throbber
Dave Levin
`
`Contact Info
`
`Email: dml@cs.umd.edu
`
`Webpage: https://www.cs.umd.edu/∼dml
`
`Academic
`Appointment
`
`Education
`
`University of Maryland, College Park, MD USA
`
`Assistant Professor
`2017 – present
`My research focus is on systems and network security. I am also Chair of the Computer Science Undergrad-
`uate Honors program. I am affiliated with UMIACS, MC2, and the Maryland-Max-Planck PhD Program.
`
`University of Maryland, College Park, Maryland USA
`Ph.D., Computer Science, September 2010
`• Dissertation: Systems-compatible Incentives
`• Advisors: Bobby Bhattacharjee, Neil Spring, and Aravind Srinivasan
`B.S., Computer Science, May 2002
`B.S., Mathematics, May 2002
`
`University of Notre Dame, Notre Dame, Indiana USA
`Attended August 1997 – May 1999
`
`Honors and Awards • Facebook/USENIX Internet Defense Prize (3rd place), for WeaponizingMiddleboxesforTCP Reflected
`Amplification, 2021
`• Distinguished paper award, USENIX Security 2021, for Weaponizing Middleboxes for TCP Reflected
`Amplification
`• IRTF Applied Networking Research Prize (ANRP) for Come as You Are: Helping Unmodified Clients
`Bypass CensorshipwithServer-sideEvasion, 2021
`• NCWIT (National Center for Women & Information Technology) Undergraduate Research Mentoring
`Award, 2020
`• NSF CAREER Award, 2020
`• IRTF Applied Networking Research Prize (ANRP) for UnderstandingtheRoleofRegistrarsinDNSSEC
`Deployment, 2019
`• Dean’s Award for Excellence in Teaching, College of Computer, Mathematical, and Natural Sciences,
`2018
`• IEEE Cybersecurity Award for Innovation 2017, for CRLite: A Scalable System for Pushing All TLS
`Revocationsto All Browsers
`• Distinguished paper award, USENIX Security 2017, for ALongitudinal,End-to-EndViewoftheDNSSEC
`Ecosystem
`• Reviewer award, SIGCOMM 2012
`• Best paper, USENIX NSDI 2009, for TrInc: SmallTrustedHardwareforLargeDistributedSystems
`• Best presentation, Computer Science track of UMD Graduate Research Interaction Day, 2009
`• Microsoft Live Labs fellowship, awarded 2008
`• Dean’s fellowship for excellence in research, Computer Science Dept., Univ. of Maryland, 2006
`• Outstanding undergraduate computer science teaching assistant award, Univ. of Maryland, 2002
`
`Refereed
`Publications
`
`1. Sound Methodology for Downloading Webpages
`Soumya Indela, Dave Levin
`TMA 2021 (Network Traffic Measurement and Analysis Conference)
`
`2. Even Censors Have a Backup: Examining the GFWs Double HTTPS Censorship System
`Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin
`FOCI 2021 (ACM Workshop on Free and Open Communications on the Internet)
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 1 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 1 of 13
`
`

`

`3. Bento: Safely Bringing Network Function Virtualization to Tor
`Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Jayson Hurst, Christina Garman,
`Dave Levin
`ACM SIGCOMM 2021
`
`4. The Ties that un-Bind: Decoupling IP from web services and sockets for robust addressing agility
`at CDN-scale
`Marwan Fayed, Vasileios Giotsas, Lorenz Bauer, Sami Kerola, Marek Majkowski, Pavel Odintsov, Jakub
`Sitnicki, Taejoong Chung, Dave Levin, Alan Mislove, Nick Sullivan, Chris Wood
`ACM SIGCOMM 2021
`
`5. Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
`Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
`WOOT 2021 (IEEE Workshop on Offensive Technologies)
`
`6. Measurement and Analysis of Automated Certificate Reissuance
`Olamide Omolola, Richard Roberts, Ishtiaq Ashiq, Taejoong Chung, Dave Levin, Alan Mislove
`PAM 2021 (Passive and Active Measurement Conference)
`
`7. Under the Hood of the Ethereum Gossip Protocol
`Lucianna Kiffer, Asad Salman, Dave Levin, Alan Mislove, Cristina Nita-Rotaru
`FC 2021 (Financial Cryptography and Data Security)
`
`8. Weaponizing Middleboxes for TCP Reflected Amplification
`Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
`USENIX Security 2021
`
`9. Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Whitelister
`Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
`FOCI 2020 (USENIX Workshop on Free and Open Communications on the Internet)
`
`10. Assertion-Carrying Certificates
`Waqar Aqeel, Zachary Hanif, James Larisch, Olamide Omolola, Taejoong Chung, Dave Levin, Bruce
`Maggs, Alan Mislove, Bryan Parno, Christo Wilson
`FCS 2020 (Workshop on Foundations of Computer Security)
`
`11. Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
`Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave
`Levin
`ACM SIGCOMM 2020
`
`12. .how .you .spot .whoswho .online .sucks: Deceiving Users with Generic Top-Level Domains
`Richard Roberts, Rachel Walter, Daniela Lulli, Dave Levin
`ConPro 2020 (Workshop on Technology and Consumer Protection) Accepted Talk
`
`13. A Deeper Look at Web Content Availability and Consistency over HTTP/S
`Muhammad Talha Paracha, Balakrishnan Chandrasekara, David Choffnes, Dave Levin
`TMA 2020 (Network Traffic Measurement and Analysis Conference)
`
`14. Build It, Break It, Fix It: Contesting Secure Development
`James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr
`Mardziel, Kelsey R. Fulton
`ACM TOPS March 2020 (Transactions on Privacy and Security)
`
`15. Achieving Keyless CDNs with Conclaves
`Stephen Herwig, Christina Garman, Dave Levin
`USENIX Security 2020
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 2 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 2 of 13
`
`

`

`16. Geneva: Evolving Censorship Evasion Strategies
`Kevin Bock, George Hughey, Dave Levin
`ACM CCS 2019 (Conference on Computer and Communications Security)
`
`17. You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certifi-
`cates
`Richard Roberts, Yaelle Goldschlag, Rachel Walter, Taejoong Chung, Alan Mislove, Dave Levin
`ACM CCS 2019 (Conference on Computer and Communications Security)
`
`18. When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS
`Domain Names
`Richard Roberts, Dave Levin
`WPES 2019 (Workshop on Privacy in the Electronic Society) Short paper
`
`19. RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins
`Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David Choffnes, Dave
`Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John P. Rula, Nick Sullivan
`ACM IMC 2019 (Internet Measurement Conference) Long paper
`
`20. Measuring TLS key exchange with post-quantum KEM
`Krzysztof Kwiatkowski, Nick Sullivan, Adam Langley, Dave Levin, Alan Mislove
`NIST Second PQC Standardization Conference 2019
`
`21. Residential Links Under the Weather
`Ramakrishna Padmanabhan, Aaron Schulman, Dave Levin, Neil Spring
`ACM SIGCOMM 2019
`
`22. Automatically Learning How to Evade Censorship
`Dave Levin
`USENIX ScAINet 2019 (Security and AI Networking Conference)
`
`23. How to find correlated Internet failures
`Ramakrishna Padmanabhan, Aaron Schulman, Alberto Dainotti, Dave Levin, Neil Spring
`PAM 2019 (Passive and Active Measurement Conference)
`
`24. Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
`Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin
`NDSS 2019 (Network and Distributed System Security Symposium)
`
`25. Is the Web Ready for OCSP Must Staple?
`Taejoong Chung, Jay Lok, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce Maggs,
`Alan Mislove, John Rula, Nick Sullivan, Christo Wilson
`ACM IMC 2018 (Internet Measurement Conference) Long paper
`
`26. Analyzing Ethereum’s Contract Topology
`Lucianna Kiffer, Dave Levin, Alan Mislove
`ACM IMC 2018 (Internet Measurement Conference) Short paper
`
`27. King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing
`Kevin Bock, George Hughey, Dave Levin
`USENIX ASE 2018 (Workshop on Advances in Security Education)
`
`28. Internet Anycast: Performance, Problems, and Potential
`Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee
`ACM SIGCOMM 2018
`
`29. Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
`Liang Zhang, David Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, Christo
`Wilson
`Communications of the ACM Research Highlights, March 2018 (Vol. 61, No. 3)
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 3 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 3 of 13
`
`

`

`30. An End-to-End View of DNSSEC Ecosystem Management
`Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin,
`Bruce M. Maggs, Alan Mislove, Christo Wilson
`USENIX ;login: Winter 2017 (Vol. 42, No. 4)
`
`31. Stick a fork in it: Analyzing the Ethereum network partition
`Lucianna Kiffer, Dave Levin, Alan Mislove
`HotNets 2017 (ACM Workshop on Hot Topics in Networking)
`
`32. Understanding the Role of Registrars in DNSSEC Deployment
`Taejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Alan Mislove, Christo Wilson, Dave Levin,
`Bruce M. Maggs
`ACM IMC 2017 (Internet Measurement Conference) Long paper
`
`33. unCaptcha: A Low-Resource Defeat of reCaptcha’s Audio Challenge
`Kevin Bock, Daven Patel, George Hughey, Dave Levin
`USENIX WOOT 2017 (Workshop on Offensive Technologies)
`
`34. DeTor: Provably Avoiding Geographic Regions in Tor
`Zhihao Li, Stephen Herwig, Dave Levin
`USENIX Security 2017
`
`35. A Longitudinal, End-to-End View of the DNSSEC Ecosystem
`Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin,
`Bruce M. Maggs, Alan Mislove, Christo Wilson
`USENIX Security 2017
`
`36. CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
`James Larisch, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson
`Oakland 2017 (IEEE Symposium on Security and Privacy)
`
`37. Measuring and Applying Invalid SSL Certificates: The Silent Majority
`Taejoong Chung, Yabing Liu, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo
`Wilson
`ACM IMC 2016 (Internet Measurement Conference) Long paper
`
`38. Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem
`Frank Cangialosi, Taejoong Chung, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo
`Wilson
`ACM CCS 2016 (Conference on Computer and Communications Security)
`
`39. Build It, Break It, Fix It: Contesting Secure Development
`Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle Mazurek, Piotr Mardziel
`ACM CCS 2016 (Conference on Computer and Communications Security)
`
`40. Picocenter: Supporting long-lived, mostly-idle applications in cloud environments
`Liang Zhang, James Litton, Frank Cangialosi, Theophilus Benson, Dave Levin, Alan Mislove
`EuroSys 2016 (European Conference on Computer Systems)
`
`41. Anomaly Detection on D-root
`Zhihao Li, Dave Levin, Bobby Bhattacharjee, Neil Spring
`DINR Workshop 2016 (DNS and Internet Naming Research Directions)
`
`42. DNSql: Processing Massive DNS Collections
`Stephen Herwig, Dave Levin, Bobby Bhattacharjee, Neil Spring
`DINR Workshop 2016 (DNS and Internet Naming Research Directions)
`
`43. Ting: Measuring and Exploiting Latencies Between All Tor Nodes
`Frank Cangialosi, Dave Levin, Neil Spring
`ACM IMC 2015 (Internet Measurement Conference) Long paper
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 4 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 4 of 13
`
`

`

`44. An End-to-End Measurement of Certificate Revocation in the Web’s PKI
`Yabing Liu, Will Tome, Liang Zhang, David Choffnes, Dave Levin, Bruce Maggs, Alan Mislove, Aaron
`Schulman, Christo Wilson
`ACM IMC 2015 (Internet Measurement Conference) Long paper
`
`45. Alibi Routing
`Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby
`Bhattacharjee
`ACM SIGCOMM 2015
`
`46. Build It Break It: Measuring and Comparing Development Security
`Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Atif Memon, Jan Plane, Piotr Mardziel
`CSET 2015 (Workshop on Cyber Security Experimentation and Test)
`
`47. Programming Slick Network Functions
`Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin
`SOSR 2015 (Symposium on SDN Research)
`
`48. UAv6: Alias Resolution in IPv6 Using Unused Addresses
`Ramakrishna Padmanabhan, Zhihao Li, Dave Levin, Neil Spring
`PAM 2015 (Passive and Active Measurement Conference)
`
`49. RevCast: Fast, Private Certificate Revocation over FM Radio
`Aaron Schulman, Dave Levin, Neil Spring
`ACM CCS 2014 (Conference on Computer and Communications Security)
`
`50. Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
`Liang Zhang, Dave Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, Christo
`Wilson
`ACM IMC 2014 (Internet Measurement Conference) Long paper
`
`51. D-mystifying the D-root Address Change
`Matthew Lentz, Dave Levin, Jason Castonguay, Neil Spring, Bobby Bhattacharjee
`ACM IMC 2013 (Internet Measurement Conference) Short paper
`
`52. A Slick Control Plane for Network Middleboxes
`Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin, Jennifer Rexford
`ONS 2013 (Open Network Summit)
`
`53. SDX: A Software Defined Internet Exchange
`Josh Bailey, Russ Clark, Nick Feamster, Dave Levin, Jennifer Rexford, Scott Shenker
`ONS 2013 (Open Network Summit)
`
`54. Making Currency Cheap with iOwe
`Dave Levin, Aaron Schulman, Katrina LaCurts, Neil Spring, Bobby Bhattacharjee
`NetEcon 2011 (Workshop on the Economics of Networks, Systems, and Computation)
`
`55. Secure Sharing in Distributed Information Management Applications: Problems and Directions
`Piotr Mardziel, Adam Bender, Michael Hicks, Dave Levin, Mudhakar Srivatsa, Jonathan Katz
`ACITA 2010 (Annual Conference of the International Technology Alliance)
`
`56. Don’t Love Thy Nearest Neighbor
`Cristian Lumezanu, Dave Levin, Bo Han, Neil Spring, Bobby Bhattacharjee
`IPTPS 2010 (International Workshop on Peer-to-Peer Systems)
`
`57. Stay or go? Participation in Under-Provisioned Video Streams
`Dave Levin, Daniel Malter, Neil Spring, Bobby Bhattacharjee
`NetEcon 2009 (Workshop on the Economics of Networks, Systems, and Computation)
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 5 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 5 of 13
`
`

`

`58. TrInc: Small Trusted Hardware for Large Distributed Systems
`Dave Levin, John R. Douceur, Jacob R. Lorch, and Thomas Moscibroda
`NSDI 2009 (USENIX Symposium on Networked Systems Design and Implementation)
`
`59. Symbiotic Relationships in Internet Routing Overlays
`Cristian Lumezanu, Randy Baden, Dave Levin, Neil Spring, and Bobby Bhattacharjee
`NSDI 2009 (USENIX Symposium on Networked Systems Design and Implementation)
`
`60. BitTorrent is an Auction: Analyzing and Improving BitTorrent’s Incentives
`Dave Levin, Katrina LaCurts, Neil Spring, and Bobby Bhattacharjee.
`ACM SIGCOMM 2008
`
`61. Motivating Participation in Internet Routing Overlays
`Dave Levin, Randolph Baden, Cristian Lumezanu, Neil Spring, and Bobby Bhattacharjee
`NetEcon 2008 (Workshop on the Economics of Networks, Systems, and Computation)
`
`62. On the Fidelity of 802.11 Packet Traces
`Aaron Schulman, Dave Levin and Neil Spring.
`PAM 2008 (Passive and Active Measurement Conference)
`
`63. Capacity of Asynchronous Random-Access Scheduling in Wireless Networks
`Deepti Chafekar, Anil Kumar, Dave Levin, Madhav Marathe, Srinivasan Parthasarathy and Aravind Srini-
`vasan.
`INFOCOM 2008 (IEEE Conference on Computer Communications)
`
`64. PeerWise Discovery and Negotiation of Faster Paths
`Cristian Lumezanu, Dave Levin and Neil Spring.
`HotNets 2007 (ACM Workshop on Hot Topics in Networks)
`
`65. Backbone Construction in Selfish Wireless Networks
`Seungjoon Lee, Dave Levin, Vijay Gopalakrishnan and Bobby Bhattacharjee.
`SIGMETRICS 2007 (ACM Int’l. Conference on Measurement and Modeling of Computer Systems)
`
`66. Boycotting and Extorting Nodes in an Internetwork
`Dave Levin, Adam Bender, Cristian Lumezanu, Neil Spring and Bobby Bhattacharjee.
`NetEcon+IBC 2007 (Workshop on the Econ. of Networked Systems / Incentive-Based Computing)
`
`67. Accountability as a Service
`Adam Bender, Neil Spring, Dave Levin and Bobby Bhattacharjee.
`SRUTI 2007 (Workshop on Steps to Reducing Unwanted Traffic in the Internet)
`
`68. Punishment in Selfish Wireless Networks: A Game Theoretic Analysis
`Dave Levin.
`NetEcon 2006 (Workshop on the Economics of Networked Systems)
`
`69. Fair File Swarming with FOX
`Dave Levin, Rob Sherwood and Bobby Bhattacharjee.
`IPTPS 2006 (International Workshop on Peer-to-Peer Systems)
`
`70. ProofRite: A Paper-Augmented Word Processor
`Kevin Conroy, Dave Levin and Franc¸ois Guimbreti`ere.
`UIST 2004 Demonstration (ACM Symposium on User Interface Software and Technology)
`
`Posters
`
`71. Bento: Bringing Network Function Virtualization to Tor
`Michael Reininger, Arushi Arora, Stephen Herwig, Nicholas Francino, Christina Garman, Dave Levin
`ACM CCS 2020 (Conference on Computer and Communications Security) Poster
`
`72. Mental Models of Domain Names and URLs
`Richard Roberts, Daniela Lulli, Abolee Raut, Kelsey Fulton, Dave Levin
`SOUPS 2020 (Symposium On Usable Privacy and Security) Poster
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 6 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 6 of 13
`
`

`

`73. Detecting IoT Malware with Power Measurements
`Rebecca Gelles, Kelsey Fulton, Rachel Walter, Dave Levin
`ACM IMC 2018 (Internet Measurement Conference) Poster
`
`74. Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
`Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin
`ACM IMC 2018 (Internet Measurement Conference) Poster
`
`75. Target-Embedding Domain Impersonation in HTTPS Certificates
`Richard Roberts, Yaelle Goldschlag, Dave Levin
`ACM IMC 2018 (Internet Measurement Conference) Poster
`
`76. Measuring Last-Mile Internet Reliability During Severe Weather
`Ramakrishna Padmanabhan, Ramakrishnan Sundara Raman, Reethika Ramesh, Aaron Schulman, Dave
`Levin, Neil Spring.
`ACM IMC 2017 (Internet Measurement Conference) Poster
`
`77. A Slick Control Plane for Network Middleboxes
`Bilal Anwer, Theophilus Benson, Nick Feamster, Dave Levin, Jennifer Rexford
`Poster at HotSDN 2013 (Hot Topics in Software Defined Networking), and paper at ONS 2013 (Open
`Network Summit)
`
`Technical
`Reports
`
`78. Nurikabe: Private yet Accountable Online Advertising
`Dave Levin, Bobby Bhattacharjee, John R. Douceur, Jacob R. Lorch, James Mickens, and Thomas Mosci-
`broda
`
`79. Incentive-Compatible Bootstrapping
`Dave Levin, Katrina LaCurts, Aaron Schulman, Neil Spring, and Bobby Bhattacharjee
`
`80. A Secure DHT via the Pigeonhole Principle
`Randy Baden, Adam Bender, Dave Levin, Rob Sherwood, Neil Spring and Bobby Bhattacharjee.
`
`81. Paranoia: An Anonymous, Censorship-Resistant File Store
`Dave Levin and Bobby Bhattacharjee.
`
`82. DDoS Detection in Multi-Homed Stub Domains
`Chris Kommareddy, Dave Levin, Bobby Bhattacharjee, Richard La, Mark Shayman and Vahid Tabatabaee.
`
`83. Hoodnets: Mobile Users Bonding over Auctions
`Dave Levin, Robert Kiefer, Kevin McGehee, Kristin Stephens, Koyel Mukherjee, Neil Spring, and Bobby
`Bhattacharjee
`
`84. Systems-Compatible Incentives
`Dave Levin, Neil Spring, and Bobby Bhattacharjee
`GameNets 2009 (International Conference on Game Theory for Networks)
`
`• Facebook, Internet Defense Prize, $40,000 (Total), $20,000 (UMD). Joint with Eric Wustrow (CU Boul-
`der).
`• Google exploreCSR, Tech+Research Research Hackathon, $18,000. 2020-2021.
`• NSF CNS-1943240 CAREER: Automatically Learning to Evade Internet Censorship, $499,628. Oc-
`tober 2020–2025. Primary Investigator.
`• OTF Internet Freedom Fund Evolving Censorship Evasion Strategies, $125,000. August 2019–2020.
`Primary Investigator.
`• NSF CNS-1901325 CNS Core: Large: Collaborative Research: Towards an Evolvable Public Key
`Infrastructure, $2M (Total), $617,561 (UMD). June 2019–2022. Primary Investigator, joint with Alan
`Mislove and Christo Wilson (Northeastern University), Bruce Maggs (Duke University), Bryan Parno
`(Carnegie Mellon University), Taejoong Chung (Rochester Institute of Technology).
`
`Invited Papers
`
`Funding
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 7 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 7 of 13
`
`

`

`• NSF CNS-1902304 Tech+Research: Welcoming Women to Computing Research, Hackathon Style,
`$40,000. December 2018–2019. Primary Investigator.
`• NSF CNS-1816802 SaTC: CORE: Small: Collaborative: Building Sophisticated Services with Pro-
`grammable Anonymity Networks, $500,000 (total) $250,000 (UMD). September 2018–2021. Primary
`Investigator, joint with Christina Garman (Purdue University).
`• AWS Cloud Credits for Research Building a Science-as-a-Service Cloud Platform with Process Mi-
`gration, $25,000. November 2017–2018.
`• NSF CNS-1735563 Student Travel to the Cornell, Maryland, Max Planck Pre-Doctoral Research
`School, $50,000. June 2017–2018. Co-Primary Investigator, joint with Bobby Bhattacharjee (PI).
`• NSF CNS-1564143 TWC: Medium: Collaborative: Measuring and Improving the Management of
`Today’s PKI, $1.2M (total) $600,000 (UMD). July 2016–2020. Primary Investigator, joint with Tudor
`Dumitras (UMD), Alan Mislove (Northeastern University), David Choffnes (NEU), and Christo Wilson
`(NEU).
`• E-VERIFY: LTS DO 0026 DNS and External Data Fusion Research, $649,374. March 2016–2018.
`Co-Primary Investigator, joint with Bobby Bhattacharjee (PI) and Neil Spring.
`• NSF CNS-1619048 NeTS: Small: Residential Network Outage Detection, $366,000. October 2016–
`2019. Co-Primary Investigator, joint with Neil Spring (PI).
`• University of Maryland Partnership with the Laboratory for Telecommunications Sciences (LTS), DNS
`and External Data Fusion Research, $344,593, Co-Primary Investigator, joint with Bobby Bhattachar-
`jee and Neil Spring.
`• NSF CNS-1409249 CSR: Medium: Collaborative Research: Towards Finer-grained Cloud Comput-
`ing, $1.2M (total) $400,000 (UMD). August 2014–2018. Primary Investigator, joint with Alan Mislove
`(Northeastern University) and Theophilus Benson (Duke University).
`• University of Maryland Partnership with the Laboratory for Telecommunications Sciences (LTS), Secur-
`ing Critical Network Infrastructure, $197,999, Co-Primary Investigator, joint with Bobby Bhattachar-
`jee and Neil Spring.
`• University of Maryland Partnership with the Laboratory for Telecommunications Sciences (LTS), Bit-
`coin: Detecting and Characterizing Attacks, $149,820, Co-Primary Investigator, joint with Bobby
`Bhattacharjee and Neil Spring.
`• NSF SaTC EDU-1319147 EDU: Competing to Build Secure Systems, $300,000. September 2013–
`2015. Co-Primary Investigator, joint with Michael Hicks (PI), Atif Memon, and Jandelyn Plane.
`
`Advising
`
`Post-docs:
`• Christina Garman (2017), now Asst. Prof. at Purdue University
`
`Current students:
`• Kevin Bock (PhD CS; advanced to candidacy)
`• Stephen Herwig (PhD CS; advanced to candidacy)
`• Soumya Indela (PhD ECE; advanced to candidacy)
`• Richard Roberts (PhD CS)
`• Breakerspace undergraduates (23): Tania Arya, Pranav Bharadwaj, Emily Dunham, Yaelle Goldschlag,
`Michael Harrity, Vanya Gorbachev, Nathan Hayes, Melissa Hoff, Kyle Hurley, Jayson Hurst, Daniel
`Liscinsky, Daniela Lulli, Michael Lum, Anna Mazzanati, Azeem Mohammed, Sai Naraharisetti, Abolee
`Raut, Michael Roberts, Alden Schmidt Kevin Shen, Nathan Stiff, Johan Vandegriff, Claude Zou
`
`Previous students:
`• Victoria Lai (BS 2013), now at Palintir
`• Luke Valenta (BS 2014), (PhD: UPenn), now at Cloudflare
`• Frank Cangialosi (BS 2015), now at MIT (PhD)
`• Katrina LaCurts (BS 2008; grad student mentor), (PhD: MIT), now at MIT EECS (Senior Lecturer, Un-
`dergraduate Officer)
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 8 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 8 of 13
`
`

`

`• Ivan Petrov (MS 2018), now at Google
`• Katura Harvey (MS 2018), now at Cisco
`• Rebecca Gelles (MS 2019)
`• Zachary Hanif (MS 2020)
`• Breakerspace students (15): Josephine Chow (BS/MS 2019), now at Cloudflare; Jacob Cohen; Yair Fax
`(BS 2020); Josh Fleming (BS 2019), now at Booz Allen; Nick Francino (BS/MS 2020); Peter Hep-
`penstall (BS 2019), now at Activision; George Hughey (BS 2019), now at Microsoft; Mitchell Kager
`(BS/MS 2020); Blue Keleher (BS 2019), now at Samsara; Lauren Kosub (BS 2020); Angela Lambert;
`Julianna Long (BS 2020); Alexis Mejia; Louis-Henri Merino (BS 2019), now at EPFL; Avi Passy (BS
`2020); Regina Pogosian (BS 2019), now at ManTech; Vikram Rao (BS 2019), now at Amazon; Michael
`Reininger (BS/MS 2020); Kyle Reese (BS 2020); Vaishnavi Sesetty; Jasraj Singh (BS 2020); Preston
`Tong (MS 2020); Anjali Viramgama; Rachel Walter (BS 2020), now at Amazon
`
`PhD Committees
`
`• Defense: Ramakrishna Padmanabhan (2018), Benjamin Bengfort (2018), Andrew Ruef (2018), Youndo
`Lee (2017), Liang Zhang (2016; Northeastern University)
`• Proposal: Matthew Lentz (2018), Ramakrishna Padmanabhan (2017), Andrew Ruef (2017), Benjamin
`Bengfort (2016)
`
`Classes Taught
`
`• CMSC 414 (Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 414 (Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 499A (Independent Study: Evading nation-state censors).
`• CMSC 499A (Independent Study: User perception of domain impersonation).
`• HACS 479 (Independent Study: Detecting IoT malware with side-channels).
`• CMSC 818O (Graduate Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 389R (Introduction to Ethical Hacking). Student-led class.
`• CMSC 414 (Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 389R (Introduction to Ethical Hacking). Student-led class.
`• CMSC 818O (Graduate Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 389R (Introduction to Ethical Hacking). Student-led class.
`• CMSC 414 (Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 389R (Introduction to Ethical Hacking). Student-led class.
`• HACS 479 (Independent Study: Server-side detection of VPN connections).
`• CMSC 499A (Independent Study: Secure process migration).
`• CMSC 499A (Independent Study: Towards a blockchain-based PKI).
`• CMSC 499A (Independent Study: Side-channel defenses).
`• CMSC 818O (Graduate Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 389O (The Coding Interview). Student-led class.
`• CMSC 499A (Independent Study: Reverse-engineering a peer-to-peer botnet).
`• CMSC 818O (Graduate Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 414 (Computer and Network Security).
`• CMSC 396H (Computer Science Honors Seminar).
`• CMSC 499A (Independent Study: Analyzing CDNs’ Roles in the Web’s PKI).
`• CMSC 499A (Independent Study: Obfuscated Communication through Skype Video).
`
`Fall 2020
`”
`Spring 2020
`”
`”
`”
`”
`Fall 2019
`”
`”
`Spring 2019
`”
`”
`Fall 2018
`”
`”
`Spring 2018
`”
`”
`”
`”
`”
`”
`Fall 2017
`”
`”
`”
`Spring 2017
`”
`Spring 2016
`”
`Fall 2015
`”
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 9 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 9 of 13
`
`

`

`• CMSC 414 (Computer and Network Security).
`• CMSC 414 (Computer and Network Security).
`• CMSC 499A (Independent Study: Anonymous DTN Routing).
`• CMSC 330 (Organization of Programming Languages).
`• CMSC 499A (Independent Study: Provable Route Avoidance using Alibi Routing).
`• CMSC 818F (Securing and Monetizing the Internet).
`
`Spring 2015
`Spring 2014
`”
`Spring 2013
`”
`”
`
`Service Activities Member:
`• National Academies Forum on Cyber-resilience (2021 – Present)
`
`Program Committee chair:
`• FOCI 2021 (ACM Workshop on Free and Open Communications on the Internet)
`• PAM 2021 (Passive and Active Measurement Conference)
`
`General chair:
`• IMC 2021 (ACM Internet Measurement Conference)
`• SOSR 2017 (ACM Symposium on SDN Research)
`• HotNets 2013 (ACM Workshop on Hot Topics in Networks)
`
`Chair:
`• ACM SIGCOMM Doctoral Dissertation Award Committee, 2016
`
`Program committee member:
`• ACM SIGCOMM 2012, 2013, 2020, 2021 Winner, best reviewer award (2012)
`• USENIX Security 2021
`• Computing Innovation Fellows 2020
`• CCS 2020 (ACM Conference on Computer and Communications Security)
`• IEEE Security & Privacy (Oakland) 2019, 2020
`• PAM 2020 (Passive and Active Measurement Conference)
`• IMC 2016, 2018, 2019, 2020 (ACM Internet Measurement Conference)
`• CSET 2016, 2017, 2019 (USENIX Workshop on Cyber Security Experimentation and Test)
`• CoNEXT 2018 (Conference on emerging Networking EXperiments and Technologies)
`• NetEcon 2011, 2013, 2014, 2015, 2016, 2017 (Workshop on the Economics of Networks, Systems, and
`Computation)
`• SOSR 2016, 2017 (Symposium on SDN Research)
`• NSDI 2013 (USENIX Symposium on Networked Systems Design and Implementation)
`• ICNP 2012 (IEEE International Conference on Network Protocols)
`• DIALM-POMC 2010 (ACM International Workshop on Foundations of Mobile Computing)
`
`National Science Foundation panelist:
`• NSF CSR 2016 (Computer Systems Research)
`• NSF SaTC 2015 (Secure and Trustworthy Cyberspace)
`
`Computing Research Association (CRA) Congressional Fly-in, 2015
`
`Departmental
`Activities
`
`• Chair (joint with Leilani Battle Spring 2019–Spring 2021), Computer Science Honors Program, 2016 –
`present.
`• Founded Breakerspace, a lab dedicated to group undergraduate research project
`(see https://breakerspace.cs.umd.edu).
`• Co-founder of GTRG, a game theory reading group for the Computer Science Department
`(see https://www.cs.umd.edu/∼dml/gtrg.html).
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 10 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 10 of 13
`
`

`

`• Elected member of the Computer Science Department’s Education Committee, 2005 – 2006.
`• President of the Executive Council, the graduate student governing body for promoting interaction among
`students and faculty in the computer science department, 2004 – 2005.
`
`Invited Talks
`
`WeaponizingCensorshipInfrastructure
`• Rightscon 2021 Conference (With Kevin Bock)
`
`AutomaticallyLearningHowto EvadeCensorship
`• US Dept. of State Global Engagement Center. (With Kevin Bock)
`• Cornell CS Colloquium. Hosted by Fred Schneider.
`• Pluggable Transports Implementers Meeting.
`• USENIX ScAINet Conference
`• Laboratory for Telecommunication Sciences (LTS) Symposium
`• Harvard University
`
`CombattingNation-stateCensorship
`• University of Iowa. Hosted by Omar Chowdhury.
`
`June 2021
`
`March 2021
`October 2020
`October 2020
`August 2019
`July 2019
`July 2019
`
`September 2020
`
`TheEvolutionof(Anti-)Censorship
`• Georgetown Center for Security and Emerging Technology. Hosted by Rebecca Gelles.
`
`July 2020
`
`AutomaticallyLearningHowto EvadeCensorship
`• USENIX ScAINet Conference
`• Laboratory for Telecommunication Sciences (LTS) Symposium
`• Harvard University
`
`ThreeUglyTruthsabouttheWeb’s PKI (andHowWe MightFix it)
`• Cornell, Maryland, Max Planck Pre-doctoral Research Summer School (CMMRS)
`• Virginia Tech. Hosted by Ing-Ray Chen
`• Georgetown University. Hosted by Micah Sherr
`• Laboratory for Telecommunication Sciences (LTS) Symposium
`
`RevocationsAre Dead,LongLiveRevocations
`• Georgia Tech. Hosted by Maria Konte
`• UCSD. Hosted by Geoff Voelker and Kirill Levchenko
`
`SecuringtheInternetbyProvingtheImpossible
`• University of Jordan. Hosted by Khair Eddin
`
`KeyMismanagementintheWeb’s PKI
`• CloudFlare. Hosted by Nick Sullivan
`• NEC Labs. Hosted by Cristian Lumezanu
`
`TheUglyTruthaboutCertificate Revocation
`• Maryland Cybersecurity Center Symposium
`• ICF Internationals CyberSci Summit
`• Duke University. Hosted by Theo Benson
`
`AlibiRouting
`• SIGCOMM Conference
`
`MaritimeCybersecurity
`• National Maritime Electronics Association (NMEA) Conference
`
`August 2019
`July 2019
`July 2019
`
`August 2019
`October 2018
`September 2018
`March 2017
`
`January 2018
`December 2017
`
`September 2016
`
`August 2016
`July 2016
`
`December 2015
`October 2015
`August 2014
`
`August 2015
`
`October 2015
`
`Dave Levin (dml@cs.umd.edu)
`
`Curriculum Vitae – Page 11 of 13
`
`Code200, UAB v. Bright Data Ltd.
`Code 200's Exhibit 1004
`Page 11 of 13
`
`

`

`AnalysisofSSL Certificate Reissues andRevocationsintheWake ofHeartbleed
`• NANOG 62 (Security track). Baltimore, MD
`
`D-mystifyingtheD-rootAddressChange
`• NANOG 62 (DNS track). Baltimore, MD
`
`Tune-intoTune-out: UsingFMradiotorevokecertificates
`• Maryland Cybersecurity Center Symposium
`
`AvoidingCensorsbyProvingtheImpossible
`• Laboratory for Telecommunication Sciences (LTS) Symposium
`
`Provingthe ImpossiblewithAlibi Protocols
`• Maryland Cybersecurity Center (MC2) Symposium
`
`Systems withoutCooperation
`• William and Mary College.
`• Stanford University Networking Seminar.
`• Georgia Tech. Hosted by Nick Feamster.
`• University of Wisconsin-Madison. Hosted by Suman Banerjee.
`
`MakingCurrencyCheapwith iOwe
`• NetEcon Workshop
`
`StayorGo? Participationin Under-provisionedMulticast Systems
`• NetEcon Workshop
`
`Systems-CompatibleIncentives
`• GameNets Conference
`
`TrInc: Small TrustedHardwareforLargeDistr

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket