Thomas S. Benjamin. 32 West Street Apt. 3N Cold Spring, NY 10516. 2007 2009 IBM Research Zurich Research Laboratory Pre-Doctoral Research

Similar documents
Thomas S. Heydt-Benjamin

Security and Privacy of Wireless Implantable Medical Devices

Unpatchable: Living with a vulnerable implanted device

Body Area Network Security: Robust Secret Sharing

Medical Devices: Security & Privacy Concerns. NIST Information Security and Privacy Advisory Board (ISPAB) Meeting July 14, 2011

Recent Results in Computer Security for Medical Devices

Strengthen RFID Tags Security Using New Data Structure

How To Hack An Rdi Credit Card

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

Reza Shokri Curriculum Vitae [1 of 5] Reza Shokri

Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science

Fengwei Zhang. Research Interest. Education. Employment History

RFID Guardian Back-end Security Protocol

CURRICULUM VITAE. Amardeep Kahlon +1 (512)

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

FOR ACCESS CONTROL TECHNOLOGIES Docket No

C U R R I C U L U M V I T A E T R I V A N L E

CS 464/564 Networked Systems Security SYLLABUS

Otto H. York Department of Chemical, Biological and Pharmaceutical Engineering Ph.D. Program Requirements

Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Panel on Economic Incentives for Medical Device Cybersecurity

M.B.A. University of Delaware Specialization in Health Administration and Policy B.S. Cleveland State University, Biology 2005

Holly Lawrence, Ph.D. 110 Pine Street Florence, MA

ADAM MACNEIL BATES. Areas of specialization. Current Academic Appointment. Education. Honors & Awards

CURRICULUM VITAE. Igor V. Maslov Sasazuka, Shibuya-ku Phone: +81 (80) Web:

Curriculum Vitae of. Vicky G. Papadopoulou

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Scott McElfresh 209 Belmont Circle, Farmville, VA (434)

Dong "Michelle" Li. Phone: +1 (413)

Marsha B. Keune June 2015

Hannelore Weber Curriculum Vitae 2015

René F. Kizilcec. Curriculum Vitae

SCHOOL OF GRADUATE STUDIES DEPARTMENT OF MICROBIOLOGY, IMMUNOLOGY, AND PARASITOLOGY. POLICY GOVERNING MIP GRADUATE STUDENTS AND RECRUITS February 2014

September 18, POSITIONS: Term Assistant Professor, August Present Department of Psychology, Barnard College of Columbia University

Nadine Nasser Donovan, Esq. (617) (cell)

Kevin Fu Department of Electrical Engineering and Computer Science

Network security and privacy

SHANE P. HAMMOND 314 Martindale Road - Bernardston, MA (413) shammond@educ.umass.edu

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE

Nadine Nasser Donovan, Esq. (617) (cell)

David A. Cook Faculty Vita (September 1, August 31, 2013)

Edward W. Hutton, CFA

Edward W. Hutton, CFA

CURRICULUM VITAE ACADEMIC APPOINTMENTS

Strategic Advisor for Constituent Services; ASCD, Alexandria, Virginia

Pervasive Computing und. Informationssicherheit

GRADUATE PROGRAM IN BIOTECHNOLOGY

Energy Efficient Security in Implantable Medical Devices

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

EDUCATION. M.A. San Diego State University Degree: Master of Arts, May 2004 Curriculum and Instruction in Elementary Education GPA: 3.

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

Annual Review of Doctoral Students Guidelines Department of Computer Science College of William & Mary July 2014

Developmental Psychology Program Graduate Degree Requirements: Outline Revised 10/21/14 REQUIRED DEVELOPMENTAL COURSEWORK

Mission Statement. Program Overview. PhD Program in Microbiology & Immunology (MIM)

320 West 38 Street, #2523 New York NY Telephone:

EIT ICT Labs MASTER SCHOOL. Specialisations

Best Practices for Developmental Math Programs

Just Say No to Teaching Ethical Hacking

FORDHAM LAW SCHOOL CENTER FOR COPORATE, SECURITIES, AND FINANCIAL LAW, New York, NY Fellow, June July 2004

VITA. Professional Certification 2010 CFF Certified in Financial Forensics American Institute of Certified Public Accountants

MICHELLE M.Z. OHANIAN RESEARCH AND TEACHING INTERESTS EDUCATION

PRIME. Privacy and Identity Management for Everyone/Europe. Thomas Gross (IBM Research) with a PRIME hat on.

Attribute-proving for Smart Cards

Elizabeth A. Arnold. Academic Experience. Education

RONNIE J. BURROWS, Ph.D.

CBIA 2015 Connecticut Tax Conference June 26, 2015 Presenters

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

An Object Oriented Role-based Access Control Model for Secure Domain Environments

EDUCATION TEACHING EXPERIENCE

Aaron V. Rocke Rocke Law Group, PLLC 101 Yesler Way, Suite 603 Seattle, WA (206)

Evaluating The Performance of Symmetric Encryption Algorithms

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

CORAnet System. White Paper

Nadine Nasser Donovan, Esq. (617) (cell)

Chair, Department of Accounting, University of Massachusetts, and present

Craig W. Bartholio Department of Teacher Education Assistant Professor 701 E. Alosta Avenue, Azusa, CA

Office of the Provost. Substantive Academic Change to an Existing Degree Program Form

Strengthening the Teaching of Psychology in the Philippines

CURRICULUM VITAE. Name of Education Program and Institution: Physical Therapy Program, University Colorado Denver, Anschutz Medical Campus

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

James T. Geier CONTACT INFORMATION

Ms. Samantha Shewchuk Apt. 807 Cell: (613) Talwood Dr. Peterborough, ON, K9J7T3

Computer Science at James Madison University

Guidelines for Master's Thesis (Research Option for MS in Statistical Science Degree)

AP Cambridge Capstone Pilot Program. Cathy Brigham, Ph.D.

Best Poster Award: International Congress on Child and Adolescent Psychiatry 2012

CURRICULUM VITAE MARY MARGARET SALIGA FOX. 800 University Avenue West Windsor, Ontario N9A 5R9

IEEE Citation style guide

Information Security Attack Tree Modeling for Enhancing Student Learning

Soterios C. Zoulas, MA, APR 4 DiTullio Drive Framingham, MA Home: (508) Office: (617)

CV Checklist. F a c u l t y D o s s i e r. John Doe CV and Grants Page For submission of faculty dossier to PSOM COAP and PSC. General Information

M. Leigh Broxton, Ph.D.

TEXAS STATE VITA. Psychology. Position University Dates Assistant Professor Texas State University 2014-Present. Position Entity Dates

Application Security Maturity Model

CHARLES A. BRIGGS, Ph.D.

Transcription:

Thomas S. Benjamin Contact Information 32 West Street Apt. 3N Cold Spring, NY 10516 +1 (917) 744-7934 tomb@cryptocracy.net http://cryptocracy.net Research Interests Computer security and privacy. Medical devices. RFID. Biometrics. Education 2008 2010 ETH Zurich (Swiss Federal Institute of Technology) Ph. D. Studies; ABD 2007 2009 IBM Research Zurich Research Laboratory Pre-Doctoral Research 2004 2007 University of Massachusetts Amherst M.S. in Computer Science Thesis topic: Cloning resistant anonymous credentials 2003 2004 Columbia University Continuing education in computer science 1996 2000 Yale University B.S. In Computer Science 1990 1996 Riverdale Country School Awards IEEE Security and Privacy Best Paper Award for: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Peer Reviewed Publications Please note: I have omitted institutional affiliations for brevity. Please see the papers for affiliations. Towards Practical Identification of HF RFID Devices Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin Preliminary Thoughts on Privacy Supporting Binding of Biometrics to Credentials Jan Camenisch, Thomas S. Heydt-Benjamin Proximity-based Access Control for Implantable ACM Transactions on Information and System Security (TISSEC), 2012 Hot Topics in Privacy Enhancing Technology (HotPETs 2010) 2010, Berlin, Germany 16th ACM Conference on Computer and Page 1 of 8

Medical Devices Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin and Srdjan Capkun Communications Security (CCS) 2009, Chicago, USA Accountable Privacy Supporting Services Jan Camenisch, Thomas Gross, Thomas S. Heydt- Benjamin Physical-layer Identification of RFID Devices Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun Rethinking Accountable Privacy Supporting Services Jan Camenisch, Thomas Gross, Thomas S. Heydt- Benjamin Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel M.D. Security and Privacy for Implantable Medical Devices Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, William H. Maisel M.D. Vulnerabilities in First-Generation RFID-enabled Credit Cards Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, and Tom O Hare Journal of Identity in the Information Society, 2009, Springer Usenix Security 2009, San Diego, USA ACM Digital Identity Management 2008, Fairfax, VA, USA Winner: Best Paper Award IEEE Security and Privacy (Oakland) 2008, Oakland, CA, USA IEEE Pervasive Computing 2008, IEEE Financial Cryptography and Data Security 2007 Scarborough, Trinidad/Tobago Nonesuch: A Mix Network with Sender Unobservability Thomas S. Heydt-Benjamin, Andrei Serjantov, and Benessa Defend Workshop for Privacy in Electronic Society 2006 Alexandria, VA, USA Privacy for Public Transit Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and Kevin Fu Privacy Enhancing Technologies 2006 Cambridge University, England Page 2 of 8

Technical papers and patents Efficient Tight Interval Proofs with Camenisch-Gross Encoding. Camenisch J, Gross T, Heydt-Benjamin TS Cryptographic Proofs In Data Processing Systems Camenisch J, Gross T, Heydt-Benjamin TS Cryptographic Encoding and Decoding of Secret Data Camenisch J, Gross T, Heydt-Benjamin TS Cryptographic Protocols of the Identity Mixer Library Patrik Bichsel, Carl Binding, Jan Camenisch, Thomas Groß, Tom Heydt-Benjamin, Dieter Sommer, and Greg Zaverucha RFID Payment Card Vulnerabilities Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, and Tom O Hare IBM Research Report RZ3800, IBM Research Division, Zurich, Switzerland. 2011 US Patent Filing: 13/194,069 2011 US Patent No.: US 2010/0142704 A1 Pub. Date: June 2010 IBM Research Report RZ3730, IBM Research Division, Zurich Switzerland, March 2009. UMASS Amherst Technical Report, 2006 Professional Experience TPIPR CTO Aquavit Pharmaceuticals VP Technology Cryptocracy LLC Owner The Tor Project Research Scientist ETH Zurich (The Swiss Federal Institute of Technology) Research Assistant IBM Research Zurich Pre-doctoral researcher for the Cryptography and Security group 2013 Present 2012 2013 2011 2012 2010 2011 2008 2010 2008 2009 IBM Research Zurich 2007 Page 3 of 8

Intern for the Cryptography and Security group University of Massachusetts Amherst Research Assistant Columbia University Research Assistant Riverdale Country School Teacher, Administrative staff member. 2004 2007 2003 2004 2000 2004 Panels and Invited Talks Panel: Personal and Professional Privacy EuroDIG, Geneva, Switzerland, Sept 2009 Invited talk: Wireless Security and Physical Layer Identification Invited talk: The world goes wireless: A paradigm shift still not fully realized Invited talk: Anonymous Credentials in Electronic ID Invited talk: Privacy Supporting Identity Systems Theory Meets Practice Invited talk: Privacy and Identity Management Panel: Ethics in Privacy Research Thomas S. Heydt-Benjamin (Proposer and Moderator), Panelists: Caspar Bowden, George Danezis (co-proposer), Steven Murdoch, Andreas Pfitzmann, Gene Tsudik KU Leuven, Belgium, Feb 2009 RWTH Aachen, Germany, Feb 2009 Advanced Applications for Electric Identity Cards (ADAPID) Leuven, Belgium, July 2008 The International Conference on Java Technology (Jazoon) Zurich, Switzerland, June 2008 Secure Vehicular Communications EPFL, Lausanne, Switzerland, Feb 2008 Privacy Enhancing Technologies Symposium Ottawa, CA, 2007 Program Committee Memberships Privacy Enhancing Technologies Symposium 2008 2012 Page 4 of 8

Workshop for Privacy in Electronic Society (An ACM CCS Affiliated Workshop) Security and Privacy in Medical and Home-Care Systems (An ACM CCS Affiliated Workshop) 2006, 2007, 2010 2009, 2010 Hot Topics in Privacy Enhancing Technologies (PC co-chair) 2008, 2009 University Committees and Service Academic Standards and Curriculum Committee of the Graduate School 2004 2006 UMASS Graduate Council: the advisory and oversight committee of the graduate school. [Received 2 letters of commendation from chairperson] 2004 2006 Faculty Senate Ad Hoc Committee on Student Information Systems 2004 2006 UMASS Graduate Student Senate; elected representative of the computer science department 2004 2006 Yale University Departmental Student Advisory Committee; elected representative 1999 2000 Selected Media Coverage Interview on "dark net" and anonymity technology Interview on credit card security Good-Guy Hacker Rides into Town A Heart Device Is Found Vulnerable to Hacker Attacks Telemundo PR October 22nd 2015 Fox News September 29 2015 Putnam County News and Recorder December 21 2011 The New York Times, March 12 2008 Heart-Device Hacking Risks Seen The Wall Street Journal, March 12 2008 Guest on National Public Radio's Leonard Lopate show to discuss privacy for public transportation 40 minute interview, March 9, 2007 Page 5 of 8

Security researcher shows just how easy it is to steal personal data from RFID-bearing credit cards Live interview on Fox news, December 2006 'Smart' cards are quick, but are they safe? NBC's Today Show, October 26, 2006 No-Swipe Credit Cards Could Make ID Theft Easier Researchers See Privacy Pitfalls in No-Swipe Credit Cards ABC's Good Morning America, October 24, 2006 The New York Times, October 23, 2006 Popular Science and Public Service Schweizerische Gesellschaft für Mechatronische Kunst (SGMK) Teacher (Science enrichment for children and adults) Ontario Information and Privacy Commissioner's office: RFID and electronic drivers' license related subjects. 2009 2008 Consumer Reports: advice on and explanation of RFID related subjects. 2008 Selected Teaching and Advising GSoC Google Mentor: "Blocking-resistant Transport Evaluation Framework", Student Brandon Wiley Honors diploma thesis advisor: Timur Alperovich and Shane Clark Topic: embedded device security and privacy. Research mentor: Russel Silva Topic: embedded device security and privacy. 2011 2007 2006 Teaching Associate (Instructor) cs197c: The C++ Programming Language 2005 Teaching Assistant cs445: Information Systems 2005 Teaching Associate (Instructor): The Unix Programming Environment 2005 Page 6 of 8

AB level Advanced Placement Computer Science 2000 2004 Introduction to Technology for Grade Nine / Ten Curriculum coordinator during 2003-2004 school year 2000 2004 Introduction to Technology for Grade Seven 2000 2002 Invited Peer Review IEEE Transactions on Dependable and Secure Computing 2008, 2009, 2011 Journal of Computer Security 2010, 2011 Computers & Security 2011 Communications of the ACM (CACM) 2010 Database and Expert Systems Applications (DEXA) 2010 IEEE International Conference on Information, Communications and Signal Processing (ICICS) IEEE INFOCOM 2006, 2009, 2010 2009 International Conference on Networked Sensing Systems (INSS) 2009 IEEE SECON 2009 Journal of Computer Science 2008 ACM Transactions on Information and System Security (TISSEC) 2008 IEEE Symposium on Reliable Distributed Systems (SRDS) 2008 IEEE Symposium on Security and Privacy (Oakland) 2006-2008 Financial Cryptography and Data Security 2008 IEEE Transactions on Dependable and Secure Computing 2008 IEEE Transactions on Software Engineering 2007 Network and Distributed System Security Symposium 2006-2007 ACM Communications and Computer Security (CCS) 2007 Workshop on RFID Security (RFIDsec) 2007 International Conference on Applied Cryptography and Network Security 2007 IFIP SEC 2007 Workshop on Privacy Enhancing Technologies 2005 Page 7 of 8

Memberships Mensa Association for Computing Machinery (ACM) Institute of Electrical and Electronics Engineers (IEEE) ARRL - KD2JPN Page 8 of 8