STOS Symposium 2003

Speaker Bios


Dr. Avi Rubin

"Electronic Voting: A case study of how closed systems fail"

Dr. Avi Rubin is Associate Professor of Computer Science and Technical Director of the Information Security Institute at Johns Hopkins University. Prior to joining Johns Hopkins Rubin was a research scientist at AT&T Labs. Dr. Rubin is author of several books including Firewalls and Internet Security, second edition (with Bill Cheswick and Steve Bellovin, Addison Wesley, 2003), White-Hat Security Arsenal (Addison Wesley, 2001), and Web Security Sourcebook (with Dan Geer and Marcus Ranum, John Wiley & Sons, 1997). He is Associate Editor of ACM Transactions on Internet Technology, Associate Editor of IEEE Security & Privacy, and an Advisory Board member of Springer's Information Security and Cryptography Book Series. Rubin serves on the board of directors of the USENIX Association and on the DARPA Information Science and Technology Study Group.


picture
unavailable

Dr. Doug Maughan

DARPA CHATS - Composable High Assurance Trusted Systems

The CHATS program is developing the tools and technology that enable the core systems and network services to protect themselves from the introduction and execution of malicious code and other attack techniques and methods. These tools and technologies will provide the high assurance trusted operating systems context/basis to host the planned security services needed to achieve comprehensive secure highly distributed mission critical information systems for the DoD. This project will fundamentally change the existing approach to development and acquisition of high assurance trusted operating systems technology by impacting the state of assurance in current open-source operating systems and developing an architectural framework for future trusted operating systems.

Alex Avriette

POCO Networks

Having administrated Unix for biotech, dotcom, and defense over almost a decade, Alex Avriette has a keen sense of what is necessary to secure applications, networks, and other information assets. Or perhaps he is just more paranoid than most.

picture
unavailable

Robert Bagnall

Director of Focused Intelligence, iDEFENSE
CEO, MUSE iNNOVATIONS

Robert J. Bagnall has been in cyber-security for nearly two decades, building, managing, and leading Computer Emergency Response Teams (CERTs) for the DoD, the US Army, the FBI, and Counterpane Internet Security. Mr. Bagnall is also a 13 year Air Force Intelligence veteran who has provided operational intelligence support in such joint environments such as Operation
Desert Shield/Storm, Operation Joint Endeavor, and Operation Just Cause. He is currently the Director of Focused Intelligence at iDEFENSE as well as the CEO of MUSE iNNOVATIONS.

picture
unavailable

Taylor Boon

Taylor was most recently Chief Technology Officer at BNX Systems for over five years, working to provide enterprise strong authentication solutions using biometrics, smart cards, tokens, and passwords for access to enterpise applications. Prior to his work with BNX Systems, Taylor was a software architect at Network Associates and Saber Software.

picture
unavailable

J.J. Brennan

The MITRE Corporation

picture
unavailable

David Corcoran

Partner
Identity Alliance

David holds a computer science degree from Purdue University where he participated in the CERIAS program lead by Dr. Gene Spafford. David has worked on many consulting projects for several well-known companies in the computer and security industry. He has seasoned knowledge in the areas of smart cards, PKI, biometrics, and rapid prototyping.

Don Faatz

The MITRE Corporation

Don Faatz is a Principal Information System Security Engineer with the MITRE Corporation. Don supports the Internal Revenue Service (IRS) Office of Modernization Security in developing security architecture for new IRS information systems. Don has Bachelor and Masters degrees in Computer Systems Engineering from Rensselaer Polytechnic Institute.

picture
unavailable

Mark Feldman

Principal Computer Scientist
Network Associates Laboratories

Mr. Feldman is a Principal Computer Scientist and manager of Network Associates Laboratories' Host Intrusion Protection group. His expertise is in designing and implementing security-based software. He is a co-designer and co-implementer of TIS' Generic Software Wrappers Toolkit. He has also designed and written software implementing the Privacy Enhanced Mail (PEM)
and MIME Object Security Services (MOSS) protocols. He was one of the implementers of Network Associates Laboratories' first prototype of role-based security leading to Network Associates Laboratories' DTE and
wrappers technologies. At CommerceNet, he worked on the design of protocols in the Financial Services Technology Consortium's Electronic Check and Bank Internet Payment System project

picture
unavailable

Jason Garman

Computer Forensics Analyst
Mantech National Security Solutions Group

Jason Garman is currently working with computer forensics for the national defense and intelligence communities at Mantech National Security Solutions Group. Previously, he worked at several biotech firms in the Washington, DC area where he helped clients design and implement secure yet easy to use research networks. Jason enjoys working with the practical application of tools and techniques to solve computer and network security problems. Author of O'Reilly's new book "Kerberos: the Definitive Guide".

picture
unavailable

Don Gay

R&D Projects Marketing, Inc.

Don Gay, as both an engineer and manager, has worked in the Federal Government for 32 years and in industry for 6 years. He consults with and teaches classes to the Navy labs and National labs, among others, in marketing R&D projects to the Federal government.

picture
unavailable

Shawn Geddis

Federal Consulting Engineer, Apple Computer, Inc.

Shawn Geddis chairs the Secure Trusted OS [STOS] Consortium ( http://www.stosdarwin.org/ ), which he co-founded in 1999. As a Consulting Engineer for Apple Computer, Inc., Federal Systems since 1998, he has helped to extend Apple's collaboration with the Federal Government focusing on security and use of open source. Prior to joining Apple, Shawn worked for more than 8 years as a Networking and Security Defense contractor, a majority of that time helping DARPA support and defend its network infrastructure.

picture
unavailable

Mr. Peter Hesse

Federal Consulting Engineer, Apple Computer, Inc.

Peter Hesse is the President of Gemini Security Solutions, Inc. Mr. Hesse provides services such as security software development, security evaluations, PKI enablement, and security training to public and private sector organizations throughout the world.

picture
unavailable

Ken Hornstein

UNIX Guru & Crypto Plumber
ITT Advanced Engineering and Sciences

Ken Hornstein works for the ITT Advanced Engineering and Sciences, supporting the Naval Research Laboratory in Washington, DC. He's been the primary Kerberos developer at NRL for almost 50 dog-years. His business card lists his title as "Unix Guru and Crypto Plumber", but he doesn't know what that means.

picture
unavailable

John Hurley, Ph.D.

Security Policy Architect, Apple Computer, Inc.

As a part of the software engineering team, John Hurley communicates with other Apple engineers and external organizations on security issues, and writes security related code for OS X. He was previously the manager of the Data Security team, the engineering team responsible for many of the security features of Mac OS X such as the keychain, certificate management and encrypted disk copy. Before joining Apple in 1999, Hurley was a co-founder and Vice President of Aveo, Inc., a computer telephony and internet services corporation. Along with his work credits, Hurley holds two patents on e-commerce technologies. He received his Ph.D. in Mathematics from the State University of New York at Stony Brook.

picture
unavailable

Keith J. Jones

Principal Computer Forensic Consultant
Foundstone, Inc.

Mr. Jones is a computer forensic consultant for Foundstone. His primary area of concentration is incident response program development and computer forensics. Mr. Jones specializes in log analysis, computer crime investigations, forensic tool analysis and specialized attack and penetration testing. At Foundstone, Mr. Jones has investigated several different types of cases including intellectual property theft, financial embezzlement, negligence, and external attacks. Additionally, Mr. Jones has testified in U.S. Federal Court as an expert witness in the subject of computer forensics. Mr. Jones is a coauthor of the ÒAnti-Hacker Tool KitÓ book and has contributed material to other books such as ÒHackerÕs ChallengeÓ.

Prior to joining Foundstone, he managed and participated with a team on several software development projects to build tools for log analysis, specialized attack and penetration, specialized defensive measures, and vulnerability assessments. Mr. Jones then joined a biotech startup as the senior security administrator, responsible for the company's total information security model in which he completely developed a security and network infrastructure from the ground up.

He has completed two Bachelor of Science degrees in Electrical Engineering and Computer Engineering, tying hardware and software together needed to combat computer and network security issues. He then went forward to pursue a Masters of Science degree in Electrical Engineering, focusing on Digital Signal Processing and Communications and was published in the digital imaging research circle. His research included cutting edge steganography and watermarking techniques for covert channeling, author identification, and authenticity of digital images.

picture
unavailable

Ms. Susan Joseph

Principal Secure Systems Engineer
DigitalNet Government Solutions

Ms. Susan Joseph is a Principal Security Systems Engineer at DigitalNet Government Solutions. Ms. Joseph has over 16 years of experience in the computer security industry where she has been a key contributor on various commercial and government security products.

picture
unavailable

Douglas Kilpatrick

Development Engineer
Network Associates Laboratories

Ms. Susan Joseph is a Principal Security Systems Engineer at DigitalNet Government Solutions. Ms. Joseph has over 16 years of experience in the computer security industry where she has been a key contributor on various commercial and government security products.

picture
unavailable

Samuel Kline

Chief Development Engineer, SAINT Corporation

Robert A. Martin

CVE Compatibility Lead, The MITRE Corporation

Robert A. Martin is the primary point of contact for CVE compatibility efforts, a member of the OVAL team, and a Principal Engineer in MITRE's Information Technologies Directorate. For the past four years, Martin's efforts have been focused on the interplay of cyber security, critical infrastructure protection, and the use of software-based technologies and services. Martin joined the MITRE Corporation in 1981 after earning a bachelor's degree and a master's degree in electrical engineering from Rensselaer Polytechnic Institute, subsequently he earned a master's of business degree from Babson College. He is a member of the ACM, AFCEA, IEEE, and the IEEE Computer Society.

Jim Magee

Core OS Engineer, Apple Computer, Inc.

Jim Magee is a technical lead on the Mac OS X/Darwin kernel development team at Apple with 18 years experience in operating systems and operating systems security. Prior to joining Apple, Mr. Magee was a Senior Network Security Consultant with IBM Global Services and specialized in large-scale distributed solutions security. Mr. Magee was also a member of the Gould team that achieved the first Unix C2 evaluation. He also lead several B1 evaluation efforts while at Gould/Encore.

picture
unavailable

Anil Nigam

Chief Technical Officer, StorCard Inc.

Anil Nigam is a co-founder and presently Chief Technical Officer at StorCard Inc. He has worked in the computer data storage industry for over 29 years. He is an inventor on over 15 Patents and has authored two technical papers. He was previously a founder and Vice-President of Engineering at SyQuest Technology and then co-founded two companies Antek Peripherals Inc. and Flextor Corporation. In all these assignments Mr. Nigam was responsible for the design and development of removable media data storage
products.

picture
unavailable

Joel Rennich

picture
unavailable

Mindy Rudell

The MITRE Corporation

Paul Suh

Trainer/Curriculum Developer
Apple Computer

Paul Suh both writes and delivers advanced technical training materials for Apple to customers. His primary areas of responsibility include computer security, web services, and WebObjects. He has also developed advanced interactive web sites for Apple customers based on WebObjects, the software that drives Apple's on-line store and iTunes Music Store. Prior to joining Apple he was a Senior Economist with the Law and Economics Consulting Group in Washington, DC, where he presented expert testimony in anti-trust, dumping, and regulatory cases.

David Turner

GPL Compliance Engineer
Free Software Foundation

David "Novalis" Turner is the son of two lawyers, raised to fight injustice wherever he saw it. In college, David discovered the GNU project, and fell in love with the GNU General Public License (GPL). Soon, he had installed GNU/Linux, and written his first Free Software. Outrage over the DMCA led David to learn more about copyright law, and soon, he was answering Free Software licensing questions at licensing@gnu.org. David helped build the Free Software Foundation's GPL Compliance Lab, where he helps companies and individuals to comply with the two most popular Free Software licenses.

picture
unavailable

John Viega

Founder and Chief Scientist
Secure Software, Inc

John Viega, Founder and Chief Scientist of Secure Software (www.securesoftware.com), is a well-known security expert, and coauthor of Building Secure Software (Addison-Wesley) and Network Security with OpenSSL (O'Reilly). John is responsible for numerous software security tools, and is the original author of Mailman, the GNU mailing list manager. He holds a B.A. and M.S. in Computer Science from the University of Virginia. Mr. Viega is also an Adjunct Professor of Computer Science at Virginia Tech (Blacksburg, VA) and a Senior Policy Researcher at the Cyberspace Policy Institute, and he serves on the Technical Advisory Board for the Open Web Applications Security Project. He also founded a Washington, D.C. area security interest group that conducts monthly lectures presented by leading experts in the field. He is the author or coauthor of nearly 80 technical publications, including numerous refereed research papers and trade articles.

Tony Walker, Ph.D.

Vice-President Development,
CRYPTOCard Corp.

Tony Walker Ph.D. is Vice-President of Development at CRYPTOCard Corp. (www.cryptocard.com), the innovative leader in Secure Password Technology.  Walker has 30 years experience in software development in areas ranging from device drivers and data and voice communications to encryption and security systems.  A recognized security technology thought leader, Walker's vast technical expertise is at the core of CRYPTOCard's market-leading Secure Password Technology.  CRYPTOCard's impressive list of clients now includes NASA, Arizona State Police, Supreme Court of Louisiana, Stats Canada, and Australia Parliament House on the Federal side, and Getronics, Yahoo, PriceWaterhouseCoopers, Deutsche Bank, Telstra, Rothschild Bank, STM Microelectronics, and CIENA Corporation in the corporate market.
 
Prior to joining CRYPTOCard, Walker was instrumental in the development of secure communication systems at the Government Communications Headquarters in Cheltenham, England.  Walker holds an MA from Cambridge University in Mathematics and a Ph.D. from the University of Warwick in Dynamical Systems.

picture
unavailable

Robert Watson

Research Scientist, Network Associates Laboratories

Robert Watson is a research scientist at Network Associates Laboratories, and a member of the Host Intrusion Protection (HIP) Research Group. His research interests include network and operating system security, and open source operating systems. Past work includes research into DNS security, tamper-resistant hardware, extensible operating system security including access control and audit, distributed denial of service attack resistance, network stack performance and hardening, integration of security measures into windowing systems, and operating system hardening approaches. Mr Watson is also a member of the FreeBSD Core Team, and founder of the TrustedBSD Project.