Curriculum Vitae

From Simson Garfinkel
Jump to navigationJump to search

Education

Massachusetts Institute of Technology, Cambridge, MA, 2005
Ph.D. in Computer Science and Engineering
Dissertation: Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable,
Supervised by David D. Clark and Robert C. Miller.
Honorable mention for the 2005 George M. Sprowls award for the best doctoral theses in computer science.
Columbia University School of Journalism, New York, 1988
S.M. in Journalism with honors
Master's thesis: Tenant Screening Services in the United States.
Supervised by Steven Ross.
Winner of the 1988 Elisabbeta DiCagno Award "for the best investigative story on environmental protection or human rights."
Massachusetts Institute of Technology, Cambridge, MA, 1987
S.B. Chemistry; S.B. Political Science; S.B. program in Science, Technology and Society
Bachelor's thesis: Radio Research, McCarthyism and Paul F. Lazarsfeld [OCR]
Supervised by Peter Buck.

Research and Professional Experience

Sponsored Research
  • Principal Investigator, DARPA Sector Discrimination Seedling, November 2008--September 2009.
  • Principal Investigator, NIST/NPS Interagency Agreement M92367, "Support of NIST Computer Forensics Testing Program," November 2008--January 2009.
  • Principal Investigator, NPS/ITACS, "S/MIME Research," October 2008--September 2009.
  • Principal Investigator, Joint IED Defeat Organization (JIEDDO), NPS Award NR: R92NL--106, "Detecting Network Membership with Cross-Drive Analysis," December 2007--September 2008.
  • Senior Research Staff, NSF Award 0730389, EXP-SA: Prediction and Detection of Network Membership through Automated Hard Drive Analysis, August 1, 2007--July 31, 2010. Patrick Wolfe, Principle Investigator.

Positions Held

Naval Postgraduate School, United States Navy    Sept. 2006 --
Associate Professor. Interests include computer forensics; security and usability; cyberlaw.
Center for Research on Computation and Society, Harvard University    Sept. 2005 --- August 2008
Post-doctoral fellow. Interests include computer forensics; security and usability.
Computer Science Department, University of Auckland, NZ    August 2005
Honorary Research Scholar. Research on cross-drive forensics.
Computer Science and Artificial Intelligence Laboratory, MIT    Sept. 2002 --- June 2005
Doctoral student. Research on security and usability; secure messaging; computer forensics; and Radio Frequency Identification (RFID) policy.
Broadband2Wireless, Inc.    May 2000 --- July 2001
Network Architect, Chief Scientist, and Advisory Board Member. Technical lead for startup nation-wide wireless ISP. Responsibilities included network design, implementation, automation, creation of proprietary technology and algorithms, hiring, and supervision of technical staff.
MIT Lincoln Laboratory    Spring 1998, Spring 1999
Consultant. Developed novel Internet attacks for 1998 and 1999 DARPA Intrusion Detection Evaluations.
Sandstorm Enterprises, Inc.
Founder (1998), CTO (1998-2001), Treasurer (2000-)
Conceived and organized Sandstorm Enterprises, a software development firm specializing in computer forensic tools. Negotiated startup funding. Lead developer of two products.
Daniel J. Evans School of Public Affairs, University of Washington, Seattle    January 1997 --- June 1997
Visiting Scholar. Completed Web Security, Privacy and Commerce and wrote Database Nation.
Vineyard.NET, Inc    July 1995 --- September 2002
Co-Founder. Launched first Internet Service Provider on Martha's Vineyard with $5000 in personal investment. Grew company to 1500 subscribers with annual revenue of $500,000. Negotiated sale of company to Broadband2Wireless, Inc in January 2001.
Simson Garfinkel & Associates, Inc.    May 1992 --- February 1993
Founder. Conceived and organized company to develop and market SBook, an AI-based address book application for NeXTSTEP-based computers. Lead developer. Supervised two employees. Negotiated sale of company to Sarrus Software, Inc.
NeXT Computer, Inc.    May 1990, August 1991
Developer. Created a kernel-resident CDROM subsystem (ISO 9660 with Rock Ridge extensions) for NeXTSTEP 3.0.
N/Hance Systems, Dedham, MA,    March 1988 --- June 1991
Chief Scientist. Developed and marketed Write Once File System.
IRIS Project, Brown University,    June 1987 --- August 1987
System programmer. Designed and implemented a CDROM File system NFS Server.
Polaroid, Inc.    January 1987 --- September 1990
Consultant. Designed and implemented a physician's medical imaging workstation. Novel technology included a write-once file system, custom-built window system, and DSP image processing code. Demonstrated workstation at trade shows and deployed within Polaroid for supporting research. Produced a video of the working system.
Weizmann Institute of Science, Israel    June 1986 --- August 1986
Summer Researcher. Designed and implemented a multitasking laboratory data acquisition system.
MIT Media Laboratory    February 1985 --- June 1987
Undergraduate Researcher. Designed and a implemented file system for CDROM and WORM.
Chemistry Department, MIT    April 1984 --- August 1984
Undergraduate Researcher. Designed and developed software for controlling an ultraviolet spectroscope and assisting in the analysis of experimental results for the Department's third-year undergraduate laboratory.
Office of Computing Services, Bryn Mawr College    September 1981 --- June 1982
Undergraduate Researcher. Designed and implemented graphics libraries in APL and FORTRAN. Developed visualization software for the Physics department's molecular modeling package.

Papers in Refereed Journals and Magazines

  1. Roussev, Vassil, and Garfinkel, Simson., File Classification Fragment---The Case for Specialized---Approaches, Systematic Approaches to Digital Forensics Engineering (IEEE/SADFE 2009), Oakland, California.
  2. Garfinkel, Simson., Automating Disk Forensic Processing with SleuthKit, XML and Python,Systematic Approaches to Digital Forensics Engineering (IEEE/SADFE 2009), Oakland, California.
  3. Garfinkel, S., and Migletz, J., The new XML Office Document Files, IEEE Security & Privacy Magazine, March/April 2009 (Vol. 7, No. 2)
  4. Garfinkel, S., Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools The International Journal of Digital Crime and Forensics, Volume 1, Issue 1, January-March 2009.
  5. Garfinkel, S., "Sharp Figures, Fuzzy Purpose" (review of Security Data Visualization: Graphical Techniques for Network Analysis by Greg Conti), IEEE Security & Privacy Magazine, March/April 2008 (Vol. 6, No. 2), p. 5
  6. Palankar, M., Iamnitchi, A., Ripeanu, M., and Garfinkel, S. "Amazon S3 for Science Grids: a Viable Solution?", International Workshop on Data-Aware Distributed Computing (DADC'08), June 23-27, 2008, Boston, MA
  7. Garfinkel, S., "Carving Contiguous and Fragmented Files with Fast Object Validation", Digital Investigation, Volume 4, Supplement 1, September 2007, Pages 2--12.
  8. Garfinkel, S. "Complete Delete vs. Time Machine Computing," Operating Systems Review, ACM Special Interest Group on Operating Systems, January 2007.
  9. Garfinkel, S., and Smith, M., "Data Surveillance" (Guest Editor's Introduction), IEEE Security and Privacy, November/December 2006
  10. Garfinkel, S., "Forensic Feature Extraction and Cross-Drive Analysis," Digital Investigation, Volume 3, Supplement 1, September 2006, Pages 71--81.
  11. Garfinkel, S., "AFF: A New Format for Storing Hard Drive Images," Communications of the ACM, February, 2006.
  12. The Common Evidence Format Working Group (Carrier, B., Casey, E., Garfinkel, S., Kornblum, J., Hosmer, C., Rogers., M., and Turner., P.,) "Standardizing Digital Evidence Storage," Communications of the ACM, February, 2006.
  13. Garfinkel, S., Juels, A., Pappu, R., "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security and Privacy, Volume 3, Issue 3, pp. 34-43, May-June 2005.
  14. Garfinkel, S. Email-Based Identification and Authentication: An Alternative to PKI?, IEEE Security and Privacy, November/December 2003.
  15. Garfinkel, S. "Leaderless Resistance Today", First Monday, 8:3, March 3rd, 2003.
  16. Garfinkel, S. and Shelat, A., "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security and Privacy, January/February 2003.
  17. Garfinkel, S. L., "Public Key Cryptography," IEEE Computer, Volume 29, Issue 6, June 1996. pages 101-104.
  18. Stallman, R., and Garfinkel, S. "Against Software Patents", Communications of the ACM, Volume 35, Issue 1 (January 1992), pages 17-22, 121.
  19. Stallman, R., and Garfinkel, S. "Against User Interface Copyright", Communications of the ACM, Volume 33, Issue 11 (November 1990), pages 15-18.

Papers in Proceedings of Refereed Conferences

  1. Garfinkel, S., Automating Disk Forensic Processing with SleuthKit, XML and Python, IEEE/SADFE'09, May 2009.
  2. Farrell, P., Garfinkel, S., White, D. Practical Applications of Bloom filters to the NIST RDS and hard drive triage, Annual Computer Security Applications Conference 2008, Anaheim, California, December 2008. (Acceptance rate: 24%, 42/173)
  3. Garfinkel, S., IRBs and Security Research: Myths, Facts and Mission Creep, Usability, Psychology and Security 2008 (Co-located with the 5th USENIX Symposium on Networked Systems Design & Implementation (NSDI '08)), San Francisco, CA. April 2008. " (slides)
  4. Garfinkel, S., "Carving Contiguous and Fragmented Files with Fast Object Validation", Digital Forensics Workshop (DFRWS 2007), Pittsburgh, PA, August 2007. (Acceptance rate: 47%, 17/36)
  5. Kristic, I., and Garfinkel S. "The One Laptop per Child Security Model," Symposium on Usable Security and Privacy, Pittsburgh, PA, July 2007. ACM Press. (Acceptance rate: 32%, 13/41)
  6. Garfinkel, S., "Anti-Forensics: Techniques, Detection and Countermeasures", The 2nd International Conference on i-Warfare and Security (ICIW), Naval Postgraduate School, Monterey, CA, March 8-9, 2007. (Acceptance rate: 55%)
  7. Uri Braun, Simson Garfinkel, David A. Holland, Kiran-Kumar Muniswamy-Reddy, and Margo I. Seltzer, Issues in Automatic Provenance Collection International Provenance and Annotation Workshop (IPAW'06), Chicago, IL. May 3-5, 2006.
  8. Garfinkel, S., Forensic Feature Extraction and Cross-Drive Analysis,The 6th Annual Digital Forensic Research Workshop Lafayette, Indiana, August 14-16, 2006. (Acceptance rate: 43%, 16/37)
  9. Garfinkel, S., Malan, D,. One Big File is Not Enough: A Critical Evaluation of the Dominant Free-Space Sanitization Technique, The 6th Workshop on Privacy Enhancing Technologies, Robinson College, Cambridge, United Kingdom, June 28 - June 30, 2006. (Also in G. Danezis and P. Golle (Eds.): PET 2006, LNCS 4258, pp. 135--151, 2006, (c) Springer-Verlag Berlin Heidelberg 2006) (Acceptance rate: 26%, 24/91)
  10. Wu, M., Miller, R. C., Garfinkel, S., "Do Security Toolbars Actually Prevent Phishing Attacks?" CHI 2006, April 22-28, 2006, Montreal, Quebec, Canada. Nominated for best conference paper. (Acceptance rate: 23%)
  11. Garfinkel, S., Malan, D., Dubec, K., Stevens, C, Pham, C., Disk Imaging with the Advanced Forensics Format, Library and Tools The Second Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA January 29 - February 1 2006. (Acceptance rate: 54%, 27/50)
  12. Garfinkel, S., Miller, R., Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express presented at the Symposium on Usable Privacy and Security (SOUPS 2005), July 6-8, 2005, Pittsburgh, PA. (Acceptance Rate: 26%)
  13. Garfinkel, S., Schiller, J., Nordlander, E., Margrave, D., and Miller, R., "How To Make Secure Email Easier To Use", CHI 2005: Technology,Safety, Community, Portland, Oregon, April 2-7, 2005. (Acceptance rate: ~25%)
  14. Garfinkel, S., Schiller, J., Nordlander, E., Margrave, D., and Miller, R., "Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce", Financial Cryptography andData Security Ninth International Confernece, February 28-March 3, 2005, Roseau, The Commonwealth of Dominica.<br. (Acceptance rate: 26%, 24/90)
  15. Garfinkel, S. "Best Practices for Usable Security In Desktop Software", DIMACS Workshop on Usable Privacy and Security Software, July 7 - 8, 2004. DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ. (slides)
  16. Garfinkel, S., "The Pure Software Act: A Proposal for Mandatory Software Labeling" (abstract), DIMACS Workshop on Usable Privacy and Security Software, July 7 - 8, 2004. DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ
  17. Wu, M., Garfinkel, S., Miller, R., "Secure Web Authentication with Mobile Phones", DIMACS Workshop on Usable Privacy and Security Software, July 7 - 8, 2004. DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ.
  18. Garfinkel, S. Enabling Email Confidentiality through the use of Opportunistic Encryption", presented at the 2003 National Conference on Digital Government Research, May 2003, Boston, MA. [http://www.simson.net/ref/2003/2003_May_DGO.ppt (slides)
  19. Wu, M., Garfinkel, S., Miller, R., "Secure Web Authentication with Mobile Phones", Proceedings of the MIT Student Oxygen Workshop, 2003.
  20. Garfinkel, S. "Adopting Fair[/clips/academic/2002.Ubicomp_RFID.pdf Information Practices to Low Cost RFID Systems"], paper presented at Privacy in Ubicomp'2002 workshop, Gotenborg, Sweden, September 29th, 2002.
  21. Cunningham, Robert K., Richard P. Lippmann, David J. Fried, Simson L. Garfinkel, Isaac Graf, Kris R. Kendall, Seth E. Webster, Dan Wyschogrod, and Marc A. Zissman, Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation, in Proceedings ID'99, Third Conference and Workshop on Intrusion Detection and Response, San Diego, CA: SANS Institute, 1999. [http://www.ll.mit.edu/IST/pubs/1999-rkc-eval.html (abstract) (PDF)
  22. Lippmann, R. P., R. K. Cunningham, D. J. Fried, S. L. Garfinkel, A. S. Gorton, I. Graf, K. R. Kendall, D. J. McClung, D. J. Weber, S. E. Webster, D. Wyschogrod, M. A. Zissman, "" First International Workshop on Recent Advances in Intrusion Detection, Louvain-la-Neuve, Belgium, 1998. [The 1998 DARPA/AFRL Off-Line Intrusion Detection Evaluation, (abstract)

Books

  1. Security and Usability, edited by Lorrie Cranor and Simson Garfinkel. 2005. (O'Reilly & Associates, Inc.)
  2. RFID : Applications, Security, and Privacy, edited by Simson Garfinkel and Beth Rosenberg. 2005. (Addison-Wesley Professional)
  3. Practical UNIX and Internet Security, 3rd Edition, co-authored with Gene Spafford and Alan Schwartz. 2003. (O'Reilly & Associates, Inc.)
  4. Building Cocoa Applications, with Michael K. Mahoney. 2002. (O'Reilly & Associates, Inc.)
  5. Web Security, Privacy and Commerce, with Gene Spafford. 2001. (O'Reilly & Associates, Inc.)
  6. Database Nation: The Death of Privacy in the 21st Century, 2000. (O'Reilly & Associates, Inc.)
  7. Architects of the Information Society, Edited by Hal Abelson. 1999 (MIT Press.) (chapter 1)
  8. Stopping Spam, co-authored with Alan Schwartz. 1998. (O'Reilly & Associates, Inc.)
  9. Web Security and Commerce, with Gene Spafford. 1997. (O'Reilly & Associates, Inc.)
  10. Practical UNIX and Internet Security, co-authored with Gene Spafford 1996. (O'Reilly & Associates, Inc.)
  11. PGP: Pretty Good Privacy. 1995. (O'Reilly & Associates, Inc.)
  12. The UNIX-HATERS Handbook, editor, with Daniel Weise and Steven Strassmann. 1994 (IDG Press)
  13. NeXTSTEP Programming, with Michael Mahoney. 1992 (Springer-Verlag)
  14. Practical UNIX Security, with Gene Spafford. 1991 (O'Reilly & Associates, Inc.)