Carl Landwehr

Last updated
Carl E. Landwehr
Born
Citizenship American
Alma mater Yale
University of Michigan
Known for Computer Security
Awards National Cyber Security Hall of Fame Inductee (2012)
IEEE Fellow (2013)
Scientific career
Fields Computer science
Institutions Merit Network
Naval Research Laboratory
Mitretek Systems
National Science Foundation
University of Maryland
IARPA
George Washington University
Thesis Load Sharing in Computer Networks: A Queueing Model  (1974)
Doctoral advisor Bernard A. Galler
Website http://www.landwehr.org

Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. [1] His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures. [2] He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. [3] The final committee report is available through the Cyber Security and Policy Institute of the George Washington University, [4] and the building code through the IEEE. [5]

Carl Landwehr has developed and led cybersecurity research programs at the National Science Foundation (2001-2004, 2009–2011), IARPA (2005-2009), Mitretek Systems and the Naval Research Laboratory (1982-1999). From 2007 to 2010, he served as editor-in-chief of IEEE Security & Privacy Magazine [6] as well as associate editor of several IEEE journals. He was a member of DARPA's Information Science and Technology Study Group and has served on several studies for the National Academy of Sciences. Research begun while visiting at the Isaac Newton Institute at Cambridge eventually led to the development of a patent for a secure identification system held by Dr. Landwehr and Daniel Latham. [7] He is the author of several highly cited publications.

Carl Landwehr holds degrees from Yale University (BS) and the University of Michigan (MS, PhD). [8] While at Michigan, he worked for the Merit Network, currently the longest running regional computer network in the United States. [9] He has taught and lectured widely, including at Purdue University, Georgetown University, Virginia Tech University, and the University of Maryland. [10] He is currently a lead research scientist at the Cyber Security Policy and Research Institute at George Washington University. In 2015 and 2016, Dr. Landwehr was the visiting McDevitt Professor of Computer Science at the McDevitt Center for Creativity and Innovation of LeMoyne College to develop and teach an inter-disciplinary undergraduate course entitled "Cybersecurity for Future Presidents". [11] In 2019, he became a visiting professor in the Electrical and Computer Engineering Division of the University of Michigan in Ann Arbor. Dr. Landwehr joined the Board of Directors of the Center for Democracy and Technology in September 2016. [12]

Carl Landwehr was interviewed by Gary McGraw of Cigital for the Silver Bullet podcasts on Security for IEEE discussing changing threats in cybersecurity. [13] He has also been interviewed for the computer history series hosted by the Charles Babbage Institute of the University of Minnesota. [14] For the 30th Anniversary IEEE Symposium on Security and Privacy, he provided a history of U.S. Government investments in cyber security research. [15]

Dr. Landwehr is an IEEE Fellow (2013) and has received various awards, including the ACM SIGSAC's Outstanding Contribution Award (2013) [16] and the National Science Foundation Director's Award for Meritorious Service (2012). He was a member of the founding class (2012) inducted into the National Cyber Security Hall of Fame. [17] [18]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Gene Spafford</span> American computer scientist

Eugene Howard Spafford, known as Spaf, is an American professor of computer science at Purdue University and a computer security expert.

Virgil Dorin Gligor is a Romanian-American professor of electrical and computer engineering who specializes in the research of network security and applied cryptography.

Hsinchun Chen is the Regents' Professor and Thomas R. Brown Chair of Management and Technology at the University of Arizona and the Director and founder of the Artificial Intelligence Lab. He also served as lead program director of the Smart and Connected Health program at the National Science Foundation from 2014 to 2015. He received a B.S. degree from National Chiao Tung University in Taiwan, an MBA from SUNY Buffalo and an M.S. and Ph.D. in Information Systems from New York University.

Ravishankar K. Iyer is the George and Ann Fisher Distinguished Professor of Engineering at the University of Illinois at Urbana-Champaign. He is a specialist in reliable and secure networks and systems.

Jonathan Katz is a professor in the Department of Computer Science at the University of Maryland who conducts research on cryptography and cybersecurity. In 2019–2020 he was a faculty member in the Volgenau School of Engineering at George Mason University, where he held the title of Eminent Scholar in Cybersecurity. In 2013–2019 he was director of the Maryland Cybersecurity Center at the University of Maryland.

Stephanie Forrest is an American computer scientist and director of the Biodesign Center for Biocomputing, Security and Society at the Biodesign Institute at Arizona State University. She was previously Distinguished Professor of Computer Science at the University of New Mexico in Albuquerque. She is best known for her work in adaptive systems, including genetic algorithms, computational immunology, biological modeling, automated software repair, and computer security.

<span class="mw-page-title-main">Bhavani Thuraisingham</span>

Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of computer science and the executive director of the Cyber Security Research and Education Institute at the University of Texas at Dallas. She is a visiting senior research fellow in the Department of Informatics at Kings College University of London and a 2017–2018 Cyber Security Policy Fellow at New America.

Nasir Memon is a computer scientist based in Brooklyn, New York. Memon is a professor and chair of the New York University Tandon School of Engineering computer science and engineering department and affiliate faculty at the computer science department in the Courant Institute of Mathematical Sciences at New York University. He is also the Department Head of NYU Tandon Online, the online learning unit of the school. He introduced cyber security studies to New York University Tandon School of Engineering, making it one of the first schools to implement the program at the undergraduate level. Memon holds twelve patents in image compression and security. He is the founding director of the Center for Interdisciplinary Studies in Security and Privacy (CRISSP) and CRISSP Abu Dhabi. In 2002, Memon founded Cyber Security Awareness Week (CSAW), an annual conference where tens of thousands of students compete in events and learn skills in cyber security Memon is also co-founder of Digital Assembly, a software company that develops digital forensics and data recovery and Vivic, a company that produces malware detection software. Memon has published over 250 articles in journals and conferences and has contributed to articles regarding cyber security in magazines such as Crain’s New York Business, Fortune, and USA Today. His research has been featured in NBC Nightly News, The New York Times, MIT Review, Wired.Com, and New Science Magazine.

Justin Cappos is a computer scientist and cybersecurity expert whose data-security software has been adopted by a number of widely used open-source projects. His research centers on software update systems, security, and virtualization, with a focus on real-world security problems.

Sushil Jajodia is an American computer scientist known for his work on cyber security and privacy, databases, and distributed systems.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

<span class="mw-page-title-main">N. Asokan</span> Professor of Computer Science at University of Waterloo

Nadarajah Asokan is a professor of computer science and the David R. Cheriton Chair in Software Systems at the University of Waterloo's David R. Cheriton School of Computer Science. He is also an adjunct professor in the Department of Computer Science at Aalto University.

Adrian Perrig is a Swiss computer science researcher and professor at ETH Zurich, leading the Network Security research group. His research focuses on networking and systems security, and specifically on the design of a secure next-generation internet architecture.

Benjamin Fung is a Hong Kong-born Canadian computer scientist. Fung holds the positions of Canada Research Chair in Data Mining for Cybersecurity and Full Professor in the School of Information Studies at McGill University. His research focuses on developing data mining and machine learning methods in the areas of cyber security, data privacy, malware analysis, and authorship analysis.

<span class="mw-page-title-main">Raheem Beyah</span> American computer engineer

Raheem Beyah is an American computer engineer, researcher, and educator. As of January 15, 2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology. Prior to becoming the Dean, he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security program. Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic, Inc.

Nancy Rose Mead is an American computer scientist. She is known for her contributions to security, software engineering education and requirements.

Ibrahim "Abe" Moussa Baggili is a cybersecurity and digital forensics scientist at Louisiana State University with a joint appointment between the college of engineering and the Center for Computation and Technology. Before that, he was the founder and director of the Connecticut Institute of Technology (CIT) at the University of New Haven. Baggili was also a full professor and Elder Family Endowed Chair at UNewHaven. He has a B.S., M.S., and Ph.D. in Computer and Information Technology from Purdue University's Purdue Polytechnic Institute. Baggili is a Jordanian/Arab American first generation college graduate and a well-known scientist in the domain of Cyber Forensics and Cybersecurity with seminal peer-reviewed work in the areas of Virtual Reality Forensics (VR) and security, mobile device forensics and security, application forensics, drone forensics and memory forensics.

Edward G. Amoroso is an American computer security professional, entrepreneur, author, and educator based in the New York City area. His research interests have centered on techniques and criteria for measuring trustworthy software development. the application of these methods to secure software development for critical projects in the defense and aerospace industries, and redefining trust parameters for improved security in the cloud.

Srini Devadas is an Indian-American computer scientist at the Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory (CSAIL) who conducts research on computer security, computer architectures, and applied cryptography.

References

  1. "Carl Landwehr becomes NSF Trustworthy Computing Director". Institute for Systems Research. 30 November 2009. Retrieved 5 January 2013.
  2. "ACM Digital Library". ACM. 31 December 2013. Retrieved 5 June 2014.
  3. "NSF Where Discoveries Begin". NSF. 25 August 2014. Retrieved 5 February 2015.
  4. "Workshop to Develop a Building Code and Research Agenda For Medical Device Software Security" (PDF). GWU. 8 January 2015. Archived from the original (PDF) on 5 February 2015. Retrieved 5 February 2015.
  5. "Building Code for Medical Device Software Security" (PDF). IEEE. 17 May 2015. Archived from the original (PDF) on 20 May 2015. Retrieved 17 May 2015.
  6. "Landwehr named editor-in-chief of IEEE Security and Privacy". Institute for Systems Research. 6 July 2006. Retrieved 5 January 2013.
  7. US 5892901,Landwehr, Carl&Latham, Daniel,"Secure Identification System",issued 6 April 1999
  8. "Disruptive Technologies for Information Assurance". Dartmouth College Institute for Security, Technology, and Society. Archived from the original on 5 February 2015. Retrieved 5 January 2013.
  9. Merit Network
  10. "Carl Landwehr named IEEE Fellow" . Retrieved 15 January 2013.
  11. "McDevitt Center Appoints Endowed Chair and Visiting Professor of Computer Science". Lemoyne College. 5 June 2014. Retrieved 5 February 2015.
  12. "CDT Welcomes Three New Board Members". CDT. 15 September 2016. Retrieved 28 September 2016.
  13. "Show 061 - An Interview with Carl Landwehr". Cigital. 28 April 2011. Retrieved 8 January 2013.
  14. Landwehr, Carl E. (21 April 2014). "Oral History Interview with Carl E. Landwehr" . Retrieved 4 February 2015.
  15. "CS Digital Library Abstract A History of US Government Investments in Cybersecurity Research: A Personal Perspective". IEEE Computer Society. 16–19 May 2010. Retrieved 8 January 2013.
  16. "ACM Special Interest Group on Security, Audit and Control (SIGSAC)". ACM. 31 May 2012. Archived from the original on 2 April 2013. Retrieved 14 January 2013.
  17. "Cyber Security Hall of Fame to induct 11 security pioneers". Infosecurity. 17 September 2012. Retrieved 5 January 2013.
  18. "National Cyber Security Hall of Fame". 6 January 2014. Archived from the original on 4 December 2013. Retrieved 6 January 2014.