throbber
IPR2021-00663
`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`______________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`______________________________
`
`SONY MOBILE COMMUNICATIONS AB, SONY MOBILE
`COMMUNICATIONS, INC., SONY ELECTRONICS INC., and
` SONY CORPORATION,
`
`Petitioners,
`
`v.
`
`ANCORA TECHNOLOGIES, INC.,
`
`Patent Owner.
`______________________________
`
`IPR2021-00663
`______________________________
`
`DECLARATION OF EREZ ZADOK IN SUPPORT OF
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 6,411,941
`
`
`
`
`
`
`
`
`Sony Ex. 1015
`
`Page 1 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`Engagement
`1.
`I have been retained by Petitioners Sony Mobile Communications AB,
`
`I.
`
`Sony Mobile Communications, Inc., Sony Electronics Inc., and Sony Corporation
`
`(collectively, “Sony” or “Petitioners”) to provide this declaration concerning the
`
`technical subject matter relevant to a petition for inter partes review of U.S. Patent
`
`No. 6,411,941 (“’941 patent”).
`
`2.
`
`Specifically, I was asked to review the declaration of Dr. Andrew
`
`Wolfe that was submitted by the petitioners in IPR2020-01609 as Exhibit 1003 and
`
`form an opinion of whether I agreed with the facts, analysis, and conclusions in
`
`that declaration.
`
`II. Background and Qualifications
`3.
`I am a Professor in the Computer Science Department at Stony Brook
`
`University (part of the State University of New York (“SUNY”) system). I direct
`
`the File-systems and Storage Lab (FSL) at Stony Brook’s Computer Science
`
`Department. My research interests include file systems and storage systems,
`
`operating systems, information technology and system administration, security and
`
`information assurance, networking and distributed systems, energy efficiency,
`
`performance and benchmarking, compilers, applied machine learning, and software
`
`engineering.
`
`2
`
`Sony Ex. 1015
`
`Page 2 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
` I studied at a professional high school in Israel, focusing on electrical
`
`4.
`
`engineering (“EE”), and graduated in 1982. I spent one more year at the high
`
`school’s college division, receiving a special Certified Technician’s degree in EE.
`
`During that time, I used and programmed PROM, EPROM, and EEPROM devices.
`
`I then went on to serve in the Israeli Defense Forces for three years (1983–1986). I
`
`received my Bachelor of Science degree in computer science (“CS”) in 1991, my
`
`Master’s degree in CS in 1994, and my Ph.D. in CS in 2001—all from Columbia
`
`University in New York.
`
`5. When I began my undergraduate studies at Columbia University, I
`
`also started working as a student assistant in the various campus-wide computer
`
`labs, eventually becoming an assistant to the head labs manager, who was
`
`managing all public computer labs on campus. During that time, I also became
`
`more involved with research within the CS Department at Columbia University,
`
`conducting research on operating systems, file and storage systems, security, and
`
`other topics. I also assisted the CS department’s computer administrators in
`
`managing the department’s computers, which included storage, IT, networking,
`
`and cyber-security related duties.
`
`6.
`
`During the late 1980s, I became exposed to and aware of information
`
`assurance topics. As the then-fledgling Internet was growing in popularity, so were
`
`security problems and cyber-attacks of various sorts. For example, I was an
`
`3
`
`Sony Ex. 1015
`
`Page 3 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`undergraduate student working on computer programming assignments when the
`
`infamous “Morris Worm” hit the Internet in November of 1988.
`
`7.
`
`In 1991, I joined Columbia University’s CS department as a full-time
`
`systems administrator, studying towards my MS degree part-time. My MS thesis
`
`topic related to file system reliability, fault tolerance, replication, and failover in
`
`mobile networked systems. My main duties as a systems administrator involved
`
`installing, configuring, and managing many networked servers, proxies, and
`
`desktops running several operating systems, as well as network devices setup; this
`
`included many hardware upgrades, device upgrades, and BIOS firmware/chipset
`
`updates/upgrades. My duties also included ensuring reliable, secure, authenticated
`
`access to networked systems and licensed software, as well as software updates,
`
`security, and bug fixes. Examples of servers and their protocols included email
`
`(SMTP), file transfer (FTP), domain names (DNS), network file systems (NFS),
`
`network news systems (NNTP), and Web (HTTP).
`
`8.
`
`In 1994, I left my systems administrator position to pursue my
`
`doctoral studies at Columbia University. My Ph.D. thesis topic was on versatile file
`
`system development, with examples in the fields of security and encryption,
`
`efficiency, reliability, and failover. I continued to work part-time as a systems
`
`administrator at the CS department, and eventually I was asked to serve as
`
`manager to the entire information technology (“IT”) staff. From 1991 to 2001, I
`
`4
`
`Sony Ex. 1015
`
`Page 4 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`was a member of the faculty-level Facilities Committee that oversaw all IT
`
`operations at the CS department. During this entire time, topics of information
`
`assurance and software protection became more prominent and time-consuming in
`
`the lives of system administrators worldwide, and my work at Columbia was no
`
`different. For example, configuring/maintaining firewalls and proxies and applying
`
`security patches, and [re]licensing software, became more important and a
`
`dominant part of everyday IT duties, as well as defending against a growing list of
`
`copyright violations and malicious software threats (e.g., viruses, worms, Trojans,
`
`spyware, and more).
`
`9.
`
`As part of my Ph.D. studies at Columbia, I collaborated on projects to
`
`develop advanced AI-like techniques to detect previously unknown viruses (a.k.a.
`
`“zero-day malware”), using data mining and rule-based detection. This work led to
`
`several highly cited papers (nearly 1,300 citations for one of the papers alone), and
`
`two patents. I also became a Teaching Assistant (TA) for a first-ever Computer
`
`Security course given at Columbia University’s CS department with Dr. Matt
`
`Blaze as instructor.
`
`10. From 1990 to 1998, I consulted for SOS Corporation and HydraWEB
`
`Technologies, as a systems administrator and programmer, managing data storage
`
`use and backup/restore duties, as well as information assurance and cyber-security
`
`(e.g., malware protection, software licensing). From 1994 to 2000, I led projects at
`
`5
`
`Sony Ex. 1015
`
`Page 5 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`HydraWEB Technologies, and then became the Director of Software
`
`Development—overseeing the development of several products and appliances
`
`such as stateful firewalls and HTTP load-balancers. I helped design and implement
`
`HydraWEB’s licensing method which used an encrypted, hashed content including
`
`information unique to the licensed software (e.g., serial numbers, MAC addresses).
`
`Since 2009, I have consulted for Packet General Networks, a startup specializing in
`
`secure storage and applications’ data security in the cloud.
`
`11.
`
`In 2001, I joined the faculty of Stony Brook University, a position I
`
`have held since. In 2002, I joined the Operations Committee, which oversees the
`
`IT operations of the CS department at Stony Brook University. From 2006 to 2010,
`
`I was the Director of IT Operations of the CS department; my day-to-day duties
`
`included setting policies regarding computing, hiring and training new staff,
`
`assisting any staff with topics of my specialty, defining requirements for new
`
`software/hardware, and purchasing. From 2010 to 2015, I have served as the Co-
`
`Chair to the Operations Committee. From 2016 to 2019, I oversaw the IT
`
`Operations as the Chair of the Operations Committee. A significant component of
`
`these duties included defining and helping implement policies for access control,
`
`firewalling, software licensing, anti-malware, anti-denial-of-service, and intrusion
`
`prevention—so as to ensure the security of users and their data, while minimizing
`
`the inconvenience and performance impact to users. These duties include
`
`6
`
`Sony Ex. 1015
`
`Page 6 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`protecting users from external threats as well as protecting the outside world from
`
`inside threats (e.g., infected laptops that start to spam outsiders or steal and
`
`transmit sensitive information). Since late 2019, I’ve been a member of the
`
`department’s Executive Committee that also oversees all IT operations.
`
`12. As of 2021, I am co-chairing a Stony Brook University wide working
`
`group to consolidate and streamline numerous IT software systems securely across
`
`the many disparate campus units.
`
`13.
`
`In 2017, I became the department’s Graduate Academic Adviser,
`
`advising all Masters students (over 400 on average annually) and many other
`
`graduate students on an assortment of academic matters.
`
`14. Since 2001, I personally configured and managed my own research
`
`lab’s network. This includes setting up and configuring a bi-directional Linux
`
`based stateful packet firewall, Web proxies, SSL-based services (secure HTTP,
`
`email, etc.), and Denial-of-Service prevention techniques. I’ve personally installed,
`
`configured, licensed, changed, replaced parts, and upgraded components in
`
`numerous devices from handhelds to laptops to servers.
`
`15. Throughout the 1990s and at least until 2004, I continued to
`
`personally use, install, configure, and train others on anti-malware software to
`
`protect users from viruses, Trojans, worms, spyware, and more. I’ve personally
`
`used software from Norton, Symantec, Trend Micro, McAfee, and others. I’ve
`
`7
`
`Sony Ex. 1015
`
`Page 7 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`used this software on Microsoft Windows, Linux systems, and on Apple Mac OS
`
`X systems.
`
`16. Since 1995, I have taught courses on operating systems, storage and
`
`file systems, advanced systems programming in Unix/C, systems administration,
`
`data structures, data/software security, and more. My courses often use storage, file
`
`systems, distributed systems, and system/network security as key teaching
`
`principles and practical examples for assignments and projects. I have taught these
`
`concepts and techniques to my students, both to my direct advisees as well as in
`
`my courses. For example, in my graduate Operating Systems course, I often cover
`
`Linux’s kernel mechanisms to protect users, applications, and data files. And in the
`
`System Administration undergraduate course, I covered many topics such as
`
`networking, firewalling, and cyber-security—including configuring and
`
`maintaining site security policies, DDoS handling, and the impact on anti-malware
`
`scanners on system performance.
`
`17. My research often investigates computer systems from many angles:
`
`security, efficiency, energy use, scalability, reliability, portability, survivability,
`
`usability, ease-of-use, versatility, flexibility, and more. My research gives special
`
`attention to balancing five often-conflicting aspects of computer systems:
`
`performance, reliability, energy use, security, and ease-of-use. Since joining Stony
`
`Brook University in 2001, my group in the File-systems and Storage Lab (FSL)
`
`8
`
`Sony Ex. 1015
`
`Page 8 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`has developed many file systems and operating system extensions; examples
`
`include a highly-secure cryptographic file system, a portable copy-on-write (COW)
`
`versioning file system, a tracing file system useful to detect intrusions, a replaying
`
`file system useful for forensics, a snapshotting and sandboxing file system, a
`
`namespace unification file system (that uses stackable, file-based COW), an anti-
`
`virus file system, an integrity-checking file system, a load balancing and
`
`replication/mirroring file system, network file system extensions for security,
`
`distributed secure cloud-based storage systems, a compiler to convert user-level C
`
`code to in-kernel efficient yet safe code, GCC plugins, stackable file system
`
`templates, and a Web-based backup system. I continue to maintain and release
`
`newer versions of some of these file systems and software.
`
`18.
`
`I have published over 120 refereed publications (in ACM, IEEE,
`
`USENIX, and more). To date, my publications have been cited more than 8,500
`
`times (as per Google Scholar as of March 15, 2021). My papers cover a wide range
`
`of related technologies such as file systems, storage systems, security, performance
`
`benchmarking and optimization, energy efficiency, system administration, and
`
`more. I also published a book titled “Linux NFS and Automounter Administration”
`
`(Sybex, 2001), covering systems administration topics related to network storage
`
`and data security.
`
`9
`
`Sony Ex. 1015
`
`Page 9 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`19. Some of my research has led to public software releases that have
`
`been used worldwide. I have publicly maintained the Amd Berkeley Automounter
`
`in a package called “am-utils” since 1992; this software helps administrators
`
`manage the multitude of file system mounts on dozens of different Unix systems.
`
`Since 1997, I have maintained and released several stackable file system software
`
`projects for Linux, FreeBSD, and/or Solaris, in a package called FiST. One of my
`
`stackable file system encryption projects, called Cryptfs, became the basis for
`
`IBM’s public release of eCryptfs, now part of Linux. Packet General Networks, for
`
`whom I have provided consulting services since 2009, licensed another encryption
`
`file system called Ncryptfs. Another popular file system released in 2003, called
`
`Unionfs, offers namespace unification, transparent shadow copying (a.k.a. copy-
`
`on-write or COW), file system snapshotting (e.g., useful for forensics), and the
`
`ability to save disk space by sharing a read-only copy of data among several
`
`computers, among other features.
`
`20. My research and teaching make extensive use of security features. For
`
`example, each time I taught the graduate operating system course, the first
`
`homework assignment includes the creation of a new system call that performs
`
`new or added functionality, often for encrypting a file or verifying its integrity;
`
`many of my other assignments cover topics of user/process access control, anti-
`
`virus filtering, and more. Since 2001, over 1,000 graduate students were exposed
`
`10
`
`Sony Ex. 1015
`
`Page 10 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`to these simple principles directly through my teaching and research at Stony
`
`Brook University.
`
`21.
`
`In another, undergraduate course titled “Advanced Systems
`
`Programming in Unix/C,” I cover many topics of system security and
`
`vulnerabilities, such as the structure of UNIX processes, memory segments such as
`
`the heap and stack, and an assortment of tools and techniques to prevent bugs from
`
`being exploited by malware. Often, the first assignment for this course is to
`
`develop a tool to encrypt/decrypt files using advanced ciphers, and use digital
`
`signatures to certify the cipher keys used. Since 2001, several hundred
`
`undergraduate students were exposed to these principles directly through my
`
`teaching and research at Stony Brook University.
`
`22.
`
`In yet another undergraduate course, System Administration, I taught
`
`network configuration, firewall security, and system security.
`
`23. My research has been supported by many federal and state grants as
`
`well as industry awards, including an NSF CAREER award, two IBM Faculty
`
`awards, two NetApp Faculty awards, a Western Digital award, several Dell-EMC
`
`awards, and several equipment gifts. I was the winner of the 2004 Computer
`
`Science Department bi-annual Graduate Teaching Award, the winner of the 2006
`
`Computer Science Department bi-annual Research Excellence Award, and a
`
`11
`
`Sony Ex. 1015
`
`Page 11 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`recipient of the 2008 SUNY Chancellor’s Excellence in Teaching award (an award
`
`that can be given only once a lifetime).
`
`24. My service record to the community includes being the co-chair for
`
`the USENIX Annual Technical Conference in 2020 (ATC’20); co-chairing
`
`USENIX File and Storage Technologies (FAST) in 2015 and participating in the
`
`FAST Steering Committee since 2015; co-chairing in 2012 and participating in the
`
`Steering Committee of the ACM SYSTOR conference; and participating in the
`
`Steering Committee of the Workshop on Hot Topics in Storage and File Systems
`
`(HotStorage) since 2021. Additionally, I have also been an Associate Editor to the
`
`ACM Transactions on Storage (TOS) journal since 2009.
`
`25.
`
`I am a named inventor on four patents, two titled “Systems and
`
`Methods for Detection of New Malicious Executables” (U.S. Patent No. 7,979,907,
`
`issued July 12, 2011; and U.S. Patent No. 7,487,544, issued February 3, 2009); and
`
`two more titled “Multi-Tier Caching,” (U.S. Patent No. 9,355,109, issued May 31,
`
`2016; and U.S. Patent 9,959,279, issued May 1, 2018).
`
`26.
`
`I have been disclosed as a testifying expert in twelve cases (including
`
`IPRs) in the past four years. I have been deposed 11 times and testified in trial
`
`twice.
`
`27. A complete copy of my curriculum vitae, which includes a list of my
`
`publications and contains further details on my education, experience, publications,
`
`12
`
`Sony Ex. 1015
`
`Page 12 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`patents, and other qualifications to render an expert opinion, is attached as
`
`Appendix A.
`
`28. The compensation I receive through my consulting company, Zadoks
`
`Consulting, LLC, is $450 per hour for my time, plus out-of-pocket expenses. This
`
`compensation is not dependent in any way on the contents of this Declaration, the
`
`substance of any testimony I may provide, or the outcome of this proceeding.
`
`III.
`
`Information Considered
`29.
`In drafting this declaration and forming the opinions therein, I relied
`
`on my years of education, research, and industry and academic experience. I also
`
`relied on the materials listed in Appendix B.
`
`30.
`
`I reserve the right to rely upon these materials and other materials to
`
`rebut arguments raised by the Patent Owner.
`
`31.
`
`I reserve the right to supplement this declaration in response to
`
`additional evidence that may become known.
`
`32.
`
`In connection with any testimony I may be asked to give to the Patent
`
`Trial and Appeal Board, I may use as exhibits various documents that relate to
`
`matters set forth in this declaration.
`
`IV. Opinions
`33. After considering the Wolfe declaration and the other materials listed
`
`in Appendix B, I agree with the facts, analysis, and conclusions in the Wolfe
`
`13
`
`Sony Ex. 1015
`
`Page 13 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`declaration, and I adopt the testimony in sections I.C–IV of the Wolfe declaration
`
`as my own for purposes of this proceeding. In particular, in view of the Board’s
`
`finding in its Institution Decision of February 16, 2021 that no claim terms, other
`
`than “license record,” needed to be construed for purposes of that decision, I agree
`
`with the Wolfe declaration’s explanation of the plain and ordinary meaning of the
`
`claim terms in the asserted claims of the ’941 Patent.
`
`
`
`I declare all statements made herein of my own knowledge are true and that
`
`all statements made on information and belief are believed to be true; and further
`
`that the statements were made with the knowledge that willful false statements and
`
`the like so made are punishable by fine or imprisonment, or both, under Section 1001
`
`of Title 18 of the United States Code.
`
`March 15, 2021
`Date
`
`
`
`
`
`
`Respectfully submitted,
`
`
`By:
` Erez Zadok, PhD
`
`
`
`14
`
`Sony Ex. 1015
`
`Page 14 of 81
`
`

`

`Zadok Declaration for Petition for Inter Partes Review of U.S. Pat. No. 6,411,941
`
`
`
`APPENDIX A
`
`
`
`
`
`
`
`
`
`
`
`
`Sony Ex. 1015
`
`Page 15 of 81
`
`

`

`EREZ ZADOK, CURRICULUM VITAE
`Erez Zadok
`Phone: +1 631 632 8461 (office)
`Computer Science Department
`Fax: +1 631 632 8243
`349 New Computer Science
`Timezone: US/Eastern
`Stony Brook University
`Email: ezk@cs.stonybrook.edu
`Stony Brook, NY 11794-2424
`Web: http://www.cs.sunysb.edu/˜ezk
`
`RESEARCH INTERESTS
`
`Operating systems with a special focus on file systems, storage, clouds, big data, hard-
`ware/architecture, encryption, security, benchmarking, performance analysis and optimization,
`energy efficiency, and system administration.
`
`EDUCATION
`
`May 2001
`
`Ph.D., Computer Science, Columbia University, New York, NY,
`FiST: A System for Stackable File-System Code Generation.
`
`Sep 1997 M.Phil., Computer Science, Columbia University, New York, NY
`
`Oct 1994 M.S., Computer Science, Columbia University, New York, NY
`Discovery and Hot Replacement of Replicated Read-Only File Systems, with Application to
`Mobile Computing
`
`May 1991 B.S., Computer Science, Columbia University, New York, NY
`
`May 1982 Certified Technician, Electrical Engineering, Holtz College, Israel
`
`PROFESSIONAL EXPERIENCE
`
`Aug 2017–present Graduate Academic Adviser, Computer Science Department, Stony Brook University
`
`Jan 2016–present
`
`Professor, Computer Science Department, Stony Brook University
`
`Jan 2007–2015
`
`Associate Professor, Computer Science Department, Stony Brook University
`
`Jan 2001–Jan 2007 Assistant Professor, Computer Science Department, Stony Brook University
`
`2013–present
`
`Director, Smart Energy Technologies (SET) Faculty Cluster, Stony Brook University
`
`2021–present
`
`Technical Expert; Fasken Martineau DuMoulin LLP
`
`2020–present
`
`Technical Expert; United States Attorney’s Office, Eastern District of New York
`
`2020
`
`Technical Expert; Latham & Watkins, LLP
`
`2020–present
`
`Technical Expert; Morgan Lewis & Bockius LLP
`
`2020–present
`
`Technical Expert; Covington & Burling, LLP
`
`2019–present
`
`Technical Expert; Quinn Emanuel Urquhart & Sullivan, LLP
`
`2019
`
`Technical Expert; Hogan Lovells LLP.
`
`2018–present
`
`Technical Expert; King & Spalding LLP.
`
`2018–2019
`
`2017–2018
`
`Technical Expert; Orrick, Herrington & Sutcliffe, LLP.
`
`Technical Expert; Weil, Gotshal & Manges LLP.
`
`1
`
`Sony Ex. 1015
`
`Page 16 of 81
`
`

`

`2017–2019
`
`Technical Expert; Keker, Van Nest, & Peters LLP.
`
`2016–2018
`
`Technical Expert; Sterne, Kessler, Goldstein & Fox, P.L.L.C.
`
`2015–2018
`
`Technical Expert; Wilmer Cutler Pickering Hale and Dorr LLP. (WilmerHale)
`
`2015–2017
`
`Technical Expert; Ropes & Gray, LLP.
`
`2014–2015
`
`Technical Expert; Foley & Lardner, LLP.
`
`2014–2016
`
`Technical Expert; Latham & Watkins, LLP.
`
`2014–2016
`
`Technical Expert; Keker & Van Nest, LLP.
`
`2013–present
`
`Managing Member; Zadoks Consulting, LLC.
`
`2013–2014
`
`Technical Expert; Sterne, Kessler, Goldstein & Fox, P.L.L.C.
`
`2013
`
`Technical Expert; Akin, Gump, Strauss, Hauer & Feld, LLP.
`
`2012–2015
`
`Technical Expert; Susman Godfrey, LLP.
`
`2012–2013
`
`Technical Expert; Fish Richardson, LLP.
`
`2010–2011
`
`Technical Expert; Sughrue Mion, LLP.
`
`2010
`
`Technical Expert; One LLP.
`
`2009–2010
`
`Consultant; CTERA Networks, Inc.
`
`2009–present
`
`Consultant; Packet General Networks, Inc.
`
`2006–2007
`
`Technical Expert; Hennigan, Bennett, and Dorman, LLP.
`
`1991–2000
`
`Graduate Research Assistant, Computer Science Department, Columbia University
`
`1999–2000
`
`Director of Software Development, HydraWEB Technologies, Inc.
`
`1994–1998
`
`Project Leader, HydraWEB Technologies, Inc.
`
`1990–1998
`
`Consultant, SOS Corporation
`
`1997
`
`Manager of Computing Facilities, Computer Science Department, Columbia Univer-
`sity
`
`1991–1998
`
`Technical Staff Member, Computer Science Department, Columbia University
`
`1989–1991
`
`Assistant Lab Manager, Academic Information Systems, Columbia University
`
`1987–1989
`
`Student Consultant, Academic Information Systems, Columbia University
`
`1984–1986
`
`National Army Service, Israeli Air Force, Israel
`
`1982–1984
`
`Programmer, Commodore Israel, Tel-Aviv, Israel
`
`1981–1984
`
`Computer Lab Manager, Holtz College, Tel-Aviv, Israel
`
`PERSONAL
`
`Born December 4, 1964, Tel-Aviv, Israel.
`
`Married, one child.
`
`2
`
`Sony Ex. 1015
`
`Page 17 of 81
`
`

`

`Citizenships: U.S.A and Israel
`
`Fluent in English and Hebrew
`
`Member: ACM, IEEE, IEEE Computer Society, USENIX
`
`Affiliate: Storage Systems Research Center (SSRC), Jack Baskin School of Engineering, University of
`California, Santa Cruz, California.
`
`Member: The I/O Traces, Tools and Analysis (IOTTA) Technical Work Group (TWG), part of the the
`Storage Networking Industry Association (SNIA).
`
`FUNDING
`
`Oct 2020–present
`
`2020
`
`2020
`
`Oct 2019–present
`
`SCC-IRG Track 1: Smart Aging: Connecting Communities Using Low-Cost and
`Secure Sensing Technologies NSF Smart and Connected Communities. $1,700,126,
`4 years. Co–PI with five other SBU faculty.
`
`FMitF: Track I: NLP-Assisted Formal Verification of the NFS Distributed File Sys-
`tem Protocol. NSF Research Experiences for Undergraduates (REU) supplement.
`$16,000. Lead PI with two others.
`
`CNS Core: III: Medium: Collaborative Research: Optimizing and Understand-
`ing Large Parameter Spaces in Storage Systems. NSF Research Experiences for
`Undergraduates (REU) supplement. $8,000. Lead PI with one other.
`
`CNS Core: III: Medium: Collaborative Research: Optimizing and Understand-
`ing Large Parameter Spaces in Storage Systems NSF. $1,088,017 (SBU share
`$823,142), 4 years. Lead-PI with one other SBU faculty, collaborative with Har-
`vey Mudd College.
`
`Oct 2019–present
`
`FMitF: Track I: NLP-Assisted Formal Verification of the NFS Distributed File Sys-
`tem Protocol NSF. $748,300, 3 years. Lead-PI with two other SBU faculty.
`
`2019
`
`2019
`
`2019
`
`2018
`
`CI-SUSTAIN: National File System Trace Repository. NSF Research Experiences
`for Undergraduates (REU) supplement. $8,000. Sole PI.
`
`Study of a Novel Non-Wearable Respiration and Heart Rate Sensor in Cardiopul-
`monary Exercise Testing. Stony Brook College of Engineering and Applied Sci-
`ences, SEED grant. $15,000, Co-PI with five others.
`
`Realizing the Full Performance and Parallelization Potential of Modern Stor-
`age Architectures for Big Data Applications. Stony Brook Research Foundation,
`SEED grant. $60,000, Co-PI with Anshul Gandhi.
`
`Storage/Deduplication research. Dell-EMC Corporation. $25,000, Single PI.
`
`Jun 2017–present
`
`CI-SUSTAIN: National File System Trace Repository. NSF. $129,867 (SBU
`share), 3 years. Co-PI with lead institution Harvey Mudd College.
`
`2017–2022
`
`I/UCRC Phase II: Center for Visual and Decision Informatics (CVDI) Site at
`SUNY Stony Brook. NSF. $400,000, 4 years. Co-PI with A. Kaufman, K. Mueller,
`H. Schwartz, and D. Samaras.
`
`2017
`
`Dell-EMC Corporation. Storage/Deduplication research, $25,000, Single PI.
`
`3
`
`Sony Ex. 1015
`
`Page 18 of 81
`
`

`

`2016–2021
`
`NRT-DESE: Interdisciplinary Graduate Training to Understand and Inform Deci-
`sion Processes Using Advanced Spatial Data Analysis and Visualization (STRIDE).
`NSF. $2,993,930, 5 years. Senior personnel.
`
`Mar 2016–present
`
`Early Detection of User-impersonating Attackers using Multilayer Tripwires, U.S.
`Office of Naval Research (ONR). $586,215, 3 years. Co-PI with Nick Nikiforakis.
`
`Jun 2016–2019
`
`EAGER: Elastic Multi-layer Memcached Tiers NSF. $257,165, 2 years. Co-PI
`with Anshul Gandhi.
`
`2016
`
`2015
`
`Feb 2015
`
`Sep 2014–2017
`
`Jan 2014–2016
`
`EMC Corporation. Storage/Deduplication research, $25,000, Single PI.
`
`EMC Corporation. Storage/Deduplication research, $25,000, Single PI.
`
`Student Travel Support for the 13th USENIX Conference on File and Storage Tech-
`nologies (FAST 2015). NSF. $20,000, 1 year. Sole PI.
`
`Adaptive Runtime Verification and Recovery for Mission-Critical Software. U.S.
`Air Force Office of Scientific Research (AFOSR). $620,861, 3 years. Co-PI with
`Scott A. Smolka and Scott D. Stoller. (Collaboration with NASA JPL.)
`
`Smarter Electric Grid Research, Innovation, Development, Demonstration, De-
`ployment Center (SGRID3). Brookhaven Science Associates LLC (BNL), $236,397,
`1 year. Lead-PI with one other Stony Brook Co-PI.
`
`2014
`
`EMC Corporation. Storage/Deduplication research, $25,000, Sole PI.
`
`Jun 2013–2017
`
`Jan 2013–2017
`
`Sep 2013–2017
`
`CSR: Medium: Collaborative Research: Workload-Aware Storage Architectures
`for Optimal Performance and Energy Efficiency. NSF. $513,900 (SBU share, total
`budget $1,000,000), 3 years. Lead-PI with one other Stony Brook Co-PI, and two
`more institutions (Harvard U. and Harvey Mudd College).
`
`BIGDATA: Small: DCM: Collaborative Research: An efficient, versatile, scalable,
`and portable storage system for scientific data containers. NSF. $444,267 (SBU
`share, total budget $746,290), 3 years. Lead-PI with two other Stony Brook Co-
`PIs, and two more institutions (Brandeis U. and Louisiana State U.).
`
`CRI-CI-ADDO-EN: National File System Trace Repository. NSF. $37,018 (SBU
`share, total budget $167,817), 3 years. Co-PI with lead institution Harvey Mudd
`College.
`
`2013
`
`Western Digital Research award. Shingled Magnetic Recording Disks Benchmark-
`ing, $50,000, Single PI.
`
`Sep 2012 – 2016
`
`NFS4Sec: An Extensible Security Layer for Network Storage. NSF. $486,783, 3
`years. Lead-PI with one other Co-PI.
`
`2012-2013
`
`2011
`
`2010
`
`Server-Class Performance vs. Energy Optimizations. Government of Israel (GoI),
`Mission to the USA. $47,152, 1 year. Lead PI with one other Co-PI.
`
`NetApp Research award. Dedup Workload Modeling, Synthetic Datasets, and
`Scalable Benchmarking, $40,000, Single PI.
`
`NetApp Research award. A Study of Network Storage Benefits using FLASH Hard-
`ware with Indexing Workloads, $40,000, Single PI.
`
`4
`
`Sony Ex. 1015
`
`Page 19 of 81
`
`

`

`Nov 2010 – 2016
`
`Long Island Smart Energy Corridor. Department of Energy (DOE), LIPA, and
`New York State. Collaboration between Stony Brook University, SUNY Farming-
`dale, and LIPA. $2,822,638, Co-PI.
`
`Sep 2009 – Aug 2013
`
`Collaborative Research: Performance- and Energy-Aware HEC Storage Stacks.
`NSF. $652,000, 3 years. Co-PI with Geoff Kuenning (Harvey Mudd College)
`
`Sep 2009 – Aug 2013
`
`Collaborative Research: Secure Provenance in High End Computing Systems.
`NSF. $564,972, 3 years. Co-PI with Radu Sion. Collaborative project with Patrick
`McDaniel (Penn State U.) and Marianne Winslett (UIUC).
`
`Apr 2009 – Nov 2012
`
`Survivable Software. U.S. Air Force Office of Scientific Research (AFOSR).
`$881,691, 39 months. Co-PI with Scott A. Smolka, Radu Grosu, Scott D. Stoller,
`and Klaus Havelund (NASA JPL).
`
`Feb 2010
`
`2009
`
`2008
`
`2008
`
`Student Travel Support for the First USENIX Workshop on Sustainable Informa-
`tion Technology (SustainIT 2010). NSF. $10,000, 1 year. Lead PI.
`
`Network Appliance Research award. Power use in Storage Servers. $30,000 Sin-
`gle PI.
`
`The Impact of Storage Software and Aging on Power Consumption, IBM Faculty
`award (IBM T.J. Watson Labs). $20,000, one year. Single PI.
`
`Network Appliance Equipment gift. A Study of User File Access Patterns. $91,083
`Single PI.
`
`Sep 2007 – 2015
`
`Center for Information Protection: A Multi-University Industry/University Col-
`laborative Research Center. NSF. $250,147, 5 years. Co-PI with R. Sekar (PI),
`Tzi-Cker Chiueh, Scott Stoller, and Radu Sion.
`
`Sep 2006 – Aug 2009
`
`CT-ISG: N3S: Networked Secure Searchable Storage with Privacy and Correct-
`ness Assurances. NSF. $300,000, 3 years. Co-PI with Radu Sion.
`
`Aug 2006 – Aug 2010
`
`File System Tracing, Replaying, Profiling, and Analysis on HEC Systems. NSF.
`$760,252, 3 years. Lead PI with Klaus Mueller (Stony Brook) and Ethan Miller
`(UC Santa Cruz).
`
`Jul 2006
`
`End-to-End File Server Security, IBM Faculty award (IBM Haifa Research
`Labs). $20,000, one year. Single PI.
`
`Jun 2006 – Aug 2010
`
`CSR—PDOS: Support for Atomic Sequences of File System Operations. NSF.
`$561,727, 3 years. Lead PI with Margo Seltzer (Harvard University).
`
`Jan 2006 – Dec 2006
`
`Secure File Systems, NY State “Millennium” award, $204,528, one year. Co-PI
`with R. Sekar (PI), Tzi-Cker Chiueh, CR Ramakrishnan, Radu Sion, and Scott D.
`Stoller.
`
`Jul 2005 – Aug 2010
`
`CSR—AES: Runtime-Monitoring and Model Checking f

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket