerability Assessment. July 2016, pp.
`122-141.
`
`54.
`
`“Evasion and Hardening of Tree Ensemble Classifiers.” A. Kantchelian, J. D. Tygar, A.
`Joseph. In Proceedings of the 33rd International Conference on Machine Learning.
`“Reviewer Integration and Performance Measurement for Malware Detection.” June 2016,
`pp. 2387-2396.
`
`55. L. Connolly, M. Lang, J. Gathegi, J. D. Tygar. “Effect of Organisational Culture on
`Employee Security Behaviour: A Qualitative Study.” In Proceedings of the 10th
`International Symposium on Human Aspects of Information Security and Assurance.
`July 2016, pp. 33-44.
`
`56. “Remote Operating System Classification Over IPv6.” D. Fifield, A. Geana, L. MartinGarcia,
`M. Morbitzer, J. D. Tygar. In Proceedings of the 8th ACM Workshop on Artificial
`Intelligence and Security. October 2015, pp. 57-67.
`
`57. “Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.” A.
`Kantchelian, M. Tschantz, S. Afroz, B. Miller, V. Shankar, R. Bachwani, A. Joseph, J. D.
`Tygar. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security.
`October 2015, pp. 55-56.
`
`58. “Censorship Arms Race: Research vs. Practice.” S. Afroz, D. Fifield, M. Tschantz, V.
`Paxson, J. D. Tygar. In HotPETs 2015 Proceedings. June 2015.
`
`59. “Investigation of Employee Security Behaviour: A Grounded Theory Approach.” L.
`Connolly, M. Lang, J. D. Tygar. In Proceedings of the 30th IFIP TC 11 International
`Information Security and Privacy Conference (SEC 2015): ICT Systems Security and
`Privacy Protection. May 2015, pp. 283-296.
`
`60.
`
`61.
`
`“Large-Margin Convex Polytope Machine.” A. Kantchelian, M. Tschantz, L. Huang, P.
`Bartlett, A. Joseph, J. D. Tygar. In Advances in Neural Information Process Systems 27.
`December 2014, pp. 3248-3256.
`
`“Adversarial Active Learning.” B. Miller, A. Kantchelian, S. Afroz, R. Bachwani, E.
`Dauber, L. Huang, M. Tschantz, A. Joseph, J. D. Tygar. In AISec ’14: Proceedings of the
`2014 Workshop on Artificial Intelligence and Security. November 2014, pp. 3-14.
`
`62. “I know why you went to the clinic: Risks and Realization of HTTPS traffic analysis.” B.
`Miller, L. Huang, A. Joseph, J. D. Tygar. In Proceedings of the 14th International
`Symposium on Privacy Enhancing Technologies (PETS 2104), July 2014, pp. 143-163.
`8
`
`Doug Tygar
`
`Curriculum Vitae (September 2017)
`
`

`

`63. “Managing employee security behaviour in organisations: The role of cultural factors and
`individual values.” L. Connolly, M. Lang, and J. D. Tygar In Proceedings of the 29th IFIP
`TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC
`2014), June 2014, pp. 417-430.
`64. “Approaches to adversarial drift.” A. Kantchelian, S. Afroz, L. Huang, A. Islam, B. Miller,
`M. Tschantz, R. Greenstadt, A. Joseph, J. D. Tygar. In Proceedings of the 2013 ACM
`Workshop on Artificial Intelligence and Security, November 2013, pp. 99-109.
`
`
`
`65.
`
`66.
`
`67.
`
`68.
`
`69.
`
`70.
`
`71.
`
`72.
`
`73.
`
`“Systematic analysis and evaluation of Web privacy policies and implementations.” B.
`Miller, K. Buck, and J. D. Tygar. In Proceedings of the 7th International Conference for
`Internet Technology and Secure Transactions, December 2012, pp. 534-540.
`
`“Robust detection of comment spam using entropy rate.” A. Kantchelian, J. Ma, L. Huang,
`S. Afroz, A. Jospeh, and J. D. Tygar. In Proceedings of 5th ACM Workshop on Artificial
`Intelligence and Security, October 2012, pp. 59-70.
`
`“Adversarial machine learning.” L. Huang, A. Joseph, B. Nelson, B. Rubenstein, and J. D.
`Tygar. In Proceedings of 4th ACM Workshop on Artificial Intelligence and Security,
`October 2011, pp. 43-58.
`
`“Near-optimal evasion of convex-inducing classifiers.” B. Nelson, B. Rubinstein, L. Huang,
`A. Joseph, S. Lau, S. Lee, S. Rao, A. Tran, and J. D. Tygar. In Proceedings of the
`Thirteenth International Conference on Artificial Intelligence and Statistics, May 2010,
`pp. 549-556.
`
`“CAPTCHA: Using strangeness in machine translation.” T. Yamamoto, J. D. Tygar, and M.
`Nishigaki. In Proceedings of the 2010 24th IEEE International Conference on Advanced
`Information Networking and Applications, April 2010, pp.430-437. (See also item 132.)
`
`“ANTIDOTE: Understanding and defending against poisoning of anomaly detectors.” B.
`Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar. In
`Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement,
`November 2009, pp. 1-14.
`
`“Conditioned-safe ceremonies and a user study of an application to web authentication.” C.
`Karlof, J. D. Tygar, and D. Wagner. In Proceedings of the 16th Annual Network &
`Distributed System Security Symposium, February 2009.
`
`“Optimal ROC curve for a combination of classifiers.” M. Barreno, A. Cardenas and J.D.
`Tygar. In Advances in Neural Information Processing Systems (NIPS), December 2008,
`pp. 57-64.
`
`“Open problems in the security of learning.” M. Barreno, P. Bartlett, F. Chi, A. Joseph, B.
`Nelson, B. Rubinstein, U. Saini, and J. D. Tygar. In Proceedings of the First ACM
`Workshop on AISec, October 2008, pp. 19-26.
`
`74.
`
`“Evading anomaly detection through variance injection attacks on PCA.” (Extended abstract).
`B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, N. Taft, and J. D. Tygar. In
`Proceedings of the 11th International Symposium on Recent Advances in Intrusion
`Detection, September 2008, pp. 394-395.
`9
`Curriculum Vitae (September 2017)
`
`Doug Tygar
`
`

`

`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`81.
`
`82.
`
`83.
`
`84.
`
`85.
`
`“CITRIC: A low-bandwidth wireless camera network platform.” P. Chen, P. Ahammad, C.
`Boyer, S. Huang, L. Lin, E. Lobaton, M. Meingast, S. Oh, S. Wang, P. Yan, A. Yang, C. Yeo,
`L. Chang, J. D. Tygar, and S. Sastry. In Proceedings of the 2nd ACM/IEEE International
`Conference on Distributed Smart Cameras (ICDSC-08), September 2008, pp. 1-10.
`“A power-preserving broadcast protocol for WSNs with DoS resistance.” C. Ni, T. Hsiang, J.
`D. Tygar. In Proceedings of 17th International IEEE Conference on Computer
`Communications and Networks, August 2008, pp. 1 – 6.
`
`
`
`“SWOON: A testbed for secure wireless overlay networks.” Y. Huang, J. D. Tygar, H. Lin,
`L. Yeh, H. Tsai, K. Sklower, S. Shieh, C. Wu, P. Lu, S. Chien, Z. Lin, L. Hsu, C. Hsu, C.
`Hsu, Y. Wu, and M. Leong. In Proceedings USENIX Workshop on Cyber Security and
`Test, July 2008.
`“Characterizing botnets from email spam records.” L. Zhuang, J. Dunagan, D. Simon, H.
`Wang, I. Osipkov, G. Hulten and J. D. Tygar. In Proceedings of First USENIX Workshop
`on Large Scale Exploits and Emergent Threats (LEET 2008), April 2008.
`
`“Exploiting machine learning to subvert your spam filter. “ B. Nelson, M. Barreno, F. Chi,
`A. D. Joseph, B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. In Proceedings of
`the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET
`2008), April 2008.
`
`“Dynamic pharming attacks and locked same-origin policies for web browsers.” C. Karlof,
`U. Shankar, J.D. Tygar, and D. Wagner. In Proceedings of the Fourteenth ACM
`Conference on Computer and Communications Security (CCS 2007), November 2007,
`pp. 58-71.
`
`“Coexistence proof using chain of timestamps for multiple RFID tags.” C. Lin, Y. Lai, J. D.
`Tygar, C. Yang, and C. Chiang. In Proceedings of Advances in Web and Network
`Technologies and Information Management, June 2007, pp. 634-643.
`“Why phishing works.” R. Dhamija, J. D. Tygar, and M. Hearst. In Proceedings of CHI-
`2006: Conference on Human Factors in Computing Systems, April 2006, pp. 581-590.
`
`“Can machine learning be secure?” M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. D.
`Tygar. Invited paper. In Proceedings of the ACM Symposium on Information,
`Computer, and Communication Security, March 2006, pp. 16-25.
`
`“The battle against phishing: Dynamic security skins.” R. Dhamija and J. D. Tygar. In
`SOUPS 2005: Proceedings of the 2005 ACM Symposium on Usable Security and
`Privacy, ACM International Conference Proceedings Series, ACM Press, July 2005, pp. 77-
`88. (See also item 10.)
`
`“Collaborative filtering CAPTCHAs.” M. Chew and J. D. Tygar. In Human Interactive
`Proofs: Second International Workshop (HIP 2005), eds. H. Baird and D. Lopresti,
`Springer, May 2005, pp. 66-81.
`
`86.
`
`“Phish and HIPs: Human interactive proofs to detect phishing attacks.” R. Dhamija and J. D.
`Tygar. In Human Interactive Proofs: Second International Workshop (HIP 2005), eds.
`H. Baird and D. Lopresti, Springer, May 2005, pp. 127-141.
`10
`Curriculum Vitae (September 2017)
`
`Doug Tygar
`
`

`

`87.
`
`88.
`
`89.
`
`90.
`
`91.
`
`92.
`
`93.
`
`94.
`
`95.
`
`96.
`
`97.
`
`98.
`
`“Image recognition CAPTCHAs.” M. Chew and J. D. Tygar. In Proceedings of the 7th
`International Information Security Conference (ISC 2004), Springer, September 2004, pp.
`268-279. (A longer version appeared as UC Berkeley Computer Science Division technical
`report UCB/CSD-04-1333, June 2004.)
`
`
`
`“Side effects are not sufficient to authenticate software.” U. Shankar, M. Chew, and J. D.
`Tygar. In Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 89-
`101. (A version with an additional appendix appeared as UC Berkeley Computer Science
`Division technical report UCB/CSD-04-1363, September 2004.)
`
`“Statistical monitoring + predictable recovery = Self-*.” A Fox, E. Kiciman, D. Patterson, R.
`Katz, M. Jordan, I. Stoica and J. D. Tygar. In Proceedings of the 2nd Bertinoro Workshop
`on Future Directions in Distributed Computing (FuDiCo II), June 2004 (online
`proceedings).
`
`“Distillation codes and their application to DoS resistant multicast authentication.” C. Karlof,
`N. Sastry, Y. Li, A. Perrig, and J. D. Tygar. In Proceedings of the Network and
`Distributed System Security Conference (NDSS 2004), February 2004, pp. 37-56.
`
`“Privacy and security in the location-enhanced World Wide Web.” J. Hong, G. Boriello, J.
`Landay, D. McDonald, B. Schilit, and J. D. Tygar. In Proceedings of the Workshop on
`Privacy at Ubicomp 2003, October 2003 (online proceedings).
`“The problem with privacy.” J. D. Tygar. Keynote paper. In Proceedings of the 2003
`IEEE Workshop on Internet Applications, June 2003, pp. 2-8.
`“Safe staging for computer security.” A. Whitten and J. D. Tygar. In Proceedings of the
`2003 Workshop on Human-Computer Interaction and Security Systems, April 2003.
`
`“Expander graphs for digital stream authentication and robust overlay networks.” D. Song,
`D. Zuckerman, and J. D. Tygar. In Proceedings of the 2002 IEEE Symposium on Security
`and Privacy, May 2002, pp. 258-270.
`
`“ELK: A new protocol for efficient large-group key distribution.” A. Perrig, D. Song, and J.
`D. Tygar. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, May
`2001, pp. 247-262.
`
`“Efficient and secure source authentication for multicast.” A. Perrig, R. Canetti, D. Song,
`and J. D. Tygar. In Proceedings of the Internet Society Network and Distributed System
`Security Symposium (NDSS 2001), February 2001, pp. 35-46.
`
`“Efficient authentication and signing of multicast streams over lossy channels.” A. Perrig, R.
`Canetti, J. D. Tygar, and D. Song. In Proceedings of the 2000 IEEE Symposium on
`Security and Privacy, May 2000, pp. 56-73.
`
`“Flexible and scalable credential structures: NetBill implementation and experience.” Y.
`Kawakura, M. Sirbu., I. Simpson, and J. D. Tygar. In Proceedings of the International
`Workshop on Cryptographic Techniques and E-Commerce, July 1999, pp. 231-245.
`
`Curriculum Vitae (September 2017)
`
`11
`
`Doug Tygar
`
`

`

`99.
`
`100.
`
`101.
`
`102.
`
`103.
`
`104.
`
`105.
`
`106.
`
`107.
`
`108.
`
`109.
`
`110.
`
`
`
`“Open problems in electronic commerce.” J. D. Tygar. Invited address. In Proceedings of
`the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database
`Systems (PODS 1999), May 1999, p. 101.
`
` “Electronic auctions with private bids.” M. Harkavy, J. D. Tygar, and H. Kikuchi. In
`Proceedings of the 3rd USENIX Workshop on Electronic Commerce, September 1998,
`pp. 61-73.
`
` “Atomicity versus anonymity: Distributed transactions for electronic commerce.” J. D.
`Tygar. In Proceedings of the 24th International Conference on Very Large Data Bases,
`August 1998, pp. 1-12.
`
` “Smart cards in hostile environments.” H. Gobioff, S. Smith, J. D. Tygar, and B. Yee. In
`Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996,
`pp. 23-28. (An early version appeared as Carnegie Mellon University Computer Science
`technical report CMU-CS-95-188, September 1995.)
`
`“Anonymous atomic transactions.” L. J. Camp, M. Harkavy, and B. Yee. In
`
`Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996,
`pp. 123-133. (Preprint also available.) (An early version appeared as Carnegie Mellon
`University Computer Science technical report CMU-CS-96-156, July 1996.)
`
` “Model checking electronic commerce protocols.” N. Heintze, J. D. Tygar, J. Wing, and H.
`Wong. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce,
`November 1996, pp. 147-164.
`
` “WWW electronic commerce and Java Trojan horses.” J. D. Tygar and A. Whitten. In
`Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996,
`pp. 243-250.
`
` “Building blocks for atomicity in electronic commerce.” J. Su and J. D. Tygar. In
`Proceedings of the 6th USENIX Security Symposium, July 1996, pp. 97-102.
`
` “Token and notational money in electronic commerce.” L. J. Camp, M. Sirbu, and J. D.
`Tygar. In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July
`1995, pp. 1-12. (An early version was presented at the Telecommunications Policy Research
`Conference, October 1994.)
`
` “NetBill security and transaction protocol.” B. Cox, J. D. Tygar, and M. Sirbu. In
`Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 77-
`88.
`
` “Secure coprocessors in electronic commerce applications.” B. Yee and J. D. Tygar. In
`Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 155-
`170.
`
` “Completely asynchronous optimistic recovery with minimal rollbacks.” S. Smith, D.
`Johnson, and J. D. Tygar. In Proceedings of the 25th IEEE Symposium on Fault-Tolerant
`Computing, June 1995, pp. 361-370. (An early version appears as Carnegie Mellon
`Unive

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket