Virgil D. Gligor | |
---|---|
Born | |
Nationality | American |
Alma mater | University of California at Berkeley |
Awards | 1995 Doctor Honoris Causa, Politehnica University of Bucharest 2006 National Information Systems Security Award 2011 ACM SIGSAC Outstanding Innovation Award 2013 IEEE Technical Achievement Award 2019 Inductee in the National Cyber Security Hall of Fame 2020 Test of Time Award (with B. Parno and A. Perrig), IEEE Security and Privacy Symposium. |
Scientific career | |
Fields | Computer science |
Institutions | University of Maryland Carnegie Mellon University |
Virgil Dorin Gligor (born July 30, 1949) is a Romanian-American professor of electrical and computer engineering who specializes in the research of network security and applied cryptography.
Gligor was born in Zalău and lived in Bucharest, Romania, until his late teens. He received his high school degree and baccalaureate at the Gheorghe Lazăr National College. After completing the first year as a student in the Faculty of Automatic Control and Computer Science at Politehnica University of Bucharest, he earned a national scholarship to study in the United States, where he received his B.Sc., M.Sc., and Ph.D. degrees from the University of California at Berkeley. While a graduate student he was a Lecturer in EECS at the University of California, Santa Barbara. Between 1976 and 2007 he taught at the University of Maryland, College Park, and since 2008 he has been a Professor in the Department of Electrical and Computer Engineering at Carnegie Mellon University (CMU). Until 2015, he was also the co-director of CyLab, CMU’s security and privacy research institute. [1] He was a visiting professor at University of Cambridge, UK, ETH Zurich and EPF Lausanne in Switzerland, SMU in Singapore, and a long-time consultant to Burroughs and IBM corporations. He served on Microsoft’s Trusted Computing Academic Advisory Board and SAP’s Security Advisory Board. He has been an advisory board member of several security and privacy institutes including those of Johns Hopkins University and Pennsylvania State University in the US, CISPA Saarbrucken, Germany, and KTH Stockholm, Sweden.
Gligor co-chaired several conferences and symposia, including the ACM Computer and Communication Security, IEEE Security and Privacy, the Internet Society’s Network and Distributed Systems Security, the IEEE Dependable Computing for Critical Applications, and IEEE-ACM Symposium on Reliability in Distributed Software and Databases. He was an editorial-board member of Information Systems, Journal of Computer Security, ACM Transactions on Information System Security, IEEE Transactions on Computers, IEEE Transactions on Mobile Computing, and was the Editor in Chief of the IEEE Transactions on Dependable and Secure Computing.
Research
Gligor’s research in computer and network security spans over four decades. He began his career with work on the design of protection mechanisms of capability-based systems. [2] [3] In particular, he initiated the area of protection-mechanism verification of complex instruction set architectures [4] and processor security testing. [5] In the early 1980s, Gligor provided the first precise definition of the denial-of-service (DoS) problem in operating systems [6] and extended it to network protocols [7] thus helping establish availability as a first-class security concern. He and his students published all DoS research papers during the 1980s, including the Yu-Gligor model. [8] In the mid’ 80s he and Gary Luckenbaugh were the principal designers of the Secure Xenix, [9] [10] which was the first Unix-class commodity operating system to be evaluated at the B2 security level according to the NSA’s TCSEC. [11] [ circular reference ] He and his students co-designed the first automated tools for storage-channel analysis, [12] penetration analysis for C-language programs, [13] [14] pattern-oriented (i.e., signature-based) intrusion detection tool for Unix systems. [15]
During the 1990s, Gligor co-designed secure message authentication codes [16] for Kerberos v5 and inter-domain authentication [17] for OSF’s Distributed Computing Environment. His research also led to new formal models of access control, mainly for separation-of-duty and application-oriented policies. [18] He was the principal author of several security guidelines in NSA’s NCSC Rainbow Series for TCSEC, including those on security testing, trusted facility management, covert channel analysis, and trusted recovery. [19] [ circular reference ]
In early 2000s, his research focused on lightweight cryptographic schemes and protocols. He is a co-inventor of the first efficient authenticated-encryption scheme in one pass over the data [20] [21] and random-key pre-distribution in large sensor networks. [22] The later scheme, which was co-designed with his student L. Eschenauer, gave rise to a uniform random intersection graph, or simply a random key graph. Its k-connectivity and k-robustness are properties of interest in social networks, recommender systems, clustering and classification analysis, circuit design, cryptanalysis of hash functions, trusted and small-world networks, and epidemics modeling. [23] He also co-authored of the first distributed algorithms for detecting sensor-node replication attacks. [24]
In the 2010s, Gligor’s research was on trustworthy computer systems and the design of micro-hypervisors, trusted paths, I/O channel isolation, [25] trust establishment for networks of humans and computers, [26] and on protection against distributed denial of service on the Internet. [27] In 2019 he designed the first method for software root of trust establishment in a computer system that is unconditionally secure; i.e., without secrets, trusted hardware modules/tokens, or bounds on the adversary’s computation power. [28] Most recently, Gligor co-authored the first I/O separation model for formal verification of kernels implementations. [29] Over the years, Gligor’s research papers received several conference awards.
In 1995, Gligor was awarded the Doctor Honoris Causa degree at Universitatea Politehnica. [30] In 2005, he received the 2006 National Information Systems Security Award jointly given by the United States National Security Agency (NSA) and National Institute of Standards and Technology (NIST) for contributions to access control mechanisms, penetration analysis, denial-of-service protection, cryptographic protocols, and applied cryptography. [31] In 2011, he was awarded the ACM SIGSAC Outstanding Innovation Award for innovations in secure operating systems as well as covert channel analysis, intrusion detection, and secure wireless sensor networks. [32] In 2013, he was given Technical Achievement Award by the IEEE Computer Society for his pioneering work and leadership in the area of computer and network security. [33] In 2019 he was inducted in the National Cybersecurity Hall of Fame, [34] [35] [ circular reference ] and in 2020, together with B.Parno and A. Perrig, he received a Test of Time Award from the IEEE Security an Privacy Symposium for their 2005 work on distributed detection of node replication attacks in sensor networks. [36]
Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.
Markus Guenther Kuhn is a German computer scientist, currently working at the Computer Laboratory, University of Cambridge and a fellow of Wolfson College, Cambridge.
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Packages are released for Linux and Windows.
Shahid H. Bokhari is a highly cited Pakistani researcher in the field of parallel and distributed computing. He is a fellow of both IEEE and ACM. Bokhari's ACM Fellow citation states that he received the award for his "research contributions to automatic load balancing and partitioning of distributed processes", while his IEEE Fellow award recognises his "contributions to the mapping problem in parallel and distributed computing".
M. Dale Skeen is an American computer scientist. He specializes in designing and implementing large-scale computing systems, distributed computing and database management systems.
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. IA encompasses both digital protections and physical techniques. These methods apply to data in transit, both physical and electronic forms, as well as data at rest. IA is best thought of as a superset of information security, and as the business outcome of information risk management.
A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers or wireless access points. Instead, each node participates in routing by forwarding data for other nodes. The determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use.
Non-interactive zero-knowledge proofs are cryptographic primitives, where information between a prover and a verifier can be authenticated by the prover, without revealing any of the specific information beyond the validity of the statement itself. This function of encryption makes direct communication between the prover and verifier unnecessary, effectively removing any intermediaries. The core trustless cryptography "proofing" involves a hash function generation of a random number, constrained within mathematical parameters determined by the prover and verifier.
Blacker is a U.S. Department of Defense computer network security project designed to achieve A1 class ratings of the Trusted Computer System Evaluation Criteria (TCSEC).
Carsten Lund is a Danish-born theoretical computer scientist, currently working at AT&T Labs in Bedminster, New Jersey, United States.
ProVerif is a software tool for automated reasoning about the security properties found in cryptographic protocols. The tool has been developed by Bruno Blanchet.
Daniel (Danny) Dolev is an Israeli computer scientist known for his research in cryptography and distributed computing. He holds the Berthold Badler Chair in Computer Science at the Hebrew University of Jerusalem and is a member of the scientific council of the European Research Council.
Privacy engineering is an emerging field of engineering which aims to provide methodologies, tools, and techniques to ensure systems provide acceptable levels of privacy.
Yuval Elovici is a computer scientist. He is a professor in the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev (BGU), where he is the incumbent of the Davide and Irene Sala Chair in Homeland Security Research. He is the director of the Cyber Security Research Center at BGU and the founder and director of the Telekom Innovation Laboratories at Ben-Gurion University. In addition to his roles at BGU, he also serves as the lab director of Singapore University of Technology and Design’s (SUTD) ST Electronics-SUTD Cyber Security Laboratory, as well as the research director of iTrust. In 2014 he co-founded Morphisec, a start-up company, that develops cyber security mechanisms related to moving target defense.
Adrian Perrig is a Swiss computer science researcher and professor at ETH Zurich, leading the Network Security research group. His research focuses on networking and systems security, and specifically on the design of a secure next-generation internet architecture.
Automotive security refers to the branch of computer security focused on the cyber risks related to the automotive context. The increasingly high number of ECUs in vehicles and, alongside, the implementation of multiple different means of communication from and towards the vehicle in a remote and wireless manner led to the necessity of a branch of cybersecurity dedicated to the threats associated with vehicles. Not to be confused with automotive safety.
Mark M. Tehranipoor is an Iranian American academic researcher specializing in hardware security and trust, electronics supply chain security, IoT security, and reliable and testable VLSI design. He is the Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity at the University of Florida and serves as the Director of the Florida Institute for Cybersecurity Research. Since June 2022, he has served as the chair of the Department of Electrical and Computer Engineering at the University of Florida. He is a fellow of IEEE, ACM, and NAI as well as a Golden Core member of the IEEE. He is a co-founder of the International Symposium on Hardware Oriented Security and Trust (HOST). He is the recipient of the 2023 SRC Aristotle award. Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence.
Static application security testing (SAST) is used to secure software by reviewing the source code of the software to identify sources of vulnerabilities. Although the process of statically analyzing the source code has existed as long as computers have existed, the technique spread to security in the late 90s and the first public discussion of SQL injection in 1998 when Web applications integrated new technologies like JavaScript and Flash.
Jean-Pierre Hubaux is a Swiss-Belgian computer scientist specialised in security and privacy. He is a professor of computer science at EPFL and is the head of the Laboratory for Data Security at EPFL's School of Computer and Communication Sciences.
{{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help){{cite journal}}
: Cite journal requires |journal=
(help)