throbber
CV and Research Statement
`
`Markus Jakobsson
`www.linkedin.com/in/markusjakobsson
`www.markus-jakobsson.com
`
`1 At a Glance
`• Focus. Identification of security problems, trends and solution along four
`axes – computational, structural, physical and social; quantitative and
`qualitative fraud analysis; development of disruptive security technologies.
`• Education. PhD (Computer Science/Cryptography, University of Cali-
`fornia at San Diego, 1997); MSc (Computer Science, University of Cali-
`fornia at San Diego, 1994); MSc (Computer Engineering, Lund Institute
`of Technology, Sweden, 1993).
`• Large research labs. San Diego Supercomputer Center (Researcher,
`1996-1997); Bell Labs (Member of Technical Staff, 1997-2001); RSA Labs
`(Principal Research Scientist, 2001-2004); Xerox PARC (Principal Scien-
`tist, 2008-2010); PayPal (Principal Scientist of Consumer Security, Di-
`rector, 2010-2013); Qualcomm (Senior Director, 2013-2015); Agari (Chief
`Scientist, 2016–2018); Amber Solutions Inc (Chief of Security and Data
`Analytics, 2018 – 2019); ByteDance (Principal Scientist, 2020-2021)
`• Academia. New York University (Adjunct Associate Professor, 2002-
`2004); Indiana University (Associate Professor & Associate Director, 2004-
`2008; Adjunct Associate Professor, 2008-2016).
`• Entrepreneurial activity. ZapFraud (Anti-scam technology; CTO and
`founder, 2012-current); RavenWhite Security (Authentication solutions;
`CTO and founder, 2005-); RightQuestion (Consulting; Founder, 2007-
`current); FatSkunk (Malware detection; CTO and founder, 2009-2013 –
`FatSkunk was acquired by Qualcomm); LifeLock (Id theft protection;
`Member of fraud advisory board, 2009-2013); CellFony (Mobile security;
`Member of technical advisory board, 2009-2013); PopGiro (User Reputa-
`tion; Member of technical advisory board, 2012-2013); MobiSocial (Social
`networking, Member of technical advisory board, 2013); Cequence Security
`(Anti-fraud, Member of technical advisory board, 2013–current)
`• Anti-fraud consulting. KommuneData [Danish govt. entity] (1996);
`J.P. Morgan Chase (2006-2007); PayPal (2007-2011); Boku (2009-2010);
`Western Union (2009-2010).
`
`1
`
`Microsoft Ex. 1004, p. 1
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`• Intellectual Property, Testifying Expert Witness. Inventor of 100+
`patents; expert witness in 25+ patent litigation cases (McDermott, Will
`& Emery; Bereskin & Parr; WilmerHale; Hunton & Williams; Quinn
`Emanuel Urquhart & Sullivan; Freed & Weiss; Berry & Domer; Fish &
`Richardson; DLA Piper; Cipher Law Group; Keker & Van Nest). Details
`and references upon request.
`• Publications. Books: Phishing and Countermeasures: Understanding
`the Increasing Problem of Electronic Identity Theft (Wiley, 2006); Crime-
`ware: Understanding New Attacks and Defenses (Symantec Press, 2008);
`Towards Trustworthy Elections: New Directions in Electronic Voting (Springer
`Verlag, 2010); Mobile Authentication: Problems and Solutions )Springer
`Verlag, 2012); The Death of the Internet (Wiley, 2012); Understanding
`Social Engineering (Springer Verlag, 2016); Security, Privacy and User
`Interaction (Springer Verlag, 2020); 100+ peer-reviewed publications
`
`2 At a Glance
`Ten years before Bitcoin was created, I formalized the notion of Proof of Work
`and described its use for mining of crypto payments. I later developed energy-
`efficient alternatives to this paradigm, and showed how to enable mining on
`mobile devices, which is not possible for Bitcoin. I am the founder of the aca-
`demic discipline of phishing and have developed techniques to predict fraud
`trends years before they emerge, enabling countermeasures to be developed be-
`fore they are needed. I developed the notion of implicit authentication, which
`is now ubiquitous; I also founded a company that developed the first retroac-
`tive virus detection technology, with guarantees of detection; the company was
`acquired by Qualcomm in 2013.
`I have worked as chief scientist and similar
`positions in startups as well as industry behemoths, such as PayPal.
`I have
`several hundred patents to my name and am a prominent security researcher
`with hundreds of peer reviewed publications and an array of textbooks. My
`1997 PhD thesis, from University of California at San Diego, was on distributed
`electronic payment systems with revocable privacy.
`
`3 Work History (Highlights)
`
`1. Member of Technical Staff, Bell Labs (1997-2001). Markus was
`part of the security research group at Bell Labs. He formalized the notion
`of proof of work, later an integral part of BitCoin.
`
`2. Principal Scientist, RSA Labs (2001-2005). Markus posited that
`phishing would become a mainstream problem, and developed ethical tech-
`niques for identifying likely trends based on human subject experiments.
`
`3. Associate Professor, Indiana University (2005-2008). Markus was
`hired to lead the newly formed security group at Indiana University, and
`
`2
`
`Microsoft Ex. 1004, p. 2
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`created a research group comprising approximately 10 professors and 30
`students, studying social engineering and fraud.
`
`4. Principal Scientist, Xerox PARC (2008-2010). Markus was hired to
`lead the research efforts of the Xerox PARC security group, and developed
`the notion of implicit authentication, a technology that is now ubiquitous.
`
`5. Principal Scientist, PayPal (2010-2013). Markus did research on
`security and user interfaces, and developed techniques to reduce the losses
`associated with liar buyer fraud.
`
`6. Senior Director, Qualcomm (2013-2016). Qualcomm acquires FatSkunk,
`a company founded by Markus. At FatSkunk, Markus developed retroac-
`tive malware detection with provable security guarantees. A simplified
`version of this is now deployed with almost all Qualcomm chipsets.
`
`7. Chief Scientist, Agari (2016-2018). Markus developed a technique to
`acquire fraudster intelligence by compromising scammer email accounts –
`while staying within the law – resulting in the extradition of several African
`scam lords to the U.S.
`
`8. Chief of Security and Data Analytics, Amber Solutions (2018-
`2020). Markus developed usable configuration methods supporting im-
`proved security and privacy for IoT installations.
`
`9. Chief Scientist, ByteDance (2020-2021). Markus oversaw the estab-
`lishment of a research group and a research agenda at ByteDance, and
`contributed to their intellectual property and product security.
`
`4 Publication List
`
`Books (1-8); book chapters, journals, conference publications and other scientific
`publications (9-147), issued /published U.S. patents (148-234). For an updated
`list, and for international patents, please see www.markus-jakobsson.com/publications
`and appropriate patent search engines.
`
`References
`
`[1] M. Jakobsson, Security, Privacy and User Interaction, ISBN 978-3-030-
`43753-4, 110 pages, 2020.
`
`[2] M. Jakobsson, Understanding Social Engineering Based Scams, ISBN 978-
`1-4939-6457-4, 130 pages, Springer, 2016.
`
`[3] M. Jakobsson, Mobile Authentication: Problems and Solutions, ISBN
`1461448778, 125 pages, Springer, 2013.
`
`3
`
`Microsoft Ex. 1004, p. 3
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[4] M. Jakobsson, (editor) The Death of the Internet, ASIN B009CN2JVE, 359
`pages, IEEE Computer Society Press, 2012.
`
`[5] D. Chaum, M. Jakobsson, R. L. Rivest, P. Y. Ryan, J. Benaloh, and M.
`Kutylowski, (editors), Towards Trustworthy Elections: New Directions in
`Electronic Voting, 411 pages, (Vol. 6000), Springer, 2010.
`
`[6] M. Jakobsson and Z. Ramzan (editors), Crimeware: Trends in Attacks
`and Countermeasures, ISBN 0321501950, Hardcover, 582 pages, Symantec
`Press / Addison Wesley, 2008.
`
`[7] M. Jakobsson and S. A. Myers (editors), Phishing and Countermeasures:
`Understanding the Increasing Problem of Electronic Identity Theft, ISBN
`0-471-78245-9, Hardcover, 739 pages, Wiley, 2006.
`
`[8] M. Jakobsson, M. Yung, J. Zhou, Applied Cryptography and Network Se-
`curity: Second International Conference , Yellow Mountain, China, 2004,
`511 pages, Lecture Notes in Computer Science (Book 3089), 2004.
`
`[9] M. Jakobsson, “Permissions and Privacy,” in IEEE Security & Privacy, vol.
`18, no. 2, pp. 46-55, March-April 2020
`
`[10] M. Jakobsson, “The Rising Threat of Launchpad Attacks,” in IEEE Secu-
`rity & Privacy, vol. 17, no. 5, pp. 68-72, Sept.-Oct. 2019
`
`[11] J Koven, C Felix, H Siadati, M Jakobsson, E Bertini, “Lessons learned
`developing a visual analytics solution for investigative analysis of scamming
`activities,” IEEE transactions on visualization and computer graphics 25
`(1), 225-234
`
`[12] M Jakobsson, “Two-factor inauthentication?the rise in SMS phishing at-
`tacks” Computer Fraud & Security 2018 (6), 6-8
`
`[13] M. Dhiman, M. Jakobsson, T.-F. Yen, “Breaking and fixing content-based
`filtering,” 2017 APWG Symposium on Electronic Crime Research (eCrime),
`52-56
`
`[14] M. Jakobsson, “Addressing sophisticated email attacks,” 2017 International
`Conference on Financial Cryptography and Data Security, 310-317
`
`[15] M. Jakobsson, “User trust assessment: a new approach to combat decep-
`tion,” Proceedings of the 6th Workshop on Socio-Technical Aspects in Se-
`curity and Trust, 2016, pages 73-78
`
`[16] H. Siadati, T. Nguyen, P. Gupta, M. Jakobsson, “Mind your SMSes: Miti-
`gating social engineering in second factor authentication,” Computers and
`Security, 2016
`
`[17] M. Jakobsson, W. Leddy, “Could you fall for a scam? Spam filters are
`passe. What we need is software that unmasks fraudsters,” IEEE Spectrum
`53 (5), 2016, 40-55
`
`4
`
`Microsoft Ex. 1004, p. 4
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[18] N. Sae-Bae, M. Jakobsson, Hand Authentication on Multi-Touch Tablets,
`HotMobile 2014
`
`[19] Y. Park, J. Jones, D. McCoy, E. Shi, M. Jakobsson, Scambaiter: Under-
`standing Targeted Nigerian Scams on Craigslist, NDSS 2014
`
`[20] D. Balfanz, R. Chow, O. Eisen, M. Jakobsson, S. Kirsch, S. Matsumoto, J.
`Molina, and P. van Oorschot, “The future of authentication,” Security &
`Privacy, IEEE, 10(1), 22-27, 2012.
`
`[21] M. Jakobsson, and H. Siadati, Improved Visual Preference Authentication:
`Socio-Technical Aspects in Security and Trust, (STAST), 2012 Workshop
`on IEEE, 27–34, 2012.
`
`[22] M. Jakobsson, R. I. Chow, and J. Molina, “Authentication-Are We Do-
`ing Well Enough?[Guest Editors’ Introduction]” Security & Privacy, IEEE,
`10(1), 19-21, 2012.
`
`[23] E. Shi, Y. Niu, M. Jakobsson, and R. Chow, “Implicit authentication
`through learning user behavior,” Information Security, 99-113, Springer
`Berlin Heidelberg, 2011.
`
`[24] M. Jakobsson and K. Johansson, “Practical and Secure Software-Based
`Attestation,” Lightweight Security & Privacy: Devices, Protocols and Ap-
`plications (LightSec), 1–9, 2011.
`
`[25] A. Juels, D. Catalano, and M.Jakobsson, Coercion-resistant electronic elec-
`tions: Towards Trustworthy Elections, 37–63, Springer Berlin Heidelberg,
`2010.
`
`[26] M. Jakobsson and F. Menczer, “Web Forms and Untraceable DDoS At-
`tacks,” in Network Security, Huang, S., MacCallum, D., and Du, D. Z.,
`Eds.,77–95, Springer, 2010.
`
`[27] R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z.
`Song, “Authentication in the Clouds: A Framework and its Application to
`Mobile Users,” 2010.
`
`[28] X. Wang, P. Golle, M. Jakobsson, and A. Tsow, “Deterring voluntary trace
`disclosure in re-encryption mix-networks,” ACM Trans. Inf. Syst. Secur.,
`13(2), 1-24, 2010.
`
`[29] X. Wang, P. Golle, M. Jakobsson, A.Tsow, “Deterring voluntary trace dis-
`closure in re-encryption mix-networks,” ACM Trans. Inf. Syst. Secur. 13(2):
`(2010)
`
`[30] M. Jakobsson, and C. Soghoian, “Social Engineering in Phishing,” Infor-
`mation Assurance, Security and Privacy Services, 4, 2009.
`
`[31] M. Jakobsson, C. Soghoian and S. Stamm, “Phishing,” Handbook of Fi-
`nancial Cryptography (CRC press, 2008)
`
`5
`
`Microsoft Ex. 1004, p. 5
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[32] M. Jakobsson and A. Tsow, “Identity Theft,” In John R. Vacca, Edi-
`tor, “Computer And Information Security Handbook” (Morgan Kaufmann,
`2008)
`
`[33] S. Srikwan and M. Jakobsson, “Using Cartoons to Teach Internet Security,”
`Cryptologia, vol. 32, no. 2, 2008
`
`[34] M. Jakobsson, N. Johnson and P. Finn, “Why and How to Perform Fraud
`Experiments,” IEEE Security and Privacy, March/April 2008 (Vol. 6, No.
`2) pp. 66-68
`
`[35] M. Jakobsson and S. Myers, “Delayed Password Disclosure,” International
`Journal of Applied Cryptography, 2008, pp. 47-59.
`
`[36] M. Jakobsson and S. Stamm, “Web Camouflage: Protecting Your Clients
`from Browser Sniffing Attacks,” IEEE Security & Privacy Magazine.
`November/December 2007
`
`[37] P. Finn and M. Jakobsson, “Designing and Conducting Phishing Experi-
`ments,” IEEE Technology and Society Magazine, Special Issue on Usability
`and Security
`
`[38] T. Jagatic, N. Johnson, M. Jakobsson and F. Menczer. “Social Phishing,”
`The Communications of the ACM, October 2007
`
`[39] A. Tsow, M. Jakobsson, L. Yang and S. Wetzel, “Warkitting: the Drive-by
`Subversion of Wireless Home Routers,” Anti-Phishing and Online Fraud,
`Part II Journal of Digital Forensic Practice, Volume 1, Special Issue 3,
`November 2006
`
`[40] M. Gandhi, M. Jakobsson and J. Ratkiewicz, “Badvertisements: Stealthy
`Click-Fraud with Unwitting Accessories,” Anti-Phishing and Online Fraud,
`Part I Journal of Digital Forensic Practice, Volume 1, Special Issue 2,
`November 2006
`
`[41] N. Ben Salem, J.-P. Hubaux and M. Jakobsson. “Reputation-based Wi-Fi
`Deployment,” Mobile Computing and Communications Review, Volume 9,
`Number 3 (Best papers of WMASH 2004)
`
`[42] N. Ben Salem, J. P. Hubaux, and M. Jakobsson. “Node Cooperation in
`Hybrid Ad hoc Networks,” IEEE Transactions on Mobile Computing, Vol.
`5, No. 4, April 2006.
`
`[43] P. MacKenzie, T. Shrimpton, and M. Jakobsson. “Threshold Password-
`Authenticated Key Exchange,” Journal of Cryptology, 2005
`
`[44] A. Juels, M. Jakobsson, E. Shriver, and B. Hillyer. “How To Turn Loaded
`Dice Into Fair Coins.” IEEE Transactions on Information Theory, vol.
`46(3). May 2000. pp. 911–921.
`
`6
`
`Microsoft Ex. 1004, p. 6
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[45] M. Jakobsson, P. MacKenzie, and J.P. Stern. “Secure and Lightweight Ad-
`vertising on the Web,” Journal of Computer Networks, vol. 31, issue 11–16,
`Elsevier North-Holland, Inc., 1999. pp. 1101–1109.
`
`[46] M. Jakobsson, “Cryptographic Protocols,” Chapter from The Handbook
`of Information Security. Hossein Bidgoli, Editor-in-Chief. Copyright John
`Wiley & Sons, Inc., 2005, Hoboken, N.J.
`
`[47] M. Jakobsson, “Cryptographic Privacy Protection Techniques,” Chapter
`from The Handbook of Information Security. Hossein Bidgoli, Editor-in-
`Chief. Copyright John Wiley & Sons, Inc., 2005, Hoboken, N.J.
`
`[48] M. Jakobsson, E. Shi, P. Golle, R. Chow, “Implicit authentication for mo-
`bile devices,” 4th USENIX Workshop on Hot Topics in Security (HotSec
`’09); 2009 August 11; Montreal, Canada.
`
`[49] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, J.
`Molina, “Controlling data in the cloud: outsourcing computation without
`outsourcing control,” Proceedings of the 2009 ACM Workshop on Cloud
`Computing Security (CCSW 2009); 2009 November 13; Chicago, IL. NY:
`ACM; 2009; pp. 85–90.
`
`[50] M. Jakobsson, H. Siadati, M. Dhiman, “Liar Buyer Fraud, and How to
`Curb It,” NDSS, 2015
`
`[51] M. Jakobsson, T.-F. Yen, “How Vulnerable Are We To Scams?,” BlackHat,
`2015
`
`[52] M. Jakobsson, “How to Wear Your Password,” BlackHat, 2014
`
`[53] M. Jakobsson and G. Stewart, “Mobile Malware: Why the Traditional
`AV Paradigm is Doomed, and How to Use Physics to Detect Undesirable
`Routines,” in BlackHat, 2013.
`
`[54] M. Jakobsson, and H. Siadati,“SpoofKiller: You Can Teach People How to
`Pay, but Not How to Pay Attention” in Socio-Technical Aspects in Security
`and Trust (STAST), 2012 Workshop on, 3-10, 2012.
`
`[55] M. Jakobsson, and M. Dhiman,“The benefits of understanding passwords,”
`in Proceedings of the 7th USENIX conference on Hot Topics in Security,
`Berkeley, CA, USA, 2012.
`
`[56] M. Jakobsson, and S. Taveau, “The Case for Replacing Passwords with
`Biometrics,” Mobile Security Technologies, 2012.
`
`[57] M. Jakobsson and D. Liu, “Bootstrapping mobile PINs using passwords,”
`W2SP, 2011.
`
`[58] M. Jakobsson and R. Akavipat, “Rethinking passwords to adapt to con-
`strained keyboards,” 2011.
`
`7
`
`Microsoft Ex. 1004, p. 7
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[59] Y. Niu, E. Shi, R. Chow, P. Golle, and M. Jakobsson, “One Experience
`Collecting Sensitive Mobile Data,” In USER Workshop of SOUPS, 2010.
`
`[60] E. Shi, Y. Niu, M. Jakobsson, and R. Chow, “Implicit Authentication
`through Learning User Behavior,” 2010.
`
`[61] M. Jakobsson and K. Johansson, Assured Detection of Malware With Ap-
`plications to Mobile Platforms, 2010.
`
`[62] M. Jakobsson and K. Johansson, “Retroactive Detection of Malware With
`Applications to Mobile Platforms,” in HotSec 2010, Washington, DC, 2010.
`
`[63] M. Jakobsson, A Central Nervous System for Automatically Detecting Mal-
`ware, 2009.
`
`[64] R. Chow, P. Golle, M. Jakobsson, R. Masuoka, J. Molina, E. Shi, and J.
`Staddon, “Controlling data in the cloud: outsourcing computation with-
`out outsourcing control,” ACM workshop on Cloud computing security
`(CCSW), 2009.
`
`[65] M. Jakobsson and A. Juels, “Server-Side Detection of Malware Infection,”
`in New Security Paradigms Workshop (NSPW), Oxford, UK, 2009.
`
`[66] M. Jakobsson, “Captcha-free throttling,” Proceedings of the 2nd ACM
`workshop on Security and artificial intelligence, 15–22, 2009.
`
`[67] M. Jakobsson, E. Shi, P. Golle, and R. Chow, “Implicit authentication for
`mobile devices,” Proceedings of the 4th USENIX conference on Hot topics
`in security, 9–9, 2009.
`
`[68] C. Soghoian, O. Friedrichs and M. Jakobsson, “The Threat of Political
`Phishing,” International Symposium on Human Aspects of Information
`Security & Assurance (HAISA 2008)
`
`[69] R. Chow, P. Golle, M. Jakobsson, L. Wang and X. Wang, “Making
`CAPTCHAs Clickable,” In proc. of HotMobile 2008.
`
`[70] M. Jakobsson, A. Juels, and J. Ratkiewicz, “Privacy-Preserving History
`Mining for Web Browsers,” Web 2.0 Security and Privacy, 2008.
`
`[71] M. Jakobsson, E. Stolterman, S. Wetzel, L. Yang, “Love and Authenti-
`cation,” (Notes) ACM Computer/Human Interaction Conference (CHI),
`2008. Also see www.I-forgot-my-password.com
`
`[72] M. Jakobsson and S. Myers, “Delayed Password Disclosure,” Proceedings
`of the 2007 ACM workshop on Digital Identity Management
`
`[73] M. Jakobsson, S. Stamm, Z. Ramzan, “JavaScript Breaks Free,” W2SP ’07
`
`[74] A. Juels, S. Stamm, M. Jakobsson, “Combatting Click Fraud via Premium
`Clicks,” USENIX Security 2007
`
`8
`
`Microsoft Ex. 1004, p. 8
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[75] R. Chow, P. Golle, M. Jakobsson, X. Wang, “Clickable CAPTCHAs,” Ad-
`Fraud ’07 Workshop; 2007 September 14; Stanford, CA, USA
`
`[76] S. Stamm, Z. Ramzan, and M. Jakobsson, “Drive-by Pharming,” In Pro-
`ceedings of Information and Communications Security, 9th International
`Conference, ICICS 2007
`
`[77] M. Jakobsson, A. Tsow, A. Shah, E. Blevis, Y.-K. Lim, “What Instills
`Trust? A Qualitative Study of Phishing,” USEC ’07.
`
`[78] R. Akavipat, V. Anandpara, A. Dingman, C. Liu, D. Liu, K. Pongsanon,
`H. Roinestad and M. Jakobsson, “Phishing IQ Tests Measure Fear, not
`Ability,” USEC ’07.
`
`[79] M. Jakobsson, “The Human Factor in Phishing,” American Conference
`Institute’s Forum on Privacy & Security of Consumer Information, 2007
`
`[80] S. Srikwan, M. Jakobsson, A. Albrecht and M. Dalkilic, “Trust Establish-
`ment in Data Sharing: An Incentive Model for Biodiversity Information
`Systems,” TrustCol 2006
`
`[81] J.Y. Choi, P. Golle, M. Jakobsson, “Tamper-Evident Digital Signatures:
`Protecting Certification Authorities Against Malware,” DACS ’06
`
`[82] L. Yang, M. Jakobsson, S. Wetzel, “Discount Anonymous On Demand
`Routing for Mobile Ad hoc Networks,” SECURECOMM ’06
`
`[83] P. Golle, X. Wang, M. Jakobsson, A. Tsow, “Deterring Voluntary Trace
`Disclosure in Re-encryption Mix Networks.” IEEE S&P ’06
`
`[84] M. Jakobsson, A. Juels, T. Jagatic, “Cache Cookies for Browser Authenti-
`cation (Extended Abstract),” IEEE S&P ’06
`
`[85] M. Jakobsson and J. Ratkiewicz, “Designing Ethical Phishing Experiments:
`A study of (ROT13) rOnl auction query features.”, WWW ’06
`
`[86] M. Jakobsson and S. Stamm. “Invasive Browser Sniffing and Countermea-
`sures,” WWW ’06
`
`[87] J.Y. Choi, P. Golle and M. Jakobsson. “Auditable Privacy: On Tamper-
`Evident Mix Networks,” Financial Crypto ’06
`
`[88] A. Juels, D. Catalano and M. Jakobsson. “Coercion-Resistant Electronic
`Elections,” WPES ’05
`
`[89] V. Griffith and M. Jakobsson. “Messin’ with Texas, Deriving Mother’s
`Maiden Names Using Public Records,” ACNS ’05, 2005.
`
`[90] M. Jakobsson and L. Yang. “Quantifying Security in Hybrid Cellular Net-
`works,” ACNS ’05, 2005
`
`9
`
`Microsoft Ex. 1004, p. 9
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[91] Y.-C. Hu, M. Jakobsson, and A. Perrig. “Efficient Constructions for One-
`way Hash Chains,” ACNS ’05, 2005
`
`[92] M. Jakobsson. “Modeling and Preventing Phishing Attacks,” Phishing
`Panel in Financial Cryptography ’05. 2005, abstract in proceedings.
`
`[93] N. Ben Salem, J.-P. Hubaux, and M. Jakobsson. “Reputation-based Wi-
`Fi Deployment Protocols and Security Analysis,” In WMASH ’04. ACM
`Press, 2004. pp. 29–40.
`
`[94] M. Jakobsson and S. Wetzel. “Efficient Attribute Authentication with Ap-
`plications to Ad Hoc Networks,” In VANET ’04. ACM Press, 2004. pp.
`38–46.
`
`[95] M. Jakobsson, X. Wang, and S. Wetzel. “Stealth Attacks in Vehicular Tech-
`nologies,” Invited paper. In Proceedings of IEEE Vehicular Technology
`Conference 2004 Fall (VTC-Fall 2004). IEEE, 2004.
`
`[96] A. Ambainis, H. Lipmaa, and M. Jakobsson. “Cryptographic Randomized
`Response Technique,” In PKC ’04. LNCS 2947. Springer-Verlag, 2004. pp.
`425–438.
`
`[97] P. Golle, M. Jakobsson, A. Juels, and P. Syverson. “Universal Re-
`encryption for Mixnets,” In CT-RSA ’04. LNCS 2964. Springer-Verlag,
`2004. pp. 163–178.
`
`[98] P. Golle and M. Jakobsson. “Reusable Anonymous Return Channels,” In
`WPES ’03. ACM Press, 2003. pp. 94–100.
`
`[99] M. Jakobsson, S. Wetzel, B. Yener. “Stealth Attacks on Ad-Hoc Wireless
`Networks,” In IEEE VTC ’03, 2003.
`
`[100] N. Ben Salem, L. Buttyan, J.-P. Hubaux, and M. Jakobsson. “A Charg-
`ing and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular
`Networks,” In ACM MobiHoc ’03. ACM Press, 2003. pp. 13–24.
`
`[101] M. Jakobsson, J.-P.Hubaux and L. Buttyan. “A Micro-Payment Scheme
`Encouraging Collaboration in Multi-Hop Cellular Networks,” In FC ’03.
`LNCS 2742. Springer-Verlag, 2003. pp. 15–33.
`
`[102] M. Jakobsson, T. Leighton, S. Micali and M. Szydlo. “Fractal Merkle Tree
`Representation and Traversal,” In RSA-CT ’03 2003.
`
`[103] A. Boldyreva and M Jakobsson. “Theft protected proprietary certificates,”
`In DRM ’02. LNCS 2696, 2002. pp. 208–220.
`
`[104] P. Golle, S. Zhong, M. Jakobsson, A. Juels, and D. Boneh. “Optimistic
`Mixing for Exit-Polls,” In Asiacrypt ’02. LNCS 2501. Springer-Verlag, 2002.
`pp. 451–465.
`
`10
`
`Microsoft Ex. 1004, p. 10
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[105] P. MacKenzie, T. Shrimpton, and M. Jakobsson. “Threshold Password-
`Authenticated Key Exchange,” In CRYPTO ’02. LNCS 2442. Springer-
`Verlag, 2002. pp. 385–400.
`
`[106] M. Jakobsson. “Fractal Hash Sequence Representation and Traversal,” In
`Proceedings of the 2002 IEEE International Symposium on Information
`Theory (ISIT ‘02). 2002. pp. 437–444.
`
`[107] M. Jakobsson, A. Juels, and R. Rivest. “Making Mix Nets Robust For
`Electronic Voting By Randomized Partial Checking,” In Proceedings of
`the 11th USENIX Security Symposium. USENIX Association, 2002. pp.
`339–353.
`
`[108] D. Coppersmith and M. Jakobsson. “Almost Optimal Hash Sequence
`Traversal,” In Financial Crypto ’02. 2002.
`
`[109] M. Jakobsson. “Financial Instruments in Recommendation Mechanisms,”
`In Financial Crypto ’02. 2002.
`
`[110] J. Garay, and M. Jakobsson. “Timed Release of Standard Digital Signa-
`tures,” In Financial Crypto ’02. 2002.
`
`[111] F. Menczer, N. Street, N. Vishwakarma, A. Monge, and M. Jakobsson.
`“Intellishopper: A Proactive, Personal, Private Shopping Assistant,” In
`AAMAS ’02. ACM Press, 2002. pp. 1001–1008.
`
`[112] M. Jakobsson, A. Juels, and P. Nguyen. “Proprietary Certificates,” In
`CT-RSA ’02. LNCS 2271. Springer-Verlag, 2002. pp. 164–181.
`
`[113] M. Jakobsson and A. Juels. “An Optimally Robust Hybrid Mix Network,”
`In PODC ’01. ACM Press. 2001. pp. 284–292.
`
`[114] M. Jakobsson and M. Reiter. “Discouraging Software Piracy Using Soft-
`ware Aging,” In DRM ’01. LNCS 2320. Springer-Verlag, 2002. pp. 1–12.
`
`[115] M. Jakobsson and S. Wetzel. “Security Weaknesses in Bluetooth,” In CT–
`RSA ’01. LNCS 2020. Springer-Verlag, 2001. pp. 176–191.
`
`[116] M. Jakobsson and D. Pointcheval. “Mutual Authentication for Low-Power
`Mobile Devices,” In Financial Crypto ’01. LNCS 2339. Springer-Verlag,
`2001. pp. 178–195.
`
`[117] M. Jakobsson, D. Pointcheval, and A. Young. “Secure Mobile Gambling,”
`In CT–RSA ’01. LNCS 2020. Springer-Verlag, 2001. pp. 110–125.
`
`[118] M. Jakobsson and S.Wetzel. “Secure Server-Aided Signature Generation,”
`In PKC ’01. LNCS 1992. Springer-Verlag, 2001. pp. 383–401.
`
`[119] M. Jakobsson and A. Juels. “Addition of ElGamal Plaintexts,” In T.
`Okamoto, ed., ASIACRYPT ’00. LNCS 1976. Springer-Verlag, 2000. pp.
`346–358.
`
`11
`
`Microsoft Ex. 1004, p. 11
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[120] M. Jakobsson, and A. Juels. “Mix and Match: Secure Function Evaluation
`via Ciphertexts,” In ASIACRYPT ’00. LNCS 1976. Springer-Verlag, 2000.
`pp. 162–177.
`
`[121] R. Arlein, B. Jai, M. Jakobsson, F. Monrose, and M. Reiter. “Privacy-
`Preserving Global Customization,” In ACM E-Commerce ’00. ACM Press,
`2000. pp. 176–184.
`
`[122] C.-P. Schnorr and M. Jakobsson. “Security of Signed ElGamal Encryp-
`tion,” In ASIACRYPT ’00. LNCS 1976. Springer-Verlag, 2000. pp. 73–89.
`
`[123] P. Bohannon, M. Jakobsson, and S. Srikwan. “Cryptographic Approaches
`to Privacy in Forensic DNA Databases,” In Public Key Cryptography ’00.
`LNCS 1751. Springer-Verlag, 2000, pp. 373–390.
`
`[124] J. Garay, M. Jakobsson, and P. MacKenzie. “Abuse-free Optimistic Con-
`tract Signing,” In CRYPTO ’99. LNCS 1666. Springer-Verlag, 1999. pp.
`449–466.
`
`[125] M. Jakobsson. “Flash Mixing,” In PODC ’99. ACM Press, 1999. pp. 83–
`89.
`
`[126] G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson. “How
`To Forget a Secret,” In STACS ’99. LNCS 1563. Springer-Verlag, 1999. pp.
`500–509.
`
`[127] M. Jakobsson, D. M’Raihi, Y. Tsiounis, and M. Yung. “Electronic Pay-
`ments: Where Do We Go from Here?,” In CQRE (Secure) ’99. LNCS 1740.
`Springer-Verlag, 1999. pp. 43–63.
`
`[128] C.P. Schnorr and M. Jakobsson. “Security Of Discrete Log Cryptosystems
`in the Random Oracle + Generic Model,” In Conference on The Mathe-
`matics of Public-Key Cryptography. 1999.
`
`[129] M. Jakobsson and A. Juels “Proofs of Work and Breadpudding Protocols,”
`In CMS ’99. IFIP Conference Proceedings, Vol. 152. Kluwer, B.V., 1999.
`pp. 252 – 272.
`
`[130] M. Jakobsson and C-P Schnorr. “Efficient Oblivious Proofs of Correct Ex-
`ponentiation,” In CMS ’99. IFIP Conference Proceedings, Vol. 152. Kluwer,
`B.V., 1999. pp. 71–86.
`
`[131] M. Jakobsson, P. MacKenzie, and J.P. Stern. “Secure and Lightweight
`Advertising on the Web,” In World Wide Web ’99
`
`[132] M. Jakobsson, J.P. Stern, and M. Yung. “Scramble All, Encrypt Small,”
`In Fast Software Encryption ’99. LNCS 1636. Springer-Verlag, 1999. pp.
`95–111.
`
`12
`
`Microsoft Ex. 1004, p. 12
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[133] M. Jakobsson and J. Mueller. “Improved Magic Ink Signatures Using
`Hints,” In Financial Cryptography ’99. LNCS 1648. Springer-Verlag, 1999.
`pp. 253–268.
`
`[134] M. Jakobsson. “Mini-Cash: A Minimalistic Approach to E-Commerce,”
`In Public Key Cryptography ’99. LNCS 1560. Springer-Verlag, 1999. pp.
`122–135.
`
`[135] M. Jakobsson. “On Quorum Controlled Asymmetric Proxy Re-
`encryption,” In Public Key Cryptography ’99. LNCS 1560. Springer-Verlag,
`1999. pp. 112–121.
`
`[136] M. Jakobsson and A. Juels. “X-Cash: Executable Digital Cash,” In Fi-
`nancial Cryptography ’98. LNCS 1465. Springer-Verlag, 1998. pp. 16–27.
`
`[137] M. Jakobsson and D. M’Raihi. “Mix-based Electronic Payments,” In Pro-
`ceedings of the Selected Areas in Cryptography. LNCS 1556. Springer-
`Verlag, 1998. pp. 157173.
`
`[138] M. Jakobsson, E. Shriver, B. Hillyer, and A. Juels. “A Practical Secure
`Physical Random Bit Generator,” In CCS ’98: Proceedings of the 5th ACM
`conference on Computer and communications security. ACM Press, 1998.
`pp. 103–111.
`
`[139] M. Jakobsson. “A Practical Mix,” In Advances in Cryptology – EuroCrypt
`’98. LNCS 1403. Springer-Verlag, 1998. pp. 448–461.
`
`[140] M. Jakobsson and M. Yung. “On Assurance Structures for WWW Com-
`merce,” In Financial Cryptography ’98. LNCS 1465. Springer-Verlag, 1998.
`pp. 141–157.
`
`[141] E. Gabber, M. Jakobsson, Y. Matias, and A. Mayer. “Curbing Junk E-
`Mail via Secure Classification,” In Financial Cryptography ’98. LNCS 1465.
`Springer-Verlag, 1998. pp. 198–213.
`
`[142] M. Jakobsson and M. Yung. “Distributed ‘Magic Ink’ Signatures,” In Ad-
`vances in Cryptology – EuroCrypt ’97. LNCS 1233. Springer-Verlag, 1997.
`pp. 450–464.
`
`[143] M. Jakobsson and M. Yung. “Applying Anti-Trust Policies to Increase
`Trust in a Versatile E-Money System,” In Financial Cryptography ’97.
`LNCS 1318. Springer-Verlag, 1997. pp. 217–238.
`
`[144] A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung.
`“Proactive public-key and signature schemes,” In Proceedings of the 4th
`Annual Conference on Computer Communications Security. ACM Press,
`1997. pp. 100–110.
`
`13
`
`Microsoft Ex. 1004, p. 13
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[145] M. Bellare, M. Jakobsson, and M. Yung. “Round-Optimal Zero-
`Knowledge Arguments Based on any One-Way Function,” In Advances
`in Cryptology – EuroCrypt ’97. LNCS 1233. Springer-Verlag, 1997. pp.
`280–305.
`
`[146] M. Jakobsson and M. Yung. “Proving Without Knowing,” In Crypto ’96.
`LNCS 1109. Springer-Verlag, 1996. pp. 186–200.
`
`[147] M. Jakobsson, K. Sako, and R. Impagliazzo. “Designated Verifier Proofs
`and Their Applications,” In Advances in Cryptology – EuroCrypt ’96.
`LNCS 1070. Springer-Verlag, 1996. pp. 143–154.
`
`[148] M. Jakobsson and M. Yung. “Revokable and Versatile Electronic Money,”
`In CCS ’96: Proceedings of the 3rd ACM conference on Computer and
`communications security. ACM Press, 1996. pp. 76–87.
`
`[149] M. Jakobsson. “Ripping Coins for a Fair Exchange,” In Advances in Cryp-
`tology – EuroCrypt ’95. LNCS 921. Springer-Verlag, 1995. pp. 220–230.
`
`[150] M. Jakobsson. “Blackmailing using Undeniable Signatures,” In Advances
`in Cryptology EuroCrypt ’94. LNCS 950. Springer-Verlag, 1994. pp. 425–
`427.
`
`[151] M. Jakobsson. “Reducing costs in identification protocols,” Crypto ’92,
`1992.
`
`[152] M. Jakobsson. “Machine-Generated Music with Themes,” In International
`Conference on Artificial Neural Networks ’92. Vol 2. Amsterdam: Elsevier,
`1992. pp. 1645–1646
`
`[153] M. Jakobsson, “Social Engineering 2.0: What’s Next,” McAfee Security
`Journal, Fall 2008
`
`[154] M. Jakobsson and S. Myers, “Delayed Password Disclosure,” ACM
`SIGACT News archive, Volume 38, Issue 3 (September 2007), pp. 56 -
`75
`
`[155] V. Griffith and M. Jakobsson. “Messin’ with Texas, Deriving Mother’s
`Maiden Names Using Public Records,” CryptoBytes, 2007.
`
`[156] M. Jakobsson, A. Juels, J. Ratkiewicz, “Remote-Harm Detection,” Beta-
`version available at rhd.ravenwhitedevelopment.com/
`
`[157] S. Stamm, M. Jakobsson, “Social Malware,” Experimental results avail-
`able at www.indiana.edu/ phishing/verybigad/
`
`[158] M. Jakobsson. “Privacy vs. Authenticity,” Ph.D. Thesis, University of
`California at San Diego, 1997
`
`Jakobsson, Automatic PIN creation
`[159] Markus
`US20130125214 A1, 2012.
`
`using
`
`passwords,
`
`14
`
`Microsoft Ex. 1004, p. 14
`Microsoft v. Daedalus Blue
`IPR2021-00832
`
`

`

`[160] Markus Jakobsson, Systems and methods for creating a user credential
`and authentication using the created user credential, US 20130111571 A1,
`2012.
`
`[161] Markus Jakobsson, Password check by decomposing password, US
`20120284783 A1, 2012.
`
`[162] Markus Jakobsson, William Leddy, System and methods for protecting
`users from malicious content, US 20120192277 A1, 2011.
`
`[163] Markus Jakobsson, Karl-Anders R. Johansson, Auditing a device,
`US8370935 B1, 2011.
`
`[164] Markus Jakobsson, Methods and Apparatus for Efficient Computation of
`One-Way Chains in Cryptographic Applications, US20120303969 A1, 2011.
`
`[165] Markus Jakobsson, Automatic PIN creation using password, US
`20120110634 A1, 2011.
`
`[166] Markus Jakobsson, Jim Roy Palmer, Gustavo Maldonado, Interactive
`CAPTCHA, US20130007875 A1, 2011.
`
`[167] Markus Jakobsson, System access determination based on classification of
`stimuli, US 20110314559 A1, 2011.
`
`[168] Markus Jakobsson, System access determination based on classification of
`stimuli, WO 2011159356 A1, 2011.
`
`[169] Markus Jakobsson, Method, medium, and system for reducing fraud by
`increasing guilt during a purchase transaction, US8458041 B1, 2011.
`
`[170] Markus Jakobsson, Visuali

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket