`
`Personal Information:
`
`Full name: Justin Douglas Tygar
`US Citizen
`
`Address:
`
`University of California.
`739 Soda Hall #1776
`
`Berkeley, CA 94720-1776
`(510) 643-7855
`tygar@berkeley.edu
`
`Education:
`
`A.B., 1982
`
`University of California, Berkeley, Math/Computer Science
`Bell Labs University Relations Student (1981)
`
`Ph.D., 1986 Harvard University, Computer Science
`Thesis: An Integrated Toolkit for Operating System Security
`Advisor: Michael Rabin
`NSF Graduate Fellow (1982 – 1985), IBM Graduate Fellow (1985 – 1986)
`
`Academic Appointments:
`
`University of California, Berkeley
`Department of Electrical Engineering and Computer Science
`& School of Information
`1998 – Present
`Professor (tenured, joint appointment)
`
`Carnegie Mellon University
`Computer Science Department
`2000 – 2005
`Adjunct Professor
`1992 – 2000
`Associate Professor (tenured 1995, on leave 1998 – 2000)
`1986 – 1992
`Assistant Professor
`
`Major Awards:
`
`NSF Presidential Young Investigator, 1988
`Outstanding Professor Award, Carnegie Magazine, 1989
`Chair, Defense Information Science and Technology Study Group on Security with Privacy
`Member, National Research Council Committee on Information Trustworthiness
`Member, INFOSEC Science and Technology Study Group
`Okawa Foundation Fellow, 2003-4
`Test of Time Award, USENIX Security, 2015
`Wide consulting for both industry and government
`
`Curriculum Vitae (September 2017)
`
`1
`
`Doug Tygar
`
`APPLE 1003
`
`
`
`
`
`
`
`Major speeches:
`
`Keynote addresses:
`
`PODC (1995), ASIAN-96 (1996), NGITS (1997), VLDB (1998), CRYPTEC (1999),
`CAV (2000), Human Authentication (2001), PDSN (2002), ISM (2005), ISC (2005), ASIACCS (2006),
`Croucher ASI (2004, 2006), ISC (2008), AISEC (2010), ISRCS (2013), SERE (2014), IWSPA (2016)
`
`Invited addresses:
`
`Harvard Graduate School of Arts and Science 100th Anniversary,
`CMU Computer Science Department 25th Anniversary
`More than 260 talks & 20 professional seminars since 1985
`
`External review activities:
`
`Electronic Commerce Program, City University of Hong Kong
`Information Systems Management Program, Singapore Management University
`Information Technology Program, United Arab Emirates University
`Computer Science Program, University of California, Davis
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Curriculum Vitae (September 2017)
`
`Doug Tygar
`
`2
`
`
`
`Publications
`
`
`
`
`Books
`1. Adversarial Machine Learning: Computer Security and Statistical Machine Learning.
`A. Joseph, B. Nelson, B. Rubinstein, J. D. Tygar. Cambridge University Press, 2017. (To
`appear).
`
`2. Computer Security in the 21st Century. Eds. D. Lee, S. Shieh, and J. D. Tygar. Springer,
`March 2005. (This book includes item 12 below as well as a technical introduction by me
`and the other editors.)
`
`3. Waiyādo/Waiyaresu Nettowōku ni Okeru Burōdokyasuto Tsūshin no Sekyuriti
`ワイヤード/ワイヤレスネットワークにおけるブロードキャスト通信のセキュリテ.
`A. Perrig and J. D. Tygar; translated by Fumio Mizoguchi and the the Science University of
`Tokyo Information Media Science Research Group with the assistance of J. D. Tygar.
`Kyoritsu Shuppan, October 2004. (This is a Japanese translation of item 4 which also
`contains new and additional material written by me in Japanese.)
`
`4.
`
`Secure Broadcast Communication in Wired and Wireless Networks. A. Perrig and J. D.
`Tygar. Springer, October 2002. (See also item 3.)
`
`5. Trust in Cyberspace. National Research Council Committee on Information Systems
`Trustworthiness (S. Bellovin, W. E. Boebert, M. Branstad, J. R. Catoe, S. Crocker, C.
`Kaufman, S. Kent, J. Knight, S. McGeady, R. Nelson, A. Schiffman, F. Schneider [ed.], G.
`Spix, and J. D. Tygar). National Academy Press, January 1999.
`
`
`
`Book Chapters (does not incude items listed above)
`6.
`“Classifier evasion: Models and open problems.” B. Nelson, B. Rubinstein, L. Huang, A.
`Joseph, and J. D. Tygar. In Privacy and Security Issues in Data Mining and Machine
`Learning, eds. C. Dimitrakakis, et al. Springer, July 2011, pp. 92-98.
`7. “Misleading learners: Co-opting your spam filter.” B. Nelson, M. Barreno, F. Chi, A. Joseph,
`B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. In Machine Learning in Cyber
`Trust: Security, Privacy, Reliability, eds. J. Tsai and P.Yu. Springer, April 2009, pp. 17-
`51.
`
`8. “Preface.” J. D. Tygar. In 從DIGIart@eTaiwan談互動創意 (Interaction and Creation in
`DIGIart@eTaiwan),ed. S. Hsu. Ylib Publisher, July 2007.
`9. “Case study: Acoustic keyboard emanations.” L. Zhuang, F. Zhou, and J. D. Tygar. In
`Phishing and Countermeasures: Understanding the Increasing Problem of Electronic
`Identity Theft, eds. M. Jakobsson and S. Myers. Wiley-Interscience, December 2006, pp.
`221-240. (This is a popularized version of item 31.)
`
`Curriculum Vitae (September 2017)
`
`3
`
`Doug Tygar
`
`
`
`10.
`
`11.
`
`12.
`
`13.
`
`14.
`
`15.
`
`16.
`
`17.
`
`18.
`
`19.
`
`“Dynamic security skins.” R. Dhamija and J. D. Tygar. In Phishing and
`Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft,
`eds. M. Jakobsson and S. Myers. Wiley-Interscience, December 2006, pp. 339-351. (This is
`a popularized version of item 84.)
`
`
`
`“Why Johnny can’t encrypt: A usability evaluation of PGP 5.0.” A. Whitten and J. D.
`Tygar. In Security and Usability: Designing Secure Systems that People Can Use, eds.
`L. Cranor and G. Simson. O'Reilly, September 2005, pp. 679-702. (An earlier version of this
`paper was published in Proceedings of the 8th USENIX Security Symposium, August
`1999, pp. 169-183. See also item 134.)
`
`“Private matching.” Y. Li, J. D. Tygar, J. Hellerstein. In Computer Security in the 21st
`Century, eds. D. Lee, S. Shieh, and J. D. Tygar. Springer, March 2005, pp. 25-50. (See item
`2.) (An early version of this paper appeared as Intel Research Laboratory Berkeley technical
`report IRB-TR-04-005, February 2004.)
`
`“Digital cash.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction,
`ed. W. Bainbridge. Berkshire Publishing, October 2004, pp. 167-170.
`
`“Spamming.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction,
`ed. W. Bainbridge. Berkshire Publishing, October 2004, pp. 673-675.
`
`“Viruses.” J. D. Tygar. In Berkshire Encyclopedia of Human Computer Interaction, ed.
`W. Bainbridge. Berkshire Publishing, October 2004, pp. 788-791.
`
`“Privacy in sensor webs and distributed information systems.” J. D. Tygar. In Software
`Security: Theories and Systems, eds. M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A.
`Yonezawa. Springer, 2003, pp. 84-95.
`
`“Atomicity in electronic commerce.” J. D. Tygar. In Internet Besieged, eds. D. Denning
`and P. Denning. ACM Press and Addison-Wesley, October 1997, pp. 389-405. (An
`expanded earlier version of this paper was published in Proceedings of the Fifteenth
`Annual ACM Symposium on Principles of Distributed Computing, Keynote paper, May
`1996, pp. 8-26; and as Carnegie Mellon University Computer Science technical report CMU-
`CS-96-112, January 1996. See also item 41.)
`
`“Cryptographic postage indicia.” J. D. Tygar, B. Yee, and N. Heintze. In Concurrency and
`Parallelism, Programming, Networking, and Security, eds. J. Jaffar and R. Yap. Springer,
`1996, pp. 378-391. (Preprint also available. Early versions appeared as Carnegie Mellon
`University Computer Science technical reports CMU-CS-96-113, January 1996, UC San
`Diego Computer Science technical report UCSD-TR-CS96-485, and in the 1996 Securicom
`Proceedings, Paris, June 1996. See also item 136.)
`
`“Dyad: A system for using physically secure coprocessors.” J. D. Tygar and B. Yee. In
`Technological Strategies for the Protection of Intellectual Property in the Networked
`Multimedia Environment. Interactive Multimedia Association, 1994, pp. 121-152. (An
`early version appeared as Carnegie Mellon University Computer Science technical report
`CMU-CS-91-140R, May 1991.)
`
`20.
`
`“A system for self-securing programs.” J. D. Tygar and B. Yee. In Carnegie Mellon
`Computer Science: A 25-Year Commemorative, ed. R. Rashid. ACM Press and Addison-
`4
`Curriculum Vitae (September 2017)
`Doug Tygar
`
`
`
`21.
`
`22.
`
`23.
`
`24.
`
`
`Wesley, 1991, pp. 163-197. (Note: The first printing of this volume had incorrect text due to
`a production error.)
`
`“Implementing capabilities without a trusted kernel.” M. Herlihy and J. D. Tygar. In
`Dependable Computing for Critical Applications, eds. A. Avizienis and J. Laprie.
`Springer, January 1991, pp. 283-300. (Note: An early version appeared in the (IFIP)
`Proceedings of the International Working Conference on Dependable Computing for
`Critical Applications, August 1989.)
`“Strongbox.” J. D. Tygar and B. Yee. In Camelot and Avalon: A Distributed Transaction
`Facility, eds. J. Eppinger, L. Mummert, and A. Spector. Morgan-Kaufmann, February 1991,
`pp. 381-400.
`
`“ITOSS: An Integrated Toolkit for Operating System Security.” M. Rabin and J. D. Tygar.
` In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek. Springer, June 1989,
`pp. 2-15. (Preprint also available.) (Note: Earlier, longer versions appeared as Harvard
`University Aiken Computation Laboratory technical report TR-05-87R and my Ph.D.
`dissertation.)
`
`“Formal semantics for visual specification of security.” M. Maimone, J. D. Tygar, and J.
`Wing. In Visual Languages and Visual Programming, ed. S. K. Chang. Plenum, 1990,
`pp. 97-116. (An early version was published in Proceedings of the 1988 IEEE Workshop
`on Visual Programming, pp. 45-51, and as Carnegie Mellon University Computer Science
`technical report CMU-CS-88-173r, December 1988.)
`
`
`
`Journal Articles (does not include items listed above)
`“Organisational Culture, Procedural Countermeasures, and Employee Security Behaviour: A
`25.
`Qualitative Study. L. Connolly, M. Lang, J. Gathegi, J. D. Tygar. Information & Computer
`Security. 25:2, April 2017, pp. 118-136.
`
`26.
`
`“Machine Learning Methods for Computer Security.” A. Joseph, P. Laskov, F. Roli, J. D.
`Tygar, B. Nelson. Dagstuhl Manifestos 3:1, December 2013, pp. 1-30.
`
`27. “A low-bandwidth camera sensor platform with applications in smart camera networks.” P.
`Chen, K. Hong, N. Naikal, S. Sastry, J. D. Tygar, P. Yan, A. Yan, L. Chang, L. Lin, Leon S.
`Wang, E. Lobaton, S. Oh, and P. Ahammad. ACM Transactions on Sensor Networks, 9:2,
`March 2013, pp. 21:1-21:23.
`
`28. “Query strategies for evading convex-inducing classifiers.” B. Nelson, B. Rubinstein, L.
`Huang, A. Joseph, S. Lee, S. Rao, and J. D. Tygar. Journal of Machine Learning Research,
`May 2012 (volume 13) pp. 1293-1332. (Also available as arXiv report 1007.0484v1, July
`2010.)
`
`29. “The security of machine learning.” M. Barreno, B. Nelson, A. Joseph, and J. D. Tygar.
`Machine Learning, 81:2, November 2010, pp. 121-148. (An earlier version appeared as UC
`Berkeley EECS technical report UCB/EECS-2008-43, April 2008.)
`
`Curriculum Vitae (September 2017)
`
`5
`
`Doug Tygar
`
`
`
`30. “Secure encrypted-data aggregation for wireless sensor networks.” S. Huang, S. Shieh and J.
`D. Tygar. Wireless Networks, 16:4, May 2010, pp. 915-927.
`
`
`
`31. “Keyboard acoustic emanations revisited.” L. Zhuang, F. Zhou, and J. D. Tygar. ACM
`Transactions on Information and Systems Security, 13:1, October 2009, pp 3:1-3:26. (An
`earlier version appeared in Proceedings of the 12th ACM Conference on Computer and
`Communications Security, November 2005, pp. 373-382.) (See also item 9.)
`“Stealthy poisoning attacks on PCA-based anomaly detectors.” B. Rubinstein, B. Nelson, L.
`Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar. ACM SIGMETRICS Performance
`Evaluation Review, 37:2, October 2009, pp. 73-74.
`
`32.
`
`33.
`
`34.
`
`35.
`
`36.
`
`37.
`
`38.
`
`39.
`
`40.
`
`“Injecting heterogeneity through protocol randomization.” L. Zhuang, J. D. Tygar, R.
`Dhamija. In International Journal of Network Security, 4:1, January 2007, pp. 45-58.
`
`“Cyber defense technology networking and evaluation.” Members of the DETER and
`EMIST Projects (R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S.
`Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R.
`Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, S. Sastry, D. Sterne, J.
`D. Tygar, and S. Wu). In Communications of the ACM, 47:3, March 2004, pp. 58-61.
`
`“Technological dimensions of privacy in Asia.” J. D. Tygar. In Asia-Pacific Review, 10:2,
`November 2003, pp. 120-145.
`
`“SPINS: Security protocols for sensor networks.” A. Perrig, R. Szewczyk, J. D. Tygar, V.
`Wen, and D. Culler. In [ACM Journal of] Wireless Networks, 8:5, September 2002, pp. 521-
`534. (An early version of this paper appears in Proceedings of the 7th Annual
`International Conference on Mobile Computing and Networks (MOBICOM), July 2001,
`pp. 189-199.)
`
`“The TESLA broadcast authentication protocol.” A. Perrig, R. Canneti, J. D. Tygar, and D.
`Song. In CryptoBytes, 5:2, Summer/Fall 2002, pp. 2-13.
`
`“SAM: A flexible and secure auction architecture using trusted hardware.” A. Perrig, S.
`Smith, D. Song, and J. D. Tygar. In Electronic Journal on E-commerce Tools and
`Applications, 1:1, January 2002 (online journal). (An early version of this paper appeared in
`Proceedings of the 1st IEEE International Workshop on Internet Computing and
`Electronic Commerce, April 2001, pp. 1764-1773.)
`
`“Why isn’t the Internet secure yet?” J. D. Tygar and A. Whitten. In ASLIB Proceedings,
`52:3, March 2000, pp. 93-97.
`
`“Multi-round anonymous auction protocols.” H. Kikuchi, M. Harkavy, and J. D. Tygar. In
`Institute of Electronics, Information, and Communication Engineers Transactions on
`Information and Systems, E82-D:4, April 1999, pp. 769-777. (An early version appeared in
`Proceedings of of the First IEEE Workshop on Dependable and Real-Time E-
`Commerce Systems (DARE ’98), June 1998, pp. 62-69. )
`
`41.
`
`“Atomicity in electronic commerce.” J. D. Tygar. In ACM NetWorker, 2:2, April/May 1998,
`pp. 32-43. (Note: this is a revision of item 17 published together with a new article: “An
`
`Curriculum Vitae (September 2017)
`
`6
`
`Doug Tygar
`
`
`
`42.
`
`43.
`
`44.
`
`45.
`
`46.
`
`47.
`
`48.
`
`49.
`
`50.
`
`update on electronic commerce.” In ACM NetWorker, Volume 2, Number 2, April/May
`1998, pp. 40-41.)
`
`
`
`“A model for secure protocols and their compositions.” N. Heintze and J. D. Tygar. In IEEE
`Transactions on Software Engineering, 22:1, January 1996, pp. 16-30. (An extended abstract
`appeared in Proceedings of the 1994 IEEE Symposium on Security and Privacy, May
`1994, pp. 2-13. Another early version appeared as Carnegie Mellon University Computer
`Science technical report CMU-CS-92-100, January 1992.)
`
`“NetBill: An Internet commerce system optimized for network-delivered services.” M.
`Sirbu and J. D. Tygar. In IEEE Personal Communications, 2:4, August 1995, pp. 34-39. (An
`early version appeared in Proceedings of Uniforum ’96, February 1996, pp. 203-226.
`Another early version appeared in Proceedings of the 40th IEEE Computer Society
`International Conference, March 1995, pp. 20-25.)
`“Optimal sampling strategies for quicksort.” C. C. McGeoch and J. D. Tygar. In Random
`Structures and Algorithms, 7:4, December 1995, pp. 287-300. (An early version appeared in
`Proceedings of the 28th Annual Allerton Conference on Communication, Control, and
`Computing, October 1990, pp. 62-71.)
`
`“Geometric characterization of series-parallel variable resistor networks.” R. Bryant, J. D.
`Tygar, and L. Huang. In IEEE Transactions on Circuits and Systems 1: Fundamental Theory
`and Applications, 41:11, November 1994, pp. 686-698. (Preprint also available.) (An early
`version appeared in Proceedings of the 1993 IEEE International Symposium on Circuits
`and Systems, May 1993, pp. 2678-2681.)
`
`“Computability and complexity of ray tracing.” J. Reif, J. D. Tygar, and A. Yoshida. In
`Discrete and Computational Geometry, 11:3, April 1994, pp. 265-287. (An early version
`appeared in Proceedings of the 31st Annual IEEE Symposium on Foundations of
`Computer Science, October 1990, pp. 106-114.)
`
`“Specifying and checking Unix security constraints.” A. Heydon and J. D. Tygar. In
`Computing Systems, 7:1, Winter 1994, pp. 91-112. (An early version appeared in
`Proceedings of the 3rd USENIX Security Symposium, September 1992, pp. 211-226,
`preprint also available.)
`
`“Protecting privacy while preserving access to data.” L. J. Camp and J. D. Tygar. In The
`Information Society, 10:1, January 1994, pp. 59-71.
`
`“Miro: visual specification of security.” A. Heydon, M. Maimone, J. D. Tygar, J. Wing, and
`A. Zaremski. In IEEE Transactions on Software Engineering, 16:10, October 1990, pp.
`1185-1197. (An early version appeared as Carnegie Mellon University Computer Science
`Department technical report CMU-CS-89-199, December 1989.)
`
`“Efficient parallel pseudo-random number generation.” J. Reif and J. D. Tygar. In SIAM
`Journal of Computation, 17:2, April 1988, pp. 404-411. (An early version appeared in
`Proceedings of CRYPTO-85, eds. E. Brickell and H. Williams, Springer, 1986, pp. 433-
`446.)
`
`51.
`
`“Review of Abstraction and Specification in Program Development.” J. D. Tygar. In
`ACM Computing Reviews, 28:9, September 1987, pp. 454-455.
`7
`Curriculum Vitae (September 2017)
`
`Doug Tygar
`
`
`
`
`
`Refereed Conference Papers (does not include items listed above)
`“The Impact of Procedural Security Countermeasures on Employee Security Behaviour: A
`52.
`Qualitative Study.” A. Connolly, M. Lang, J. D. Tygar. To appear in Proceedings of the
`26th International Conference on Information Systems Development. September 2017.
`
`
`
`53. B. Miller, A. Kantchelian, M. Tschantz, S. Afroz, R. Bachwani, R Faizullabhoy, L. Huang,
`V. Shankar, T. Wu, G. Yiu, A. Joseph, J. D. Tygar. In Proceedings of the 13th Conference
`on Detection of Intrusions and Malware & Vulnerability Assessment. July 2016, pp.
`122-141.
`
`54.
`
`“Evasion and Hardening of Tree Ensemble Classifiers.” A. Kantchelian, J. D. Tygar, A.
`Joseph. In Proceedings of the 33rd International Conference on Machine Learning.
`“Reviewer Integration and Performance Measurement for Malware Detection.” June 2016,
`pp. 2387-2396.
`
`55. L. Connolly, M. Lang, J. Gathegi, J. D. Tygar. “Effect of Organisational Culture on
`Employee Security Behaviour: A Qualitative Study.” In Proceedings of the 10th
`International Symposium on Human Aspects of Information Security and Assurance.
`July 2016, pp. 33-44.
`
`56. “Remote Operating System Classification Over IPv6.” D. Fifield, A. Geana, L. MartinGarcia,
`M. Morbitzer, J. D. Tygar. In Proceedings of the 8th ACM Workshop on Artificial
`Intelligence and Security. October 2015, pp. 57-67.
`
`57. “Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.” A.
`Kantchelian, M. Tschantz, S. Afroz, B. Miller, V. Shankar, R. Bachwani, A. Joseph, J. D.
`Tygar. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security.
`October 2015, pp. 55-56.
`
`58. “Censorship Arms Race: Research vs. Practice.” S. Afroz, D. Fifield, M. Tschantz, V.
`Paxson, J. D. Tygar. In HotPETs 2015 Proceedings. June 2015.
`
`59. “Investigation of Employee Security Behaviour: A Grounded Theory Approach.” L.
`Connolly, M. Lang, J. D. Tygar. In Proceedings of the 30th IFIP TC 11 International
`Information Security and Privacy Conference (SEC 2015): ICT Systems Security and
`Privacy Protection. May 2015, pp. 283-296.
`
`60.
`
`61.
`
`“Large-Margin Convex Polytope Machine.” A. Kantchelian, M. Tschantz, L. Huang, P.
`Bartlett, A. Joseph, J. D. Tygar. In Advances in Neural Information Process Systems 27.
`December 2014, pp. 3248-3256.
`
`“Adversarial Active Learning.” B. Miller, A. Kantchelian, S. Afroz, R. Bachwani, E.
`Dauber, L. Huang, M. Tschantz, A. Joseph, J. D. Tygar. In AISec ’14: Proceedings of the
`2014 Workshop on Artificial Intelligence and Security. November 2014, pp. 3-14.
`
`62. “I know why you went to the clinic: Risks and Realization of HTTPS traffic analysis.” B.
`Miller, L. Huang, A. Joseph, J. D. Tygar. In Proceedings of the 14th International
`Symposium on Privacy Enhancing Technologies (PETS 2104), July 2014, pp. 143-163.
`8
`
`Doug Tygar
`
`Curriculum Vitae (September 2017)
`
`
`
`63. “Managing employee security behaviour in organisations: The role of cultural factors and
`individual values.” L. Connolly, M. Lang, and J. D. Tygar In Proceedings of the 29th IFIP
`TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC
`2014), June 2014, pp. 417-430.
`64. “Approaches to adversarial drift.” A. Kantchelian, S. Afroz, L. Huang, A. Islam, B. Miller,
`M. Tschantz, R. Greenstadt, A. Joseph, J. D. Tygar. In Proceedings of the 2013 ACM
`Workshop on Artificial Intelligence and Security, November 2013, pp. 99-109.
`
`
`
`65.
`
`66.
`
`67.
`
`68.
`
`69.
`
`70.
`
`71.
`
`72.
`
`73.
`
`“Systematic analysis and evaluation of Web privacy policies and implementations.” B.
`Miller, K. Buck, and J. D. Tygar. In Proceedings of the 7th International Conference for
`Internet Technology and Secure Transactions, December 2012, pp. 534-540.
`
`“Robust detection of comment spam using entropy rate.” A. Kantchelian, J. Ma, L. Huang,
`S. Afroz, A. Jospeh, and J. D. Tygar. In Proceedings of 5th ACM Workshop on Artificial
`Intelligence and Security, October 2012, pp. 59-70.
`
`“Adversarial machine learning.” L. Huang, A. Joseph, B. Nelson, B. Rubenstein, and J. D.
`Tygar. In Proceedings of 4th ACM Workshop on Artificial Intelligence and Security,
`October 2011, pp. 43-58.
`
`“Near-optimal evasion of convex-inducing classifiers.” B. Nelson, B. Rubinstein, L. Huang,
`A. Joseph, S. Lau, S. Lee, S. Rao, A. Tran, and J. D. Tygar. In Proceedings of the
`Thirteenth International Conference on Artificial Intelligence and Statistics, May 2010,
`pp. 549-556.
`
`“CAPTCHA: Using strangeness in machine translation.” T. Yamamoto, J. D. Tygar, and M.
`Nishigaki. In Proceedings of the 2010 24th IEEE International Conference on Advanced
`Information Networking and Applications, April 2010, pp.430-437. (See also item 132.)
`
`“ANTIDOTE: Understanding and defending against poisoning of anomaly detectors.” B.
`Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar. In
`Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement,
`November 2009, pp. 1-14.
`
`“Conditioned-safe ceremonies and a user study of an application to web authentication.” C.
`Karlof, J. D. Tygar, and D. Wagner. In Proceedings of the 16th Annual Network &
`Distributed System Security Symposium, February 2009.
`
`“Optimal ROC curve for a combination of classifiers.” M. Barreno, A. Cardenas and J.D.
`Tygar. In Advances in Neural Information Processing Systems (NIPS), December 2008,
`pp. 57-64.
`
`“Open problems in the security of learning.” M. Barreno, P. Bartlett, F. Chi, A. Joseph, B.
`Nelson, B. Rubinstein, U. Saini, and J. D. Tygar. In Proceedings of the First ACM
`Workshop on AISec, October 2008, pp. 19-26.
`
`74.
`
`“Evading anomaly detection through variance injection attacks on PCA.” (Extended abstract).
`B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, N. Taft, and J. D. Tygar. In
`Proceedings of the 11th International Symposium on Recent Advances in Intrusion
`Detection, September 2008, pp. 394-395.
`9
`Curriculum Vitae (September 2017)
`
`Doug Tygar
`
`
`
`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`81.
`
`82.
`
`83.
`
`84.
`
`85.
`
`“CITRIC: A low-bandwidth wireless camera network platform.” P. Chen, P. Ahammad, C.
`Boyer, S. Huang, L. Lin, E. Lobaton, M. Meingast, S. Oh, S. Wang, P. Yan, A. Yang, C. Yeo,
`L. Chang, J. D. Tygar, and S. Sastry. In Proceedings of the 2nd ACM/IEEE International
`Conference on Distributed Smart Cameras (ICDSC-08), September 2008, pp. 1-10.
`“A power-preserving broadcast protocol for WSNs with DoS resistance.” C. Ni, T. Hsiang, J.
`D. Tygar. In Proceedings of 17th International IEEE Conference on Computer
`Communications and Networks, August 2008, pp. 1 – 6.
`
`
`
`“SWOON: A testbed for secure wireless overlay networks.” Y. Huang, J. D. Tygar, H. Lin,
`L. Yeh, H. Tsai, K. Sklower, S. Shieh, C. Wu, P. Lu, S. Chien, Z. Lin, L. Hsu, C. Hsu, C.
`Hsu, Y. Wu, and M. Leong. In Proceedings USENIX Workshop on Cyber Security and
`Test, July 2008.
`“Characterizing botnets from email spam records.” L. Zhuang, J. Dunagan, D. Simon, H.
`Wang, I. Osipkov, G. Hulten and J. D. Tygar. In Proceedings of First USENIX Workshop
`on Large Scale Exploits and Emergent Threats (LEET 2008), April 2008.
`
`“Exploiting machine learning to subvert your spam filter. “ B. Nelson, M. Barreno, F. Chi,
`A. D. Joseph, B. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. In Proceedings of
`the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET
`2008), April 2008.
`
`“Dynamic pharming attacks and locked same-origin policies for web browsers.” C. Karlof,
`U. Shankar, J.D. Tygar, and D. Wagner. In Proceedings of the Fourteenth ACM
`Conference on Computer and Communications Security (CCS 2007), November 2007,
`pp. 58-71.
`
`“Coexistence proof using chain of timestamps for multiple RFID tags.” C. Lin, Y. Lai, J. D.
`Tygar, C. Yang, and C. Chiang. In Proceedings of Advances in Web and Network
`Technologies and Information Management, June 2007, pp. 634-643.
`“Why phishing works.” R. Dhamija, J. D. Tygar, and M. Hearst. In Proceedings of CHI-
`2006: Conference on Human Factors in Computing Systems, April 2006, pp. 581-590.
`
`“Can machine learning be secure?” M. Barreno, B. Nelson, R. Sears, A. Joseph, and J. D.
`Tygar. Invited paper. In Proceedings of the ACM Symposium on Information,
`Computer, and Communication Security, March 2006, pp. 16-25.
`
`“The battle against phishing: Dynamic security skins.” R. Dhamija and J. D. Tygar. In
`SOUPS 2005: Proceedings of the 2005 ACM Symposium on Usable Security and
`Privacy, ACM International Conference Proceedings Series, ACM Press, July 2005, pp. 77-
`88. (See also item 10.)
`
`“Collaborative filtering CAPTCHAs.” M. Chew and J. D. Tygar. In Human Interactive
`Proofs: Second International Workshop (HIP 2005), eds. H. Baird and D. Lopresti,
`Springer, May 2005, pp. 66-81.
`
`86.
`
`“Phish and HIPs: Human interactive proofs to detect phishing attacks.” R. Dhamija and J. D.
`Tygar. In Human Interactive Proofs: Second International Workshop (HIP 2005), eds.
`H. Baird and D. Lopresti, Springer, May 2005, pp. 127-141.
`10
`Curriculum Vitae (September 2017)
`
`Doug Tygar
`
`
`
`87.
`
`88.
`
`89.
`
`90.
`
`91.
`
`92.
`
`93.
`
`94.
`
`95.
`
`96.
`
`97.
`
`98.
`
`“Image recognition CAPTCHAs.” M. Chew and J. D. Tygar. In Proceedings of the 7th
`International Information Security Conference (ISC 2004), Springer, September 2004, pp.
`268-279. (A longer version appeared as UC Berkeley Computer Science Division technical
`report UCB/CSD-04-1333, June 2004.)
`
`
`
`“Side effects are not sufficient to authenticate software.” U. Shankar, M. Chew, and J. D.
`Tygar. In Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 89-
`101. (A version with an additional appendix appeared as UC Berkeley Computer Science
`Division technical report UCB/CSD-04-1363, September 2004.)
`
`“Statistical monitoring + predictable recovery = Self-*.” A Fox, E. Kiciman, D. Patterson, R.
`Katz, M. Jordan, I. Stoica and J. D. Tygar. In Proceedings of the 2nd Bertinoro Workshop
`on Future Directions in Distributed Computing (FuDiCo II), June 2004 (online
`proceedings).
`
`“Distillation codes and their application to DoS resistant multicast authentication.” C. Karlof,
`N. Sastry, Y. Li, A. Perrig, and J. D. Tygar. In Proceedings of the Network and
`Distributed System Security Conference (NDSS 2004), February 2004, pp. 37-56.
`
`“Privacy and security in the location-enhanced World Wide Web.” J. Hong, G. Boriello, J.
`Landay, D. McDonald, B. Schilit, and J. D. Tygar. In Proceedings of the Workshop on
`Privacy at Ubicomp 2003, October 2003 (online proceedings).
`“The problem with privacy.” J. D. Tygar. Keynote paper. In Proceedings of the 2003
`IEEE Workshop on Internet Applications, June 2003, pp. 2-8.
`“Safe staging for computer security.” A. Whitten and J. D. Tygar. In Proceedings of the
`2003 Workshop on Human-Computer Interaction and Security Systems, April 2003.
`
`“Expander graphs for digital stream authentication and robust overlay networks.” D. Song,
`D. Zuckerman, and J. D. Tygar. In Proceedings of the 2002 IEEE Symposium on Security
`and Privacy, May 2002, pp. 258-270.
`
`“ELK: A new protocol for efficient large-group key distribution.” A. Perrig, D. Song, and J.
`D. Tygar. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, May
`2001, pp. 247-262.
`
`“Efficient and secure source authentication for multicast.” A. Perrig, R. Canetti, D. Song,
`and J. D. Tygar. In Proceedings of the Internet Society Network and Distributed System
`Security Symposium (NDSS 2001), February 2001, pp. 35-46.
`
`“Efficient authentication and signing of multicast streams over lossy channels.” A. Perrig, R.
`Canetti, J. D. Tygar, and D. Song. In Proceedings of the 2000 IEEE Symposium on
`Security and Privacy, May 2000, pp. 56-73.
`
`“Flexible and scalable credential structures: NetBill implementation and experience.” Y.
`Kawakura, M. Sirbu., I. Simpson, and J. D. Tygar. In Proceedings of the International
`Workshop on Cryptographic Techniques and E-Commerce, July 1999, pp. 231-245.
`
`Curriculum Vitae (September 2017)
`
`11
`
`Doug Tygar
`
`
`
`99.
`
`100.
`
`101.
`
`102.
`
`103.
`
`104.
`
`105.
`
`106.
`
`107.
`
`108.
`
`109.
`
`110.
`
`
`
`“Open problems in electronic commerce.” J. D. Tygar. Invited address. In Proceedings of
`the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database
`Systems (PODS 1999), May 1999, p. 101.
`
` “Electronic auctions with private bids.” M. Harkavy, J. D. Tygar, and H. Kikuchi. In
`Proceedings of the 3rd USENIX Workshop on Electronic Commerce, September 1998,
`pp. 61-73.
`
` “Atomicity versus anonymity: Distributed transactions for electronic commerce.” J. D.
`Tygar. In Proceedings of the 24th International Conference on Very Large Data Bases,
`August 1998, pp. 1-12.
`
` “Smart cards in hostile environments.” H. Gobioff, S. Smith, J. D. Tygar, and B. Yee. In
`Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996,
`pp. 23-28. (An early version appeared as Carnegie Mellon University Computer Science
`technical report CMU-CS-95-188, September 1995.)
`
`“Anonymous atomic transactions.” L. J. Camp, M. Harkavy, and B. Yee. In
`
`Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996,
`pp. 123-133. (Preprint also available.) (An early version appeared as Carnegie Mellon
`University Computer Science technical report CMU-CS-96-156, July 1996.)
`
` “Model checking electronic commerce protocols.” N. Heintze, J. D. Tygar, J. Wing, and H.
`Wong. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce,
`November 1996, pp. 147-164.
`
` “WWW electronic commerce and Java Trojan horses.” J. D. Tygar and A. Whitten. In
`Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996,
`pp. 243-250.
`
` “Building blocks for atomicity in electronic commerce.” J. Su and J. D. Tygar. In
`Proceedings of the 6th USENIX Security Symposium, July 1996, pp. 97-102.
`
` “Token and notational money in electronic commerce.” L. J. Camp, M. Sirbu, and J. D.
`Tygar. In Proceedings of the 1st USENIX Workshop on Electronic Commerce, July
`1995, pp. 1-12. (An early version was presented at the Telecommunications Policy Research
`Conference, October 1994.)
`
` “NetBill security and transaction protocol.” B. Cox, J. D. Tygar, and M. Sirbu. In
`Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 77-
`88.
`
` “Secure coprocessors in electronic commerce applications.” B. Yee and J. D. Tygar. In
`Proceedings of the 1st USENIX Workshop on Electronic Commerce, July 1995, pp. 155-
`170.
`
` “Completely asynchronous optimistic recovery with minimal rollbacks.” S. Smith, D.
`Johnson, and J. D. Tygar. In Proceedings of the 25th IEEE Symposium on Fault-Tolerant
`Computing, June 1995, pp. 361-370. (An early version appears as Carnegie Mellon
`University Computer Science technical report CMU-CS-94-130, March 1994.)
`
`Curriculum Vitae (September 2017)
`
`12
`
`Doug Tyg