Edward William Felten | |
---|---|
Born | March 25, 1963 |
Citizenship | American |
Education | California Institute of Technology (BS) University of Washington (MS, PhD) |
Known for | Secure Digital Music Initiative |
Awards | EFF Pioneer Award [1] |
Scientific career | |
Fields | Computer Science public affairs |
Institutions | Princeton University, Federal Trade Commission |
Doctoral advisor | Edward D. Lazowska and John Zahorjan |
Edward William Felten (born March 25, 1963) is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, where he was also the director of the Center for Information Technology Policy from 2007 to 2015 and from 2017 to 2019. [2] On November 4, 2010, he was named Chief Technologist for the Federal Trade Commission, [3] a position he officially assumed January 3, 2011. On May 11, 2015, he was named the Deputy U.S. Chief Technology Officer. [4] In 2018, he was nominated to and began a term as Board Member of PCLOB. [5] [6] Felten retired from Princeton University on July 1, 2021. [7]
Felten has done a variety of computer security research, including groundbreaking [ citation needed ] work on proof-carrying authentication and work on security related to the Java programming language, but he is perhaps best known for his paper on the Secure Digital Music Initiative (SDMI) challenge.
Felten attended the California Institute of Technology and graduated with a degree in physics in 1985. He worked as a staff programmer at Caltech from 1986 to 1989 on a parallel supercomputer project at Caltech. He then enrolled as a graduate student in computer science at the University of Washington. He was awarded a Master of Science degree in 1991 and a Ph.D. in 1993. His Ph.D. thesis was on developing an automated protocol for communication between parallel processors.
In 1993, he joined the faculty of Princeton University in the department of computer science as an assistant professor. He was promoted to associate professor in 1999 and to professor in 2003. In 2006, he joined the Woodrow Wilson School of Public and International Affairs, but computer science remains his home department. In 2005, he became the director of the Center for Information and Technology Policy at Princeton. He has served as a consultant to law firms, corporations, private foundations, and government agencies. His research involves computer security, and technology policy. [8]
He lives in Princeton, New Jersey with his family. From 2006 to 2010, he was a member of the board of the Electronic Frontier Foundation (EFF). In 2007, he was inducted as a Fellow of the Association for Computing Machinery.
In November 2010, he was named Chief Technologist of the Federal Trade Commission. [9]
In 2013, Felton was elected a member of the National Academy of Engineering for contributions to security of computer systems, and for impact on public policy.
On May 11, 2015, he was named Deputy U.S. Chief Technology Officer for The White House. [10]
Felten was a witness for the United States government in United States v. Microsoft , where the software company was charged with committing a variety of antitrust crimes. During the trial, Microsoft's attorneys denied that it was possible to remove the Internet Explorer web browser from a Windows 98 equipped computer without significantly impairing the operation of Windows.
Citing research he had undertaken with Christian Hicks and Peter Creath, two of his former students, [11] Felten testified that it was possible to remove Internet Explorer functionality from Windows without causing any problems with the operating system. He demonstrated his team's tool in court, showing 19 ways in which it is normally possible to access the web browser from the Windows platform that his team's tool rendered inaccessible.
Microsoft argued that Felten's changes did not truly remove Internet Explorer but only made its functionality inaccessible to the end user by removing icons, shortcuts and the iexplore.exe executable file, and making changes to the system registry. This led to a debate as to what exactly constitutes the "web browser," since much of the core functionality of Internet Explorer is stored in a shared dynamic-link library, accessible to any program running under Windows.
Microsoft also argued that Felten's tool did not even completely remove web-browsing capability from the system since it was still possible to access the web through other Windows executables besides iexplore.exe, such as the Windows help system.
As part of a contest in 2000, SDMI (Secure Digital Music Initiative) invited researchers and others to try to break the digital audio watermark technologies that they had devised. In a series of individual challenges, the participants were given a sample audio piece, with one of the watermarks embedded. If the participants sent back the sample with the watermark removed (and with less than an acceptable amount of signal loss, though this condition was not stated by SDMI), they would win that particular challenge.
Felten was an initial participant of the contest. He chose to opt out of confidentiality agreements that would have made his team eligible for the cash prize. Despite being given very little or no information about the watermarking technologies other than the audio samples and having only three weeks to work with them, Felten and his team managed to modify the files sufficiently that SDMI's automated judging system declared the watermark removed.
SDMI did not accept that Felten had successfully broken the watermark according to the rules of the contest, noting that there was a requirement for files to lose no sound quality. SDMI claimed that the automated judging result was inconclusive, as a submission which simply wiped all the sounds off the file would have successfully removed the watermark but would not meet the quality requirement.
Felten's team developed a scientific paper explaining the methods used by his team in defeating the SDMI watermarks. Planning to present the paper at the Fourth International Information Hiding Workshop of 2001 in Pittsburgh, Felten was threatened with legal action by SDMI, [12] the Recording Industry Association of America (RIAA), and Verance Corporation, under the terms of the DMCA, on the argument that one of the technologies his team had broken was currently in use in the market. Felten withdrew the presentation from the workshop, reading a brief statement about the threats instead. SDMI and other copyright holders denied that they had ever threatened to sue Felten. However, SDMI appears to have threatened legal action when spokesman Matt Oppenheim warned Felten in a letter that "any disclosure of information gained from participating in the Public Challenge....could subject you and your research team to actions under the Digital Millennium Copyright Act.". [13] This has been described as a case of censorship by copyright. [14]
Felten, with help from the Electronic Frontier Foundation, sued the groups, requesting a declaratory judgement ruling that their publication of the paper would be legal. The case was dismissed for a lack of standing. [15]
Felten presented his paper at the USENIX security conference in 2001. [16] The United States Department of Justice has offered Felten and other researchers assurances that the DMCA does not threaten their work and stated that the legal threats against them were invalid.[ citation needed ]
The 2005 Sony BMG CD copy protection scandal started when security researcher Mark Russinovich revealed on October 31, 2005 that Sony's Extended Copy Protection ("XCP") copy protection software on the CD Get Right with the Man by Van Zant contained hidden files that could damage the operating system, install spyware and make the user's computer vulnerable to attack when the CD was played on a Microsoft Windows-based PC. Sony then released a software patch to remove XCP.
On November 15, 2005, Felten and J. Alex Halderman showed that Sony's method for removing XCP copy protection software from the computer makes it more vulnerable to attack, as it essentially installed a rootkit, in the form of an Active X control used by the uninstaller, and left it on the user's machine and set so as to allow any web page visited by the user to execute arbitrary code. Felten and Halderman described the problem in a blog post:
The consequences of the flaw are severe, it allows any Web page you visit to download, install, and run any code it likes on your computer. Any Web page can seize control of your computer; then it can do anything it likes. That's about as serious as a security flaw can get. [17]
On September 13, 2006, Felten and graduate students Ariel Feldman and Alex Halderman discovered severe security flaws in a Diebold Election Systems (now Premier Election Solutions) voting machine. Their findings claimed, "Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss." [18] [19] [20] [21] [22]
In early 2008, New Jersey election officials announced that they planned to send one or more Sequoia Advantage voting machines to Ed Felten and Andrew Appel (also of Princeton University) for analysis. In March 2008, Sequoia sent an e-mail to Professor Felten asserting that allowing him to examine Sequoia voting machines would violate the license agreement between Sequoia and the county which bought them, and also that Sequoia would take legal action "to stop [...] any non-compliant analysis, [...] publication of Sequoia software, its behavior, reports regarding same or any other infringement of our intellectual property." [23] This action sparked outrage among computer technology activists. [24] [25]
After examining Sequoia's machines, Felten and Appel indeed discovered grave problems with the accuracy of the machines. [26] They also demonstrated that the machines can be hacked and compromised within minutes. [27]
Shortly after that, Sequoia's corporate Web site was hacked. The hack was first discovered by Ed Felten. Sequoia took its Web site down on 20 March and removed the "intrusive content." [28]
In February 2008, Felten and his students were part of the team that discovered the cold boot attack, which allows someone with physical access to a computer to bypass operating system protections and extract the contents of its memory. [29]
In November 2010, Felten was named the first Chief Technologist of the Federal Trade Commission, [30] for which he took a one-year leave of absence from Princeton University. [31]
Premier Election Solutions, formerly Diebold Election Systems, Inc. (DESI), was a subsidiary of Diebold that made and sold voting machines.
Electronic voting is voting that uses electronic means to either aid or take care of casting and counting ballots including voting time.
Secure Digital Music Initiative (SDMI) was a forum formed in late 1998 ostensibly with the purpose of developing technology and rights management systems specifications that will protect once developed and installed, the playing, storing, distributing and performing of digital music.
An electronic voting machine is a voting machine based on electronics. Two main technologies exist: optical scanning and direct recording (DRE).
Voter verifiable paper audit trail (VVPAT) or verified paper record (VPR) is a method of providing feedback to voters using a ballotless voting system. A VVPAT is intended as an independent verification system for voting machines designed to allow voters to verify that their vote was cast correctly, to detect possible election fraud or malfunction, and to provide a means to audit the stored electronic results. It contains the name of the candidate and symbol of the party/individual candidate. While it has gained in use in the United States compared with ballotless voting systems without it, it looks unlikely to overtake hand-marked ballots.
A DRE voting machine, or direct-recording electronic voting machine, records votes by means of a ballot display provided with mechanical or electro-optical components that can be activated by the voter. These are typically buttons or a touchscreen; and they process data using a computer program to record voting data and ballot images in memory components. After the election, it produces a tabulation of the voting data stored in a removable memory component and as printed copy. The system may also provide a means for transmitting individual ballots or vote totals to a central location for consolidating and reporting results from precincts at the central location. The device started to be massively used in 1996 in Brazil where 100% of the elections voting system is carried out using machines.
MediaMax CD-3 is a software package created by SunnComm which was sold as a form of copy protection for compact discs. It was used by the record label RCA Records/BMG, and targets both Microsoft Windows and Mac OS X. Elected officials and computer security experts regard the software as a form of malware since its purpose is to intercept and inhibit normal computer operation without the user's authorization. MediaMax received media attention in late 2005 in fallout from the Sony XCP copy protection scandal.
Steven M. Bellovin is a researcher on computer networking and security who has been a professor in the computer science department at Columbia University since 2005. Previously, Bellovin was a fellow at AT&T Labs Research in Florham Park, New Jersey.
Debra Lynn Bowen is an American attorney and politician who served as the Secretary of State of California from 2007 to 2015. Previously, she was a member of the California State Legislature from 1992 to 2006. In March 2008, she was given the Profile in Courage Award by the John F. Kennedy Presidential Library and Museum.
Extended Copy Protection (XCP) is a software package developed by the British company First 4 Internet and sold as a copy protection or digital rights management (DRM) scheme for Compact Discs. It was used on some CDs distributed by Sony BMG and sparked the 2005 Sony BMG CD copy protection scandal; in that context it is also known as the Sony rootkit.
In 2005 it was revealed that the implementation of copy protection measures on about 22 million CDs distributed by Sony BMG installed one of two pieces of software that provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. Neither program could easily be uninstalled, and they created vulnerabilities that were exploited by unrelated malware. One of the programs would install and "phone home" with reports on the user's private listening habits, even if the user refused its end-user license agreement (EULA), while the other was not mentioned in the EULA at all. Both programs contained code from several pieces of copylefted free software in an apparent infringement of copyright, and configured the operating system to hide the software's existence, leading to both programs being classified as rootkits.
Sequoia Voting Systems was a California-based company that was one of the largest providers of electronic voting systems in the U.S., having offices in Oakland, Denver and New York City. Some of its major competitors were Premier Election Solutions and Election Systems & Software.
Aviel David "Avi" Rubin is an expert in systems and networking security. He is a graduate of the University of Michigan and Professor of Computer Science at Johns Hopkins University, Technical Director of the Information Security Institute at Johns Hopkins, Director of ACCURATE, and President and co-founder of Independent Security Evaluators. In 2002, he was elected to the Board of Directors of the USENIX Association for a two-year term.
Hacking Democracy is a 2006 Emmy nominated documentary film broadcast on HBO and created by producer / directors Russell Michaels and Simon Ardizzone, with producer Robert Carrillo Cohen, and executive producers Sarah Teale, Sian Edwards & Earl Katz. Filmed over three years it documents American citizens investigating anomalies and irregularities with 'e-voting' systems that occurred during the 2000 and 2004 elections in the United States, especially in Volusia County, Florida. The film investigates the flawed integrity of electronic voting machines, particularly those made by Diebold Election Systems, exposing previously unknown backdoors in the Diebold trade secret computer software. The film culminates dramatically in the on-camera hacking of the in-use / working Diebold election system in Leon County, Florida - the same computer voting system which has been used in actual American elections across thirty-three states, and which still counts tens of millions of America's votes today.
The Hursti Hack was a successful attempt to alter the votes recorded on a Diebold optical scan voting machine. The hack is named after Harri Hursti.
The Electronic Frontier Foundation (EFF) is an international non-profit advocacy and legal organization based in the United States and serves its operations worldwide.
The Center for Information Technology Policy (CITP) at Princeton University is a leading interdisciplinary research center, dedicated to exploring the intersection of technology, engineering, public policy, and the social sciences. Faculty, students, and other researchers come from a variety of disciplines, including Computer Science, Economics, Politics, Engineering, Sociology, and the Princeton School of Public and International Affairs.
J. Alex Halderman is professor of computer science and engineering at the University of Michigan, where he is also director of the Center for Computer Security & Society. Halderman's research focuses on computer security and privacy, with an emphasis on problems that broadly impact society and public policy.
Electronic voting in the United States involves several types of machines: touchscreens for voters to mark choices, scanners to read paper ballots, scanners to verify signatures on envelopes of absentee ballots, and web servers to display tallies to the public. Aside from voting, there are also computer systems to maintain voter registrations and display these electoral rolls to polling place staff.
Aggelos Kiayias FRSE is a Greek cryptographer and computer scientist, currently a professor at the University of Edinburgh and the Chief Science Officer at Input Output Global, the company behind Cardano.
{{cite conference}}
: CS1 maint: date and year (link){{cite journal}}
: Cite journal requires |journal=
(help)Full research paper [PDF], Workshop version [PDF], Executive summary, Frequently Asked Questions, Our reply to Diebold's response, Demonstration Videos
No audio
{{cite journal}}
: Cite journal requires |journal=
(help)CS1 maint: multiple names: authors list (link)