Lanier A. Watkins, Ph.D. Curriculum Vitae JHU/APL MP6-S370 443-778-5913 11100 Johns Hopkins Road Lanier.Watkins@jhuapl.edu Laurel, Maryland 20723 SUMMARY OF QUALIFICATIONS Broad research background in malware analysis and research, network traffic analysis and predictive analytics, network security, and signal processing. Experience includes using information leakage to correlate network traffic and system activity, using machine learning techniques to solve networking problems, and reducing problem spaces by using wavelet or spectral analysis. Additionally, experienced in technical management and cyber security policy. EDUCATION Clark Atlanta University Physics B.S. 1997 Clark Atlanta University Physics M.S. 1997 Clark Atlanta University Computer Science M.S. 1999 Georgia State University Computer Science Ph.D. 2010 Johns Hopkins University Biotechnology Management and Entrepreneurship M.S. 2016 APPOINTMENTS Senior Professional Staff II Johns Hopkins University Applied Physics Lab 2011 - present Associate Research Scientist Johns Hopkins University 2013 - present Lecturer Johns Hopkins University Engineering Professionals 2014 - present EMPLOYMENT The Johns Hopkins University Applied Physics Lab, Laurel, MD 5/11 Present Sr. Cyber Research Scientist Responsibilities include technical business development (Critical Infrastructure Protection) with the federal government and grant writing to support junior staff members and students. Relevant security technology includes: Mobile Device, Big Data, Predictive Analytics, Cyber Physical (SCADA), Malware Analysis, and Next Generation Intrusion Detection Systems The Johns Hopkins University, Baltimore, MD 10/13 - Present Associate Cyber Research Scientist Responsibilities include developing and maintaining a cyber-security course which serves as a conduit for identifying talented research students. I then train the students to become research assistants by assisting me with solving real-world security problems. AT&T, Atlanta, GA 1/01 5/11 Sr. Technical Product Manager: 06/08 5/11 o Responsibilities included the life-cycle management of a critical internal system that monitored the health and status of the multi-billion dollar revenue generating national cellular network. Sr. Product Manager: 05/06 06/08 o Responsibilities included the portfolio and life-cycle management of Frame Relay and ATM products. Among these duties was the profit and loss management of over a quarter of a billion dollars in revenue. Sr. Product Development Manager: 01/01 05/06 o Responsibilities included writing functional requirements, managing multi-million dollar product development budgets, and leading cross-functional teams that develop and implement telecommunication products and services. Ford Motor Company, Dearborn, MI 10/99 12/00 o Rotational Manager Training Program
Invited Talks and Presentations Patents IEEE MALCON 2014, Fajardo, Puerto Rico 10/14 Conference Presentation: "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities" Morgan State University, Computer Science Department, Baltimore, MD 9/17 Invited Talk: "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities" Malware Technical Exchange Meeting 2014, Kirtland Air Force Base, Albuquerque, NM 7/14 Conference Presentation: A Tunable Attribution Framework Malware Technical Exchange Meeting 2014, Kirtland Air Force Base, Albuquerque, NM 7/14 Conference Presentation: Fighting Banking Trojans: The Offensive Tactical Reconnaissance Platform IEEE MoST 2013, San Francisco, CA 5/13 Conference Presentation: Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices University of Delaware, Department of Electrical and Computer Engineering, Newark, DE 3/13 Invited Talk: Using Network Traffic to Infer Hardware State IEEE ICC 2008, Beijing, China 5/08 Conference Presentation: Passive Identification of Under Utilized CPUs in High Performance Cluster Grid Networks ACM Gridnets 2007, Lyon, France 10/07 Conference Presentation: Using Network Traffic to Passively Detect Under Utilized Resources in High- Performance Cluster Grid Computing Environments. Patent #3598-SPL Filed 9/14 A Network-Based Mobile Device Application Monitor for Android Mobile Devices Provisional Patent #3659-SPL 11/13 A Network-Based Mobile Device Malware Monitor for Android Mobile Devices Awards, Scholarships, and Fellowships 5-Year BS/MS Scholarship in Physics, Clark Atlanta University 8/92 2-Year MS Scholarship in Computer Science, Clark Atlanta University 8/97 Lawrence R. Hafstad Fellowship, Johns Hopkins University Applied Physics Lab 10/13 Publications Journals Lanier Watkins, William H. Robinson, Raheem Beyah, "Using Network Traffic to Infer Hardware State: A Kernel-Level", In ACM Transactions on Embedded Computing Systems (TECS), 2015. Lanier Watkins and John Hurley, Cyber Maturity as Measured by Scientific-based Risk Metrics, To Appear In the Journal of Information Warfare (JIW), July 2015. Lanier Watkins, William H. Robinson, Raheem Beyah, A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks. In IEEE Transactions on Parallel and Distributed Systems (TPDS), December 2011.
Lanier Watkins, William H. Robinson, Raheem Beyah, A Passive Solution to the Memory Resource Discovery Problem in Grid Computing. In IEEE Transactions on Network and Service Management (TNSM), December 2010. Lanier Watkins, Cherita Corbett, and Raheem Beyah, Using Link RTT to Passively Detect Unauthorized Wireless Nodes. In the International Journal of Security and Networks, Vol. 4, No. 3, 2009. Conferences Georgios Lontorfos, Kevin D Fairbanks, Lanier Watkins, and William H. Robinson, Remotely Inferring Device Manipulation of Industrial Control Systems Via Network Behavior, To Appear in the Proceedings of IEEE Workshop on Network Measurements (WNM), October 2015. Lanier Watkins and John Hurley, Cyber Maturity as Measured by Scientific Risk-Based Metrics, In the Proceedings of the International Conference on Cyber Warfare and Security (ICCWS), March 2015. Lanier Watkins, Christina Kawka, Cherita Corbett, and William Robinson, "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities", In IEEE Proceedings of the International Conference on Malicious and Unwanted Software (MALCON), October 2014. Mengchao Yue, William H. Robinson, Lanier Watkins and Chertia Corbett, "Constructing Timing-Based Covert Channels in Mobile Networks by Adjusting CPU Frequency", In the Proceedings of ACM International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 2014. Lanier Watkins, Garth V. Crosby and Afsana Sharmin, 'Using Network Traffic to Infer Power Levels in Wireless Sensor Nodes, In the Proceedings of IEEE the International Conference on Computing, Networking and Communications (ICNC), CNC Workshop, February 2014. Lanier Watkins, Cherita Corbett, Benjamin Salazar, Kevin Fairbanks and William H. Robinson, Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices In Proceedings of the IEEE Mobile Security Technologies (MoST), May 2013. Lanier Watkins, Raheem Beyah, and Cherita Corbett, Passive Identification of Under Utilized CPUs in High Performance Cluster Grid Netwoks In the Proceedings of the IEEE International Conference on Communications (ICC), May 2008. Lanier Watkins, Raheem Beyah, and Cherita Corbett, A Passive Approach to Rogue Access Point Detection. In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2007. Lanier Watkins, Raheem Beyah, and Cherita Corbett, Using Network Traffic to Passively Detect Under Utilized Resources in High-Performance Cluster Grid Computing Environments. In the Proceedings of the ACM International Conference on Networks for Grid Applications (GRIDNETS), October 2007. Alfred Msezane, Zineb Felfli, Dmitri Sokolovski, Lanier Watkins, et al, Regge-Pole Calculation of the Resonance Contribution to Electron-Atom Cross Sections, 3rd International Conference on Neural, Parallel and Scientific Computations, August 2006. Lanier Watkins, Kenneth R. Perry, John S. Hurley, B. Olson, and B. Pain, Wavelet Transform Image Compression Prototype. Technical Proceedings of the International Conference on Modeling and Simulation of Microsystems, 1999. Referee Service for Journals / Magazines IEEE Transactions on Parallel and Distributed Systems, 2015
Journal of Wireless Communications and Mobile Computing, 2014 Journal of Risk Analysis, 2013 Journal of Wireless Communications and Mobile Computing, 2013 Elsevier Information Sciences, 2013 IEEE Transactions on Parallel and Distributed Systems, 2013 Elsevier AD HOC Networks Journal, 2013 IEEE Mobile Ad-hoc and Sensor Systems, 2013 IEEE Transactions on Parallel and Distributed Systems, 2012 IEEE Transactions on Systems, Man, and Cybernetics, 2011 Security and Communication Networks, 2011 Elsevier Information Sciences, 2010 IEEE Transactions on Parallel and Distributed Systems, 2010 Hindawi Publishing Corporation, 2010 Technical Program Committees International Workshop on Mobile Computing Security, Program Committee, 2015 IEEE ICC - Communication and Information Systems Security Symposium, 2015 IEEE International Symposium on Security and Privacy in Internet of Things, 2013 Euromicro PDP (Special Session on Energy Aware Systems), Program Committee, 2011 International Conference on Computing, Networking and Communication (ICNC) Program Committee, 2011 Professional Society Memberships Institute for Electrical and Electronics Engineers (IEEE): Computer Society, 2010-Present Security Clearance Secret, 2011 to Present Master s Capstone Degrees Supervised Wlajimir Alexis (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Automobile Driver Identification Using the Wavelet Transform and Machine Learning Weihong Lou (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Tunable Attribution: Can Malware Manipulate AV Detection?" Changyun Gong (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Algorithm Detection in Binary Files Using Magic Numbers and Strings Peizhao Li and Yifan Tian (Current 2015 M.S. Security Informatics Students) Master s Capstone Project: A Network-based Approach to Black Listing Mobile Applications That Exhibit Silent or Obfuscated Network Traffic Kurt Silberberg, M.S. in Security Informatics (Spring 2015) Master s Capstone Project: Monitoring DDoS Botnet C&C s For Computer Forensic Artifacts Ashwini Pugazhendhi, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "A Network-based Thermal Hardware Trojan Detection Method" Georgios Lontorfos, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "Remotely Identifying Rich Targets In SCADA Networks" Chengyuan Zhang, Fangyue Chen, and Wentao Li, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "Mapping The Attack Surface For Zeus 2.0.8.9 Command And Control" Shijie Zhang, Li Xu, and Christina Kawka, M.S. in Security Informatics (Spring 2014) Master s Capstone Project: Malware Analysis of Zeus 2.0.8.9: The Development of A Tunable Attribution Framework and Remote Command and Control Reconnaissance
Amritha Lal, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Network-Based Detection of Malware in Mobile Networks Shuang Xie and Tianning Yang, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Identifying Mobile Malware Instructions Which Induce Information Leakage in Network Traffic Mengchao Yue, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Covert Timing Channel: An Android-Based Mobile Application