`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`SAMSUNG ELECTRONICS CO., LTD., and
`SAMSUNG ELECTRONICS AMERICA, INC.,
`Petitioners
`v.
`ANCORA TECHNOLOGIES, INC.,
`Patent Owner.
`
`Case No. IPR2020-01184
`U.S. Patent No. 6,411,941
`
`DECLARATION OF EREZ ZADOK, PH.D. IN SUPPORT OF PETITION
`FOR INTER PARTES REVIEW OF U.S. PATENT NO. 6,411,941
`
`0
`
`SAMSUNG EX. 1002 - 1/172
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`BACKGROUND AND QUALIFICATIONS ................................................ 2
`I.
`II. MATERIALS CONSIDERED ..................................................................... 12
`III. LEVEL OF ORDINARY SKILL IN THE ART .......................................... 13
`IV. TECHNOLOGY BACKGROUND .............................................................. 13
`A.
`Introduction ........................................................................................ 13
`B.
`Architecture of PCs ............................................................................ 13
`C.
`Executing Computer Programs .......................................................... 17
`D.
`Software for PCs, BIOS, and BIOS Memory Areas .......................... 18
`E.
`Unique vs. Pseudo-Unique Numbers and Keys ................................. 25
`1.
`The ’941 Patent ........................................................................ 25
`2.
`The Domain of Uniqueness ..................................................... 26
`3.
`Ensuring Uniqueness ............................................................... 27
`4.
`Pseudo Unique Number Schemes ............................................ 30
`Symmetric vs. Public-Key Encryption Systems ................................ 33
`F.
`Problems and Prior Art Solutions....................................................... 35
`G.
`SUMMARY OF THE ’941 PATENT .......................................................... 37
`A.
`Summary of the Invention .................................................................. 37
`B.
`Alleged Benefits Over Prior Art......................................................... 46
`VI. BRIEF SUMMARY OF THE ’941 PATENT PROSECUTION
`HISTORY ..................................................................................................... 48
`A.
`First Office Action.............................................................................. 48
`
`V.
`
`i
`
`
`SAMSUNG EX. 1002 - 2/172
`
`
`
`
`
`Second Office Action ......................................................................... 49
`B.
`Third Office Action ............................................................................ 50
`C.
`D. Notice of Allowance ........................................................................... 51
`VII. CLAIMS 1-3 and 6-17 OF THE ’941 PATENT .......................................... 52
`VIII. CLAIM CONSTRUCTION ......................................................................... 52
`IX. LEGAL STANDARDS FOR OBVIOUSNESS ........................................... 56
`X.
`THE PRIOR ART ......................................................................................... 58
`A. Hasebe ................................................................................................ 58
`B.
`Shipman .............................................................................................. 60
`C.
`Schwartz ............................................................................................. 63
`D. Yee ...................................................................................................... 66
`XI. GROUND 1: CLAIMS 1-2 AND 6-17 OF THE ’941 PATENT
`WOULD HAVE BEEN OBVIOUS OVER THE COMBINATION
`OF SCHWARTZ AND YEE ........................................................................ 69
`A.
`Claim 1 ............................................................................................... 69
`1.
`1.p: A method of restricting software operation within a
`license for use with a computer including an erasable,
`non-volatile memory area of a BIOS of the computer,
`and a volatile memory area; the method comprising the
`steps of: .................................................................................... 69
`1.a: selecting a program residing in the volatile memory, ....... 74
`1.b: using an agent to set up a verification structure in the
`erasable, non-volatile memory of the BIOS, the
`verification structure accommodating data that includes
`at least one license record, ....................................................... 75
`1.c: verifying the program using at least the verification
`structure from the erasable non-volatile memory of the
`BIOS, and ................................................................................. 83
`
`2.
`3.
`
`4.
`
`ii
`
`SAMSUNG EX. 1002 - 3/172
`
`
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`
`
`1.d: acting on the program according to the verification. ........ 84
`5.
`Claim 2 ............................................................................................... 85
`1.
`A method according to claim 1, further comprising the
`steps of: establishing a license authentication bureau. ............ 85
`Claim 6 ............................................................................................... 86
`1.
`A method according to claim 1 wherein selecting a
`program includes the steps of: establishing a licensed-
`software-program in the volatile memory of the computer
`wherein said licensed-software-program includes
`contents used to form the license-record. ................................ 87
`Claim 7 ............................................................................................... 87
`1.
`A method according to claim 6 wherein using an agent to
`set up the verification structure includes the steps of:
`establishing or certifying the existence of a pseudo-
`unique key in a first non-volatile memory area of the
`computer; and ........................................................................... 87
`establishing at least one license-record location in the
`first nonvolatile memory area or in the erasable, non-
`volatile memory area of the BIOS. .......................................... 87
`Claim 8 ............................................................................................... 87
`1.
`A method according to claim 6 wherein establishing a
`license-record includes the steps of: forming a license-
`record by encrypting of the contents used to form a
`license-record with other predetermined data contents,
`using the key; and .................................................................... 88
`establishing the encrypted license-record in one of the at
`least one established license-record locations. ........................ 88
`Claim 9 ............................................................................................... 88
`1.
`A method according to claim 7 wherein verifying the
`program includes the steps of: encrypting the licensed-
`software-program’s license-record contents from the
`
`2.
`
`2.
`
`iii
`
`SAMSUNG EX. 1002 - 4/172
`
`
`
`
`
`2.
`
`volatile memory area or decrypting the license-record in
`the erasable, non-volatile memory area of the BIOS,
`using the pseudo-unique key; and ............................................ 89
`comparing the encrypted licenses-software-program’s
`license-record contents with the encrypted license-record
`in the erasable, non-volatile memory area of the BIOS, or
`comparing the license-software-program’s license-record
`contents with the decrypted license-record in erasable
`non-volatile memory area of the BIOS. ................................... 90
`Claim 10 ............................................................................................. 90
`1.
`A method according to claim 9 wherein acting on the
`program includes the step: restricting the program's
`operation with predetermined limitations if the
`comparing yields non-unity or insufficiency. .......................... 90
`Claim 11 ............................................................................................. 90
`1.
`A method according to claim 1 wherein the volatile
`memory is a RAM. ................................................................... 91
`Claim 12 ............................................................................................. 91
`1.
`The method of claim 1, wherein a pseudo-unique key is
`stored in the non-volatile memory of the BIOS. ...................... 91
`Claim 13 ............................................................................................. 92
`1.
`The method of claim 1, wherein a unique key is stored in
`a first non-volatile memory area of the computer. .................. 92
`Claim 14 ............................................................................................. 93
`1.
`The method according [to] claim 13, wherein the step of
`using the agent to set up the verification record, including
`the license record, includes encrypting a license record
`data in the program using at least the unique key. ................... 93
`Claim 15 ............................................................................................. 93
`
`G.
`
`H.
`
`I.
`
`J.
`
`K.
`
`L.
`
`iv
`
`SAMSUNG EX. 1002 - 5/172
`
`
`
`1.
`
`2.
`
`N.
`
`The method according to claim 14, wherein the
`verification comprises: extracting the license record from
`the software program ............................................................... 93
`encrypting the license record using the unique key stored
`in the first non-volatile memory area of the computer to
`form second encrypted license information; and ..................... 94
`comparing the encrypted license information stored in the
`erasable, non-volatile memory area of the BIOS of the
`computer with the second encrypted license information. ...... 95
`M. Claim 16 ............................................................................................. 95
`1.
`The method according to claim 13, wherein the step of
`verifying the program includes a decrypting the license
`record data accommodated in the erasable second non-
`volatile memory area of the BIOS using at least the
`unique key. ............................................................................... 95
`Claim 17 ............................................................................................. 96
`1.
`The method according to claim 13, wherein the step of
`verifying the program includes encrypting the license
`record that is accommodated in the program using at least
`the unique key. ......................................................................... 96
`O. Motivation to Combine Schwartz and Yee and/or POSITA
`knowledge .......................................................................................... 97
`1.
`Schwartz and Yee are in the Same Field ................................. 97
`2.
`Schwartz and Yee Use Similar Techniques ............................. 99
`3.
`Schwartz and Yee are From the Same Time Frame .............. 101
`4. Motivation to Improve on Schwartz’s Network Server
`System with Yee’s Remote Network Software
`Repository .............................................................................. 101
`5. Motivation to Improve on Schwartz’s Use of Keys and
`Ciphers with Yee’s Disclosures ............................................. 106
`
`3.
`
`
`
`v
`
`SAMSUNG EX. 1002 - 6/172
`
`
`
`2.
`3.
`
`XII. GROUND 2: HASEBE IN VIEW OF SHIPMAN RENDERS
`OBVIOUS CLAIMS 1-3, 6-15, and 17 ...................................................... 112
`A.
`Claim 1 ............................................................................................. 112
`1.
`A method of restricting software operation within a
`license for use with a computer including an erasable,
`non-volatile memory area of a BIOS of the computer,
`and a volatile memory area; the method comprising the
`steps of: .................................................................................. 112
`selecting a program residing in the volatile memory, ............ 117
`using an agent to set up a verification structure in the
`erasable, non-volatile memory of the BIOS the
`verification structure accommodating data that includes
`at least one license record, ..................................................... 118
`verifying the program using at least the verification
`structure from the erasable non-volatile memory of the
`BIOS, and ............................................................................... 129
`acting on the program according to the verification. ............. 131
`5.
`Claim 2 ............................................................................................. 132
`1.
`A method according to claim 1, further comprising the
`steps of: establishing a license authentication bureau. .......... 132
`Claim 3 ............................................................................................. 133
`1.
`A method according to claim 2, wherein setting up a
`verification structure further comprising the steps of:
`establishing, between the computer and the bureau, a
`two-way data-communications linkage; ................................ 133
`transferring, from the computer to the bureau, a request-
`for-license including an identification of the computer
`and the license-record's contents from the selected
`program; ................................................................................. 135
`
`4.
`
`2.
`
`
`
`vi
`
`B.
`
`C.
`
`SAMSUNG EX. 1002 - 7/172
`
`
`
`3.
`
`4.
`
`5.
`
`forming an encrypted license-record at the bureau by
`encrypting parts of the request-for-license using part of
`the identification as an encryption key; ................................. 135
`transferring, from the bureau to the computer, the
`encrypted license-record; and ................................................ 137
`storing the encrypted license record in the erasable non-
`volatile memory area of the BIOS. ........................................ 137
`Claim 6 ............................................................................................. 139
`1.
`A method according to claim 1 wherein selecting a
`program includes the steps of: establishing a licensed-
`software-program in the volatile memory of the computer
`wherein said licensed-software-program includes
`contents used to form the license-record. .............................. 139
`Claim 7 ............................................................................................. 143
`1.
`A method according to claim 6 wherein using an agent to
`set up the verification structure includes the steps of:
`establishing or certifying the existence of a pseudo-
`unique key in a first non-volatile memory area of the
`computer; and ......................................................................... 143
`establishing at least one license-record location in the
`first nonvolatile memory area or in the erasable, non-
`volatile memory area of the BIOS. ........................................ 143
`Claim 8 ............................................................................................. 144
`1.
`A method according to claim 6 wherein establishing a
`license-record includes the steps of: forming a license-
`record by encrypting of the contents used to form a
`license-record with other predetermined data contents,
`using the key; and .................................................................. 144
`establishing the encrypted license-record in one of the at
`least one established license-record locations. ...................... 146
`Claim 9 ............................................................................................. 146
`
`
`
`vii
`
`D.
`
`E.
`
`F.
`
`G.
`
`2.
`
`2.
`
`SAMSUNG EX. 1002 - 8/172
`
`
`
`
`
`1.
`
`2.
`
`A method according to claim 7 wherein verifying the
`program includes the steps of: encrypting the licensed-
`software-program’s license-record contents from the
`volatile memory area or decrypting the license-record in
`the erasable, non-volatile memory area of the BIOS,
`using the pseudo-unique key; and .......................................... 146
`comparing the encrypted licenses-software-program’s
`license-record contents with the encrypted license-record
`in the erasable, non-volatile memory area of the BIOS, or
`comparing the license-software-program’s license-record
`contents with the decrypted license-record in erasable
`non-volatile memory area of the BIOS. ................................. 147
`Claim 10 ........................................................................................... 147
`1.
`A method according to claim 9 wherein acting on the
`program includes the step: restricting the program's
`operation with predetermined limitations if the
`comparing yields non-unity or insufficiency. ........................ 148
`Claim 11 ........................................................................................... 148
`1.
`A method according to claim 1 wherein the volatile
`memory is a RAM. ................................................................. 148
`Claim 12 ........................................................................................... 149
`1.
`The method of claim 1, wherein a pseudo-unique key is
`stored in the non-volatile memory of the BIOS. .................... 149
`Claim 13 ........................................................................................... 151
`1.
`The method of claim 1, wherein a unique key is stored in
`a first non-volatile memory area of the computer. ................ 151
`Claim 14 ........................................................................................... 151
`1.
`The method according claim 13, wherein the step of
`using the agent to set up the verification record, including
`the license record, includes encrypting a license record
`data in the program using at least the unique key. ................. 151
`
`H.
`
`I.
`
`J.
`
`K.
`
`L.
`
`viii
`
`SAMSUNG EX. 1002 - 9/172
`
`
`
`
`
`2.
`
`3.
`
`M. Claim 15 ........................................................................................... 152
`1.
`The method according to claim 14, wherein the
`verification comprises: extracting the license record from
`the software program; ............................................................ 152
`encrypting the license record using the unique key stored
`in the first non-volatile memory area of the computer to
`form second encrypted license information; and ................... 154
`comparing the encrypted license information stored in the
`erasable, non-volatile memory area of the BIOS of the
`computer with the second encrypted license information. .... 155
`Claim 17 ........................................................................................... 156
`1.
`The method according to claim 13, wherein the step of
`verifying the program includes encrypting the license
`record that is accommodated in the program using at least
`the unique key. ....................................................................... 156
`O. Motivation to Combine Hasebe and Shipman ................................. 156
`XIII. DECLARATION IN LIEU OF OATH ...................................................... 162
`
`N.
`
`
`
`ix
`
`SAMSUNG EX. 1002 - 10/172
`
`
`
`Ex-1001
`Ex-1004
`Ex-1005
`Ex-1006
`
`Ex-1007
`Ex-1008
`Ex-1010
`
`Ex-1011
`
`EXHIBITS CONSIDERED
`
`U.S. Patent No. 6,411,941
`Prosecution History of U.S. Patent No. 6,411,941
`U.S. Patent No. 6,153,835 (“Schwartz”)
`Ph.D. Thesis of Bennett Yee, “Using Secure Coprocessors”,
`Carnegie-Mellon University, CMU-CS-94-149 (“Yee”)
`U.S. Patent No. 5,935,243 (“Hasebe”)
`U.S. Patent No. 5,852,736 (“Shipman”)
`Israel Application No. 124,571, filed May 21, 1998 (“the IL’571
`application”)
`“Final Claim Constructions of the Court”, Claim Construction
`Order dated June 2, 2020 in Ancora Technologies, Inc. v.
`Samsung Electronics Co., Ltd. and Samsung Electronics America,
`Inc., Case No. 1:20-cv-00034-ADA (W.D. Tex.)
`Desktop Management BIOS Specification Version 2.0, March 6,
`1996 (“DMI Spec.”)
`Microsoft Computer Dictionary, 3rd edition (1997) (“Microsoft”)
`Silberschatz, Operating System Concepts, 5th edition (1997)
`(“Silberschatz”)
`Prosecution History for Ex Parte Reexamination of U.S. Patent
`No. 6,411,941, filed May 28, 2009, Control No. 90/010,560
`Scheduling Order, dated January 2, 2020, in Ancora
`Technologies, Inc. v. Samsung Electronics Co., Ltd. and Samsung
`Electronics America, Inc., Case No. 6:19-cv-00384 (W.D. Tex.)
`U.S. Patent No. 5,892,900 (“Ginter”)
`U.S. Patent No. 5,748,804 (“Isikoff”)
`B. Schneier, Applied Cryptography, Second Edition (1996)
`(“Schneier”)
`Ex-1025 W.R. Cheswick et al., Firewalls and Internet Security (1994)
`(“Cheswick”)
`Intel-28F001BX-B-datasheet (“Intel”)
`U.S. Patent No. 6,009,524 (“Olarig”)
`U.S. Patent No. 5,802,592 (“Chess”)
`U.S. Patent No. 6,138,236 (“Mirov”)
`U.S. Patent No. 5,684,951 (“Goldman”)
`U.S. Patent No. 6,189,146 (“Misra”)
`U.S. Patent No. 5,479,639 (“Ewertz”)
`U.S. Patent No. 6,009,177 (“Sudia”)
`1
`
`
`Ex-1026
`Ex-1027
`Ex-1028
`Ex-1029
`Ex-1033
`Ex-1034
`Ex-1035
`Ex-1037
`
`Ex-1012
`
`Ex-1013
`Ex-1014
`
`Ex-1018
`
`Ex-1019
`
`Ex-1020
`Ex-1021
`Ex-1024
`
`SAMSUNG EX. 1002 - 11/172
`
`
`
`
`
`I, Erez Zadok, Ph.D., hereby declare under penalty of perjury:
`BACKGROUND AND QUALIFICATIONS
`I.
`I have been retained by Petitioners Samsung Electronics Co., Ltd. and
`1.
`
`Samsung Electronics America, Inc. (“Samsung”) to provide my opinions regarding
`
`claims 1-2, 6-14 and 16 of U.S. Patent No. 6,411,941 (“the ’941 patent”).
`
`2.
`
`I am a Professor in the Computer Science Department at Stony Brook
`
`University (part of the State University of New York (“SUNY”) system). I direct
`
`the File-systems and Storage Lab (FSL) at Stony Brook’s Computer Science
`
`Department. My research interests include file systems and storage systems,
`
`operating systems, information technology and system administration, security and
`
`information assurance, networking and distributed systems, energy efficiency,
`
`performance and benchmarking, compilers, applied machine learning, and software
`
`engineering.
`
`3.
`
`I studied at a professional high school in Israel, focusing on electrical
`
`engineering (“EE”), and graduated in 1982. I spent one more year at the high
`
`school’s college division, receiving a special Certified Technician’s degree in EE.
`
`During that time, I used and programmed PROM, EPROM, and EEPROM devices.
`
`I then went on to serve in the Israeli Defense Forces for three years (1983–1986). I
`
`received my Bachelor of Science degree in computer science (“CS”) in 1991, my
`
`2
`
`SAMSUNG EX. 1002 - 12/172
`
`
`
`
`
`Master’s degree in CS in 1994, and my Ph.D. in CS in 2001—all from Columbia
`
`University in New York.
`
`4. When I began my undergraduate studies at Columbia University, I
`
`also started working as a student assistant in the various campus-wide computer
`
`labs, eventually becoming an assistant to the head labs manager, who was
`
`managing all public computer labs on campus. During that time, I also became
`
`more involved with research within the CS Department at Columbia University,
`
`conducting research on operating systems, file and storage systems, security, and
`
`other topics. I also assisted the CS department’s computer administrators in
`
`managing the department’s computers, which included storage, IT, networking,
`
`and cyber-security related duties.
`
`5.
`
`During the late 1980’s, I became exposed to and aware of information
`
`assurance topics. As the then fledgling Internet was growing in popularity, so were
`
`security problems and cyber-attacks of various sorts. For example, I was an
`
`undergraduate student working on computer programming assignments when the
`
`infamous “Morris Worm” hit the Internet in November of 1988.
`
`6.
`
`In 1991, I joined Columbia University’s CS department as a full-time
`
`systems administrator, studying towards my MS degree part-time. My MS thesis
`
`topic related to file system reliability, fault tolerance, replication, and failover in
`
`mobile networked systems. My main duties as a systems administrator involved
`
`3
`
`SAMSUNG EX. 1002 - 13/172
`
`
`
`
`
`installing, configuring, and managing many networked servers, proxies, and
`
`desktops running several operating systems, as well as network devices setup; this
`
`included many hardware upgrades, device upgrades, and BIOS firmware/chipset
`
`updates/upgrades. My duties also included ensuring reliable, secure, authenticated
`
`access to networked systems and licensed software, as well as software updates,
`
`security, and bug fixes. Examples of servers and their protocols included email
`
`(SMTP), file transfer (FTP), domain names (DNS), network file systems (NFS),
`
`network news systems (NNTP), and Web (HTTP).
`
`7.
`
`In 1994, I left my systems administrator position to pursue my
`
`doctoral studies at Columbia University. My Ph.D. thesis topic was on versatile
`
`file system development, with examples in the fields of security and encryption,
`
`efficiency, reliability, and failover. I continued to work part-time as a systems
`
`administrator at the CS department, and eventually I was asked to serve as
`
`manager to the entire information technology (“IT”) staff. From 1991 to 2001, I
`
`was a member of the faculty-level Facilities Committee that oversaw all IT
`
`operations at the CS department. During this entire time, topics of information
`
`assurance and software protection became more prominent and time-consuming in
`
`the lives of system administrators worldwide, and my work at Columbia was no
`
`different. For example, configuring/maintaining firewalls and proxies and
`
`applying security patches, and [re]licensing software, became more important and
`
`4
`
`SAMSUNG EX. 1002 - 14/172
`
`
`
`
`
`a dominant part of everyday IT duties, as well as defending against a growing list
`
`of copyright violations and malicious software threats (e.g., viruses, worms,
`
`Trojans, spyware, and more).
`
`8.
`
`As part of my Ph.D. studies at Columbia, I collaborated on projects to
`
`develop advanced AI-like techniques to detect previously unknown viruses (a.k.a.
`
`“zero-day malware”), using data mining and rule-based detection. This work led
`
`to several highly cited papers (over 1,100 citations for one of the papers alone),
`
`and two patents. I also became a Teaching Assistant (TA) for a first-ever
`
`Computer Security course given at Columbia University’s CS department with Dr.
`
`Matt Blaze as instructor.
`
`9.
`
`From 1990 to 1998, I consulted for SOS Corporation and HydraWEB
`
`Technologies, as a systems administrator and programmer, managing data storage
`
`use and backup/restore duties, as well as information assurance and cyber-security
`
`(e.g., malware protection, software licensing). From 1994 to 2000, I led projects at
`
`HydraWEB Technologies, and then became the Director of Software
`
`Development—overseeing the development of several products and appliances
`
`such as stateful firewalls and HTTP load-balancers. I helped design and
`
`implement HydraWEB’s licensing method which used an encrypted, hashed
`
`content including information unique to the licensed software (e.g., serial numbers,
`
`5
`
`SAMSUNG EX. 1002 - 15/172
`
`
`
`
`
`MAC addresses). Since 2009, I have consulted for Packet General Networks, a
`
`startup specializing in secure storage and applications’ data security in the cloud.
`
`10.
`
`In 2001, I joined the faculty of Stony Brook University, a position I
`
`have held since. In 2002, I joined the Operations Committee, which oversees the
`
`IT operations of the CS department at Stony Brook University. From 2006 to
`
`2010, I was the Director of IT Operations of the CS department; my day-to-day
`
`duties included setting policies regarding computing, hiring and training new staff,
`
`assisting any staff with topics of my specialty, defining requirements for new
`
`software/hardware, and purchasing. From 2010 to 2015, I have served as the Co-
`
`Chair to the Operations Committee. From 2016 to 2019, I oversaw the IT
`
`Operations as the Chair of the Operations Committee. A significant component of
`
`these duties included defining and helping implement policies for access control,
`
`firewalling, software licensing, anti-malware, anti-denial-of-service, and intrusion
`
`prevention—so as to ensure the security of users and their data, while minimizing
`
`the inconvenience and performance impact to users. These duties include
`
`protecting users from external threats as well as protecting the outside world from
`
`inside threats (e.g., infected laptops that start to spam outsiders or steal and
`
`transmit sensitive information). Since late 2019, I’ve been a member of the
`
`department’s Executive Committee that also oversees all IT operations.
`
`6
`
`SAMSUNG EX. 1002 - 16/172
`
`
`
`
`
`11.
`
`In 2017, I became the department’s Graduate Academic Adviser,
`
`advising all Masters students (over 400 on average) and many other graduate
`
`students on an assortment of academic matters.
`
`12. Since 2001, I personally configured and managed my own research
`
`lab’s network. This includes setting up and configuring a bi-directional Linux
`
`based stateful packet firewall, Web proxies, SSL-based services (secure HTTP,
`
`email, etc.), and Denial-of-Service prevention techniques. I’ve personally
`
`installed, configured, licensed, changed, replaced parts, and upgraded components
`
`in numerous devices from handhelds to laptops to servers.
`
`13. Throughout the 1990’s and at least until 2004, I continued to
`
`personally use, install, configure, and train others on anti-malware software to
`
`protect users from viruses, Trojans, worms, spyware, and more. I’ve personally
`
`used software from Norton, Symantec, Trend Micro, McAfee, and others. I’ve
`
`used this software on Microsoft Windows, Linux systems, and on Apple Mac OS
`
`X systems.
`
`14. Since 1995, I have taught courses on operating systems, storage and
`
`file systems, advanced systems programming in Unix/C, systems administration,
`
`data structures, data/software security, and more. My courses often use storage,
`
`file systems, distributed systems, and system/network security as key teaching
`
`principles and practical examples for assignments and projects. I have taught these
`
`7
`
`SAMSUNG EX. 1002 - 17/172
`
`
`
`
`
`concepts and techniques to my students, both to my direct advisees as well as in
`
`my courses. For example, in my graduate Operating Systems course, I often cover
`
`Linux’s kernel mechanisms to protect users, applications, and data files. And in
`
`the System Administration undergraduate course, I covered many topics such as
`
`networking, firewalling, and cyber-security—including configuring and
`
`maintaining site security policies, DDoS handling, and the impact on anti-malware
`
`scanners on system performance.
`
`15. My research often investigates computer systems from many angles:
`
`security, efficiency, energy use, scalability, reliability, portability, survivability,
`
`usability, ease-of-use, versatility, flexibility, and more. My research gives special
`
`attention to balancing five often-conflicting aspects of computer systems:
`
`performance, reliability, energy use, security, and ease-of-use. Since joining Stony
`
`Brook University in 2001, my group in the File-systems and Storage Lab (FSL)
`
`has developed many file systems and operating system extensions; examples
`
`include a highly-secure cryptographic file system, a portable copy-on-write (COW)
`
`versioning file system, a tracing file system useful to detect intrusions, a replaying
`
`file system useful for forensics, a snapshotting and sandboxing file system, a
`
`namespace unification file system (that uses stackable, file-based COW), an anti-
`
`virus file system, an integrity-checking file system, a load balancing and
`
`replication/mirroring file system, network file system extensions for security,
`
`8
`
`SAMSUNG EX. 1002 - 18/172
`
`
`
`
`
`distributed secure cloud-based storage systems, a compiler to convert user-level C
`
`code to in-kernel efficient yet safe code, GCC plugins, stackable file system
`
`templates, and a Web-based backup system. I continue to maintain and release
`
`newer versions of some of these file systems and software.
`
`16.
`
`I have published over 120 refereed publications (in ACM, IEEE,
`
`USENIX, and more). To date, my publications have been cited more than 7,700
`
`times (as per Google Scholar as of June 12, 2020). My papers cover a wide range
`
`of related technologies such as file systems, storage systems, security, performance
`
`benchmarking and optimization, energy efficiency, system administration, and
`
`more. I also published a book titled “Linux NFS and Automounter
`
`Administration” (Sybex, 2001), covering systems administration topics related to
`
`network storage a