CINXE.COM
Moti Yung
<HTML> <HEAD> <TITLE> Moti Yung </TITLE> </HEAD> <BODY> <H1> MOTI YUNG </H1> <dd><b>I am with <A HREF="http://www.google.com/"> Google</A> <p> <dd> At Columbia University, Computer Science:</b> I have held various appointments such as: Adjunct Professor, Visiting Senior Research Scientist. <p> <HR> <dd><b> <dd><b>I am a computer scientist, cryptographer and information security researcher. <p> <br> <p> <dd><b>From 2007 till early 2016 and from Mid 2018 I have been with <A HREF="http://www.google.com/"> Google Inc.</A> <p> <HR> <dd><b>Previously: </b> I have been an Industry Consultant, working on information security and cryptography, <dd>including Research Scientist, Snap (2016-2018); Director, Advanced Authentication Research at RSA Laboratories. <br> <HR> <dd><b>Previously: </b> I have been VP, Chief Scientist, with <b> CertCo </b> <dd><i>which is formerly: Bankers Trust E-Commerce (BTEC)).</i> <br> <HR> <dd><b>Previously: </b> I have been with <b> IBM </b> <A HREF="http://www.watson.ibm.com/"> T.J. Watson Research Center</A>, <br> <HR> <HR> <dd> <b>Ph.D.</b> -- Columbia University, Computer Science. <p> <DL> <HR> <HR> <H2> Publications </H2> <DL <DT> <B> Some pages </B> <dd><A HREF="http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/y/Yung:Moti.html"> <b>DBLP Publication list</b> </A> <br> <dd><A HREF="https://scholar.google.com/citations?user=ScL8iFQAAAAJ&hl=en"> <b>Google Scholar</b> </A> <br> </DL> <HR> <H2> A Book </H2> <A HREF="http://www.amazon.com/Malicious-Cryptography-Cryptovirology-Adam-Young/dp/0764549758">Malicious Cryptography: Exposing Cryptovirology </A> <br> <A HREF="https://ipfs.io/ipfs/QmTmMhRv2nh889JfYBWXdxSvNS6zWnh4QFo4Q2knV7Ei2B/Misc/Malicious%20Cryptography%20-%20Exposing%20Cryptovirology.pdf">A content </A> <br> <dd>by Adam Young and Moti Yung <br> <dd> Published by <A HREF="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764549758.html"> John Wiley & Sons</A>. <br> <br> The book exposes threats that show how Cryptography can be used as an attack mechanism, which result from combining strong cryptography with malware to attack information systems. Attacks are presented that pit cryptography against cryptography itself by maliciously utilizing cryptographic algorithms to attack implementations of cryptosystems (called kleptographic attacks). The book also details defenses against these types of attacks. This new and unorthodox use of cryptography exploits modern cryptographic notions, constructions, and tools as "dark side" mechanisms (i.e., as methods that increase threats, and perhaps paradoxically, reduce overall system security). </DL> <HR> <H2> Research Interests </H2> <DL> <dd>Cryptography, Security, Privacy, Networks and Distributed Systems, <br> <dd> Theory of Computation: Computational Complexity, Randomization, Algorithms(including: Distributed Algorithms, Fault Tolerance)and . <br> <dd>Applications: Secure Computing in the real world/ Cryptography as a tool in web privacy and transactions/ Secure Systems/ Financial/ E-commerce/ Banking/ Secure Web. <br> </DL> <HR> <H2> Projects at Columbia University</H2> <ul> <li> <b> Industrial Cryptography (outside Columbia, that is: real, working deployed systems)</b> <li> <b> Public Key cryptography: systems, protocol, applications</b> <li> <b> Security of Cryptographic Primitives</b> <li> <b> Design of Ciphers, Systems and Protocols</b> <li> <b> Distributed Cryptosystems (threshold, proactive..)</b> <li> <b> Cryptographic Protocols</b> <li> <b> Cryptography and Complexity (foundations)</b> <li> <b> Algebraic methods in Cryptography</b> <li> <b> Secret-Ballot Elections</b> <li> <b> Kleptography </b> -- The art of stealing information secretly and subliminally! <li> <b> Digital Rights, Information Hiding</b> <li> <b> Privacy Issues</b> <li> <b> Cryptographic Applications in Network/Systems Security</b> <li> <b> Threats and Countermeasures</b> </ul> <HR> <H2> Links to Cryptography-Related Topics </H2> <DL> <A HREF="http://www.digicrime.com/"> <b>Digicrime</b>: a joke! -- (but it has good links)</A> <br> <A HREF="http://www.swcp.com/~mccurley/cryptographers/cryptographers.html"> People working and associated with Cryptology--(but: Home-Pages-Less not included)</A> <br> <A HREF="http://theory.lcs.mit.edu/~rivest/crypto-security.html#p"> Ron Rivest's Crypto and Security Page</A> <br> <A HREF="http://www.iacr.org/"> IACR: Int. Assoc. for Crypto Research</A> <br> <A HREF="http://acns2008.cs.columbia.edu/"> ACNS 2008, to be held at Columbia.</A> <br> <DT> <B> More... ....... </B> </DL> <HR> <H2> Links to Other Pages of Interest </H2> <DL> <A HREF="http://www.cryptovirology.com/"> (Cryptovirology) </A> <br> <DT> <B> More... ...... </B> </DL> <HR> <H2> List of some (Ex/current) Graduate Students I co-advised and/or tutored and/or worked with </H2> <A HREF="http://www.cs.ucdavis.edu/~franklin/">Matt Franklin </A> <br> <A HREF="http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/m/Mayer:Alain_J=.html"> Alain Mayer </A> <br> <A HREF="http://www.cs.rpi.edu/~yener/">Bulent Yener </A> <br> <A HREF="https://www.trust.informatik.tu-darmstadt.de/people/ahmad-reza-sadeghi/">Ahmad-Reza Sadeghi </A> <br> <A HREF="http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/y/Yu:Xiangdong.html"> Xiangdong Yu </A> <br> <A HREF="http://www.cryptovirology.com/">Adam Young </A> <br> <A HREF="http://www.cs.umd.edu/~jkatz/">Jonathan Katz </A> <br> <A HREF="http://www.cse.uconn.edu/~akiayias/">Aggelos Kiayias </A> <br> <A HREF="http://www.cs.columbia.edu/~dcook/">Debra Cook </A> <br> <A HREF="http://www.usna.edu/Users/cs/choi/">Seung Geol Choi </A> <br> <p> <HR> <dd><b>Also some press coverage: <dd><b>Harper's Magazine: Science meets Art: </b> <A HREF="http://harpers.org/blog/2009/03/the-blogosphere-thriller-six-questions-for-barry-eisler-author-of-_fault-line_/"> discussion with Barry Eisler on ``Fault Line.''</A> (<A HREF="http://www.barryeisler.com/faultline.php"> the book's web page.)</A> <br> <dd><b>See newspaper report, early discussions on anonymity: </b> <A HREF="http://www.cs.uwm.edu/~davida/ink.html"> discussion during UWM's day on e-commerce.</A> <br> <dd><b>A newspaper article: </b> <A HREF="http://phys.org/news/2014-03-cryptolocker-hard.html"> On Cryptolocker ransomware.</A> <br> <dd><b>A blog article: </b> <A HREF="https://icmconference.org/wp-content/uploads/Y30a-Green.pdf"> On how the gov apparently used our subversion idea.</A> <br> <dd><b>A newspaper article: </b> <A HREF="http://www.coindesk.com/research-hackers-install-backdoor-bitcoin-cold-storage/"> On ransomware.</A> <br> <dd><b>A newspaper article: </b> <A HREF="http://www.poslovni.hr/tehnologija/novi-opasni-racunalni-virusi-koje-bilo-tko-moze-iskoristi-da-bi-vas-ucijenio-ili-iznudio-novac-od-vas-306297"> On ransomware, in Croatian.</A> <br> <dd><b>A newspaper article: </b> <A HREF="http://www.businessinsider.com/ransomware-as-a-service-is-the-next-big-cyber-crime-2015-12"> More on Ransomware.</A> <br> <dd><b>A newspaper article: </b> <A HREF="http://www.infosecurity-magazine.com/magazine-features/the-dark-side-of-cryptography-kleptography-in/"> On kleptography.</A> <br> <dd><b>A newspaper article: </b> <A HREF="http://www.latimes.com/business/technology/la-fi-tn-la-tech-20160328-snap-htmlstory.html"> On my jobs.</A> <br> <dd><b>A newspaper article: </b> <A HREF="https://www.forbes.com/sites/amycastor/2017/08/30/in-santa-barbara-an-annual-event-brings-together-those-central-to-bitcoins-roots/#477f995f7b60"> Answering a question.</A> <br> <dd><b>A newspaper article: </b> <A HREF="https://www.agendadigitale.eu/sicurezza/crittografia-e-economia-del-ransomware-la-lezione-di-moti-yung/"> The Italian Press.</A> <br> <p> <HR> </DL> <H2> Contact Information at Columbia University </H2> <DL> <DT> <B> Address (at Columbia): </B> <DD>Room 465 <DD>S.W. Mudd Building, <DD>Computer Science Department, <DD>Columbia University, <DD>New York, NY 10027, USA. <DT> <B> E-mail: </B> <DD> use: my first name at the host: cs.columbia.edu <DD> </DL> <HR> <h2>......, more later ..... </h2> <HR> <I> Back to <A HREF="http://www.cs.columbia.edu/">Computer Science</A>, <A HREF="http://www.seas.columbia.edu/">School of Engineering and Applied Science</A>, <A HREF="http://www.columbia.edu">Columbia University</A>. </I> <HR> <I>Last updated: $Date: 2016/04/01 14:37:44 $</I> <ADDRESS> Moti Yung, user id:moti email-host id:cs.columbia.edu </ADDRESS> <dd><A HREF="http://www.cyclique.com/"> <b> </b> </A> <br> <dd><A HREF="http://www.consulting.com/"> <b> </b> </A> <br> <dd><A HREF="http://www.consulting.com/"> <b> </b> </A> <br> <dd><A HREF="http://www.consulting.com/"> <b> </b> </A> <br> <dd><A HREF="http://www.malicious.cryptography.com/"> <b> </b> </A> <br> <dd><A HREF="http://www.malicious.cryptography.com/"> <b> </b> </A> <br> <A HREF="http://www.cigital.com/books/malcrypt/"> </A> <br> <A HREF="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764549758.html"> </A> <br> <A HREF="http://www.bookworkz.com/education/networking/0764549758.html"> </A> <br> <A HREF="http://www.domsys.com/bookshop/c/Cryptography/Malicious_Cryptography_Exposing_Cryptovirology_0764549758.htm"> </A> <br> </BODY> </HTML>