Hamed Okhravi, Ph.D.



Similar documents
Cyberspace Security Econometrics System (CSES) Portfolio. Robert K. Abercrombie Organized by FY Updated October 20, 2014

ADAM MACNEIL BATES. Areas of specialization. Current Academic Appointment. Education. Honors & Awards

UVic Department of Electrical and Computer Engineering

Ming-Hsing Chiu. Home: (985) Chapel Loop Office: (985) EDUCATION

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

SCADA Cyber Security Testbed Development

June Zhang (Zhong-Ju Zhang)

Mohammad Arzaghi.

B.Sc. in Computer Engineering, School of Electrical and Computer Engineering,

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Muhammad K. Ghanbari, Computer Science dept.

Risk and Security Assessment. Zbigniew Kalbarczyk

SANDIP C. PATEL. (Fulbright Scholar and US citizen)

AC : INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT

Meeting Cyber Security Challenges

Teaching and Related Experience

Dr. Shashank Srivastava. Contact. Telephone: Teaching. Courses Taught: Current Courses: Past Courses:

Information Security Attack Tree Modeling for Enhancing Student Learning

Bob Boothe. Education. Research Interests. Teaching Experience

Wayne State University Phone: Woodward Avenue, Suite

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Christian Murphy Dept. of Computer & Information Science, University of Pennsylvania 3330 Walnut Street, Philadelphia, PA cdmurphy@cis.upenn.

Mohammad Arzaghi. /

Network Security Using Job Oriented Architecture (SUJOA)

Cybersecurity & Public Utility Commissions

Curriculum Vitae of Gilbert Kalonde

VITA: DR. YEN-HUNG HU

Arezoo Davari. Curriculum Vitae

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

Ganesh Bhatt, D.B.A. Associate Professor Information Science & Systems School of Business and Management ganesh.bhatt@morgan.edu

Mark D. Ellard, MBA, CPA. Profile. Education

Education 2016 Ph.D. Urban and Regional Planning, University of Illinois at Urbana- Champaign (Expected)

EDUCATION. Electrical Engineering, Tennessee Tech University, Cookeville, Tennessee, August 2013

PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014

Post-Graduation Survey Results 2014 Dietrich College of Humanities & Social Sciences STATISTICS Bachelor of Science

Bridging the knowledge gap between power engineering and cyber security: Imparting the interdisciplinary knowledge in cyber security for power systems

CURRICULUM VITAE Herbert L. Dershem

Fengwei Zhang. Research Interest. Education. Employment History

M.S. in Computer Science

curriculum vitae: Courtney Kisat Courtney Kisat / (618) Whitener St., Cape Girardeau, MO 63701

SANJEEV KUMAR. Technology & Operations, Ross School of Business University of Michigan, Ann Arbor MI sankum@umich.

CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION

BE Degree with Distinction From Lebanese American University Honor Society at the Lebanese American University ( )

Professional CV EDUCATION

Assessment for Master s Degree Program Fall Spring 2011 Computer Science Dept. Texas A&M University - Commerce

Graduate Programs. Dept of Computer Science. Dr. Weining Zhang

Best Practices for Developing Geographic Information Models

FY 2015 Schedule at a Glance

Curriculum Vitae JEFF LOUCKS

Cell: Phone: ACADEMIC EDUCATION

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt.

V&V and QA throughout the M&S Life Cycle

WWW:

John Noll, Ph.D. Research Associate, ATRIUM Laboratory, Marshall School of Business, University of Southern California,

HACU National Internship Program

Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

Machine Learning Department, School of Computer Science, Carnegie Mellon University, PA

SURENDRA SARNIKAR. 820 N Washington Ave, EH7 sarnikar@acm.org Madison, SD Phone:

Curriculum Vitae JOON-YEOUL OH

Adina Crainiceanu. Ph.D. in Computer Science, Cornell University, Ithaca, NY May 2006 Thesis Title: Answering Complex Queries in Peer-to-Peer Systems

How To Become A Computer Scientist

DANIELA VALDEZ-JASSO RESEARCH INTEREST

Jan Dec 2016 Training Schedule

Quantification of Security and Survivability

Current Position. Aug to present: University of New Hampshire Associate Professor (tenured) Teaching areas: Auditing and Advanced Auditing

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

FANG (Helga) HE, Ph.D. Candidate

COMPUTER SCIENCE PROGRAM

Curriculum Vitae. Min-Jeong Yang

JINGQUAN LI, PH.D. Education

Facilitated Self-Evaluation v1.0

Cyber Security. Smart Grid

Curriculum Vitae of. Vicky G. Papadopoulou

Nuclear Engineering Enrollments and Degrees Survey, 2014 Data

DR AYŞE KÜÇÜKYILMAZ. Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK

LIGO Cybersecurity Status

Gerald Roth. Department of Electrical Engineering and Computer Science School of Engineering Vanderbilt University Nashville, TN

ADVANCED LOCAL PREDICTORS FOR SHORT TERM ELECTRIC LOAD

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE

Carl Burch Clifton St mobile Conway AR Education May 00

Effect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection

Effect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection

Master Degree Program in Computer Science (CS)

2. What are your learning objectives or outcomes associated with each student learning goal?

Comprehensive Course Schedule

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Denise A. McKahn (McKay) Assistant Professor, Smith College 353 Ford Hall, 100 Green St, Northampton, MA Degrees. Awards. Employment History

Transcription:

Hamed Okhravi, Ph.D. MIT Lincoln Laboratory Massachusetts Institute of Technology hamed.okhravi@ll.mit.edu (781) 981-4113 Personal US Citizen Education University of Illinois at Urbana Champaign Ph.D. in Electrical and Computer Engineering 2010 GPA 4.0/4.0 University of Illinois at Urbana Champaign Master of Science in Electrical and Computer Engineering 2006 GPA 3.95/4.0 Sharif University of Technology, Tehran, Iran Bachelor of Science in Electrical Engineering 2003 Certificates Center for Teaching Excellence (CTE), University of Illinois at Urbana-Champaign Certificate in Foundations of Teaching May 2009 Cisco Systems, Inc. Cisco CIOSP, CDII, CABCC, CIOSA, and CICE Certificates Summer 2007 Research Areas Cyber Security Cyber Trust Science of Security Security Metrics Operating Systems Employments MIT Lincoln Laboratory, Lexington, MA Feb 2010 to present Technical Staff Conducted and technically led various research projects on systems security as the Principal Investigator (PI) Advised graduate students and interns Led research teams

University of Illinois at Urbana-Champaign, Urbana, IL Aug 2004 to 2010 Graduate Research Assistant Worked on various research projects including: trusted systems, high assurance multi-level security systems, trusted networking and computing, covert channel analysis, policy management, firewall configuration analysis, security metric development, assessment of security protocol (VPN), cyberattack simulation, binary code protection and code encryption, and kernel programming University of Illinois at Urbana-Champaign, Urbana, IL Jan 2009 to May 2009 Teaching Assistant (Course: Information Assurance) Lectured class sessions, made homeworks and quizzes, and graded parts of the midterm and final exams Received very positive feedbacks from the students (documented) Received a certificate in Foundations of Teaching for excellence in teaching Cisco Systems, Inc., San Jose, CA May 2007 to May 2008 Intern Worked in a team to design and develop the next generation of security auditing. Worked in a team to develop Cisco Trusted Security (CTS), a new security feature in switches. Designed and implemented Cisco Trusted Security (CTS) analysis, troubleshooting, and compliance verification tool. Network Geographics, Inc., Champaign, IL Jan 2007 to Jan 2008 Developer and Consultant Worked in a team to design and implement commercial firewall analysis tool. Provided software and security consultancy. PATSA Group Co., Tehran, Iran 2002 to 2004 IT and Security Engineer Performed many IT, Networking, and Security projects such as developing firewalls, developing Network Management Systems, developing Copy Protection Software, and Vulnerability Assessment. Dept. of Electrical Eng., Sharif Univ., Tehran, Iran Spring 2003 Teaching Assistant Worked as a teaching Assistant for the courses of Machine Language and Structure. Dept. of Electrical Eng., Sharif Univ., Tehran, Iran Fall 2003 Teaching Assistant Worked as a teaching Assistant for the courses of Microprocessors. Dept. of Electrical and Computer Eng., Shahid Beheshti Univ., Tehran, Iran 2002 to 2004 Research Project Consultant Designed and integrated a research project studying the effects of electromagnetic waves on human body. Dept. of Electrical Eng., Sharif Univ., Tehran, Iran 2001 Data Base Programmer Developed and designed the departments thesis database as Advanced Internet Programming project (Using ASP). STES Group Company, Tehran, Iran 2000 to 2001 Administrator and Web Designer Designed many web sites, databases, and secure networks, i.e.: www.malach-wood.com, www.stesgroup.com (Award Winner), www.parskhazar.com, www.nibc-as.com, www.ressico.com.

Publications Theses Supervised 1. Kelly Casteel. A Systematic Analysis of Defenses Against Code Reuse Attacks. Thesis for Master of Engineering in Computer Science and Engineering, Massachusetts Institute of Technology, Sep 2013 Book Chapters 1. Hamed Okhravi, Adam Comella, Eric I. Robinson, Stephen Yannalfo, Peter W. Michaleas, and Joshua Haines, Creating a Cyber Moving Target for Critical Infrastructure Applications. Critical Infrastructure Protection V, J. Butts and S. Shenoi (Eds.), IFIP International Federation for Information Processing, Springer, 2011 2. Hamed Okhravi and David Nicol, Chapter5: Applying Trusted Network Technology To Process Control Systems. Critical Infrastructure Protection II, E. Goetz and S. Shenoi (Eds.), IFIP International Federation for Information Processing, Springer, Boston, ISBN: 978-0-387-88522-3, 2008 Journal Publications 1. Hamed Okhravi, Adam Comella, Eric Robinson, and Joshua Haines, Creating a Cyber Moving Target for Critical Infrastructure Applications Using Platform Diversity, Elsevier International Journal of Critical Infrastructure Protection (IJCIP), Vol. 5, No. 1, 2012 2. Hamed Okhravi, Joshua Haines, and Kyle Ingols, Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target, High Frontier Journal: The Journal for Space and Cyberspace Professionals, Vol. 7, No. 3, 2011 3. Stephen Bishop, Hamed Okhravi, Shahram Rahimi and Yung-Chuan Lee, Covert-Channel Resistant Information Leakage Protection using a Multi-Agent Architecture, IET Information Security Special Issue on Multi-Agent & Distributed Information Security, vol. 4, no. 4, 2010 4. Hamed Okhravi and David Nicol, Application of Trusted Network Technology to Industrial Control Networks, Elsevier International Journal of Critical Infrastructure Protection (IJ- CIP), Elsevier, Vol. 2, No. 3, 2009 5. Hamed Okhravi, Stephen Bishop, Shahram Rahimi and Yung-Chuan Lee, A MA-based System for Information Leakage Detection in Distributed Systems, Emerging Technologies, Robotics and Control Systems, Third Edition, June 2009 6. Hamed Okhravi and David Nicol, Evaluation of Patch Management Strategies, International Journal of Computational Intelligence: Theory and Practice, Vol. 3, No. 2, Dec 2008 Conference Publications 1. Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, and William Streilein, Systematic Analysis of Defenses Against Return-Oriented Programming, Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 13), Lecture Notes in Computer Science (LNCS), Vol. 8145, pp. 82-102, 2013(Acceptance Rate: 23%) 2. Hamed Okhravi, Andrew Johnson, Joshua Haines, Travis Mayberry, Agnes Chan, Dedicated vs. Distributed: A Study of Mission Survivability Metrics, Proceedings of the IEEE Military Communications Conference (MILCOM 11), Baltimore, MD, November, 2011 3. Sonia Jahid, Imranul Hoque, Carl Gunter, and Hamed Okhravi, MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control, Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY 11), San Antonio, TX, Feb 21-23, 2011 (Acceptance Rate: 23%)

4. Hamed Okhravi, Stanley Bak, and Samuel T. King, Design, Implementation and Evaluation of Covert Channel Attacks, Proceedings of the IEEE Conference on Homeland Security Technologies (IEEE HST 10),Wltham, MA, November 8-10, 2010 5. Hamed Okhravi, Eric I. Robinson, Adam Comella, Stephen Yannalfo, Peter W. Michaleas, and Joshua Haines, TALENT: Dynamic Platform Heterogeneity for Cyber Survivability of Mission Critical Applications, Proceedings of Secure and Resilient Cyber Architecture Conference (SRCA 10), McLean, VA, October 29, 2010 6. Hamed Okhravi, Fredrick T. Sheldon, Data Diodes in Support of Trustworthy Cyber Infrastructure, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW 10), Oak Ridge, TN, April 21-23, 2010 7. Hamed Okhravi and David M. Nicol, TrustGraph: Trusted Graphics Subsystem for High Assurance Systems, Proceedings of IEEE Annual Computer Security Applications Conference (ACSAC 09), Honolulu, HI, December 2009 (Acceptance Rate: 19.6%) 8. Hamed Okhravi, Ryan H. Kagin and David M. Nicol, PolicyGlobe: A Framework for Integrating Network and Operating System Security Policies, Proceedings of ACM Workshop on Assurable & Usable Security Configuration (SafeConfig 09), Chicago, IL, November 2009 9. Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi and Shahram Rahimi, Information Leakage Detection in Distributed Systems using Software Agent, Proceedings of IEEE Symposium on Intelligent Agents (IA 09), Nashvile, TN, March 2009 10. Matt Davis, Zeb Tate, Hamed Okhravi, Chris Grier, Tom J. Overbye, and David M. Nicol, SCADA Cyber Security Testbed Development, Proceedings of North American Power Symposium (NAPS), Carbondale, IL, pp. 483-488, September 2006 11. David M. Nicol and Hamed Okhravi, Performance analysis of Binary Code Protection, Proceedings of Winter Simulation Conference, Orlando, FL, pp. 601-610, December 2005 12. Hamed Okhravi, A New Approach Towards The Network Fundamental Matrices and The Systematic Method of Construction of The Fundamental Loop and Cut-set Matrices from The Node Matrix, The 4th Iranian Student Conference on Electrical Eng. (ISCEE2001), vol. 3, pp. 955-959, September 2001 Theses 1. Hamed Okhravi. Trusted and High Assurance Systems. Ph.D. Dissertation, University of Illinois at Urbana Champaign, 2010 2. Hamed Okhravi. Security Policy Integration and Consistency Validation. M.S. Thesis, University of Illinois at Urbana Champaign, 2006 3. Hamed Okhravi. Design and Implementation of Network Control, Supervision, and Policy Management System with High Security Feature. B.Sc. Thesis, Sharif University of Technology, 2003 Technical Reports 1. Hamed Okhravi, Mark Rabe, Travis Mayberry, William Leonard, Thomas Hobson, David Bigelow, and William Streilein, Survey of Cyber Moving Targets, Technical Report 1166, MIT Lincoln Laboratory, 2013

Workshop and White Papers (Unrefereed) 1. Hamed Okhravi, Deployment of Commercial-Off-The-Shelf (COTS) Products for Multi-level Security Systems, Report, Information Trust Institute, Dec 2007 2. Hamed Okhravi, Configuring Tunnels and VPNs in Checkpoint Firewalls, White Paper, Network Geographics, Inc., Nov 2007 3. Imranul Houqe, Sonia Jahid, and Hamed Okhravi, MyABDAC: Attribute Based Database Access Control, Midwest Security Workshop (MSW07), Chicago, IL, Oct 2007 4. Hamed Okhravi, Chris Grier, Matt Davis, Zeb Tate, David Nicol, and Tom Overbye, Cyber- Security Simulation Testbed, Trustworthy Cyber Infrastructure for Power Grid Workshop, Dec 2006 5. Hamed Okhravi and Sara Sadeghi, Processor in Memory: Architecture Overview and Design Issues, White Paper, University of Illinois, 2005 6. Hamed Okhravi, Analysis of Coupon Replication Systems, White Paper, 2005 7. Hamed Okhravi, Extending l Hopital s Rule, White Paper, 2002 Services Program Committee Member 2007 to present Cyber and Netcentric Workshop(CNW), IEEE Symposium on Cyber and Physical Security and Privacy (SmartGridComm), International Conference on Parallel and Distributed Systems (ICPADS), International Conference on Security in Computer Networks and Distributed Systems (SNDS), and International Workshop on Trust and Privacy in Cyberspace(CyberTrust), International Conference on Smart Grids and Green IT Systems (SMARTGREENS), Agent Based Computing V (ABC 08) Workshop Reviewer 2004 to present Reviewer of the journals and conferences: Communications of the ACM, IEEE Symposium on Security and Privacy, IEEE Transaction on Parallel and Distributed Systems, Elsevier International Journal of Critical Infrastructure Protection (IJCIP), Annual IFIP Conference on Critical Infrastructure Protection (IFIP CIP), International Conference on Parallel and Distributed Systems (IC- PADS), Hawaii International Conference on System Sciences (HICSS), International Conference on Virtual Execution Environments (VEE), IEEE International Conference on Pervasive Computing and Communications, International Journal of Computational Intelligence, Informatica: An International Journal of Computing and Informatics, International Journal of Computer Science and Applications Undergraduate Research Mentor Aug 2008 to 2010 Mentored undergraduate students in their research projects under the Promoting Undergraduate Research in Engineering (PURE) program. Technical Committee Member Nov 2008 and Nov 2007 Worked in the technical committee of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC08) Worked in the technical committee of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC07) K-12 Education Curriculum Developer Spring 2007 Developed K-12 education curriculum and interactive lessons for teaching high-school students about cyber security and computer engineering.

Research Group Memberships Researched for and has been a member of the following research groups: Science of Security Virtual Organization CRHC (Center for Reliable and High Performance Computing) ITI (Information Trust Institute) Cisco Trusted Security (CTS) Design Team TCIPG (Trustworthy Cyber Infrastructure for Power Grid) I3P (Institute for Information Infrastructure Protection) RINSE (Real-time Immersive Network Simulation Environment) Development Group References A reference sheet will be made available upon request